A Different View of IdM Biz Process? Michael R Gettes Duke University Denver, June 2005.

Slides:



Advertisements
Similar presentations
UTILIZING WITH ITA. offers an entire suite of benefits for you and your students. You can also set up s for the purpose.
Advertisements

© University of Reading Go to View > Master > Slide Master to put your unit name here 20 April 2014 IT Services Identity Management.
NSF Middleware Initiative: Managing Identity on Campus Michael R Gettes, Duke University Tom Barton, University of Chicago.
Working Together for Healthier Communities: A Framework for Collaboration among Community Partnerships, Support Organizations, and Funders.
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
1 The Evolving Definition of "Student": Identity Management at Duke University Klara Jelinkova Director, Computing Systems Office of Information Technology.
OLD Organization Book Chapter Title Group Number, Group Member names New Organization
11 WARC standard revision workshop Clément Oury IIPC General Assembly open workshops Stanford, April 28th, 2015 IIPC General Assembly – Stanford – April.
Shibboleth Update a.k.a. “shibble-ware”
© 2011 The University of Chicago InCommon Silver Implementation at UChicago Tom Barton 1.
Transitional Care for Post-Acute Care Patients in Nursing Homes Mark Toles, MSN, RN.
Mass Users Group Meeting November 27, 2012.
Mastering Windows Network Forensics and Investigation Chapter 14: Other Audit Events.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Identity Lifecycle Management Jonny Chambers Senior Technical Specialist Microsoft Ireland
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
Robert Bell Anthony Helms Amanda Hollingsworth Seth Johnson Tiffany Pike Andrew Withem.
Introduction to Grouper Part 1: Access Management & Grouper Tom Barton University of Chicago and Internet2 Manager – Grouper Project.
National Science Foundation Chief Information Officer CIO Fall Update for the Advisory Committee for Business and Operations: Identity Management 2.0 George.
KITSUMKALUM FIRST NATION Developing a Kitsumkalum Constitution Photo credit: Brigitte Bartlett.
Enterprise Directories: Design, Implementation, and Operational Strategies Dr. Tom Barton.
Exploring InCommon Getting Started with InCommon: Creating Your Roadmap.
Error reports as a source for SPI Tor Stålhane Jingyue Li, Jan M.N. Kristiansen IDI / NTNU.
Acuity STAR Coordinator Training Author: Paul Malcomson Acuity STAR Coordinator Training Author: Paul Malcomson.
Data and its manifestations. Storage and Retrieval techniques.
Potential Alcohol Strategies March 20, 2008 Sheila Nesbitt.
Normalization (Codd, 1972) Practical Information For Real World Database Design.
Using error reports in SPI Tor Stålhane IDI / NTNU.
TITLE SLIDE Subhead added here. Please read before using template. Remember to delete this slide before using completed presentation. Guidelines for the.
How Will Alexandrians Get Around Their City In 2030? Joining the Conversation about Future Transportation Networks For Alexandria Residents, Workers and.
Health Agenda Goal # 9f School Wellness Teams Progress to Date List activities in school year that were reflective of this goal as a priority.
All Unit Charter Renewals are due at the respective District’s Roundtable Meeting in November Last Updated 9/29/15.
Skills: none Concepts: Third party login, motivation for third party login, filter bubble This work is licensed under a Creative Commons Attribution-Noncommercial-Share.
Stanford Authorization Existing mainframe based authority –homegrown, in operation since the 80’s –primarily for financial and personnel authority for.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
Creating a European entity Management Architecture for eGovernment CUB - corvinus.hu Id Réka Vas
June 2007Library systems managers SCONUL Access The largest borrowing scheme for higher education in the UK and Ireland.
Andrew Allen Communication Service Identifier.
Types of Managerial Skills Networking and Communication Techniques competent at correspondence, clear, concise, focus on client Respond to phone.
Jane Hill Directory Services Product Manager, Harvard University.
Implementing a Role Management System Mair é ad Martin Carrie Regenstein Internet2 Fall Meeting September 20, 2005.
MATH !!!!!!!!!. This shows that we are accountable to the community and that we are competitive among the other peninsula schools.
Errors!. Where do errors occur? Anywhere data is transferred, processed, stored, etc. Input user error Storage magnetic hard drive errors physical tampering.
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
Overview March 27, 2012 Executive Order (2008) Mayor’s Environmental Task Force Cleaner Greener Lincoln.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Using the Dalhousie Logo in your presentations and work Dalhousie Faculty of Medicine Continuing Professional Development.
Portal Services & Credentials at UT Austin CAMP Identity and Access Management Integration Workshop June 27, 2005.
1 US Higher Education Root CA (USHER) Update Fed/Ed Meeting December 14, 2005 Jim Jokl University of Virginia.
Master Data Management Chris Belmont Ochsner Health System 1.
© 2011 The University of Chicago Organizational Grouping, or Some New Authority & Risk Issues In Absentia: RL "Bob" Morgan, Kevin Morooney, Michael Gettes.
WHAT ARE THE STEPS TO DELETE PEOPLE FROM YAHOO MESSENGER?
Microsoft Imagine Academy
Important Point for ILO Appliers
Change of VLAN for Wired Guest
Identity Management Integration CAMP
Defining an Architecture
Current Campus Issues – From My Horizon
UF Graduate School & COMPASS
Today’s slides available at:
An introduction to DSpace
US Government Workers and Contractors Adhoc Committee
Please use speaker notes for additional information!
What are IAM Key Processes.
Managing Enterprise Directories: Operational Issues
Transition from LRT to P&T
True / False Variables.
Desktop App Assure Service Microsoft Representative Name June 7, 2019
Presentation transcript:

A Different View of IdM Biz Process? Michael R Gettes Duke University Denver, June 2005

Duke Cough ahem Cough, Cough Gag… Cough Next slide please …………

The Problem (per Tom U of Memphis) Unclear process for lifecycle management of accounts & other IT resources –Seat of pants policy determination Inconsistent operational practices –Done differently by different people at different times Common business logic forced to reside in applications to determine eligibility –Eg. Is this user “currently a member of community”? –Inconsistent service levels for users results.

Not shown: transitions to prospective state from grace, limbo, slide, IDonly. Tom Barton’s Original U of Memphis States View of IdM …

Adding to the Problem … Gaining common understanding among Id Mgmt functional types Communication between Id Mgmt Functional and Id Mgmt Technical types How do Service Providers fit in? Knitting together other Business Processes with IdM Biz Process (communication and understanding) Hence, A Duke View…

ACTIVE or EXISTS Creation Condition Action Result Identity & Service/Provisioning States (functional view) Become Student Become Faculty Remove Student Services

ACTIVE or EXISTS Creation Condition Action Result DISABLEDGRACE Identity & Service/Provisioning States (functional view) Become Student Become Faculty Remove Student Services Terminated Staff

IDENTITYOBJECTIDENTITYOBJECT Condition Action Result Loop Over All Conditions Until No Actions Stable State For each ID Object … For good biz logic Order must not matter

ID Object #1 Old ID Object #1 New ID Object #2 Old ID Object #2 New ID Object #3 Old ID Object #3 New ID Object #4 Old ID Object #4 New Identity Management Business Logic Testing and Validation Now Possible