Identity and Access Management Strategy and Solution.

Slides:



Advertisements
Similar presentations
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Advertisements

Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Identity & Access Management Project Tom Board February 2006.
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Convergence – Driving down the Cost of Enterprise IT Christoph Rau BEA Vice President, Central & Eastern Europe October 23, 2003.
Understanding Active Directory
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Identity and Access Management
Optimizing Business Operations Business Priorities Presentation.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Microsoft Identity and Access Solutions Market Trends and Futures
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Enhanced Collaboration and other benefits of Sharepoint Technologies Kern Sutton Business Productivity Group Microsoft Corporation.
Identity Lifecycle Management Jonny Chambers Senior Technical Specialist Microsoft Ireland
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Identity and Access Management Business Ready Security Solutions.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Share common characteristics and priorities Architecture / Engineering / Construction & Real Estate Media and Entertainment Professional Services.
Hosted by SAP Future Directions: 2003 and Beyond Joshua Greenbaum, Principal Enterprise Applications Consulting
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Evergreen, Background, Methodology and IT Service Management Model
The TESCRA SAP Practice Prashant Kumar
Unify and Simplify: Security Management
Communications and collaboration portals – what’s in it for employees? Elvar Thorkelsson Information Worker Business Group Lead
APPLICATION Provisioning & Management made EASY EASY to ManageEASY to Manage EASY to MarketEASY to Market.
Deploying SharePoint Products and Technologies for Enterprise Collaboration Microsoft IT group’s Centrally Hosted Collaboration Solution.
Presentation Software as a Service Applications Software-as-a-Service Partner Enablement Program Enabling ‘Software as a Service’
Business Productivity Infrastructure Optimization The Business Productivity Infrastructure Optimization Campaign For Microsoft Office 2007 Module 25 –
CFO Summit. Microsoft Business Solutions Customer Relationship Management (aka Microsoft CRM) Building Profitable Customer Relationships Alex Simons Product.
Citrix Solutions in Financial Services Joseph Alexander Delgado Business Development Manager, Citrix Wordtext Systems, Inc.
Sudha Iyer Principal Product Manager Oracle Corporation.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
1 MIIS IAM Nationwide Journey - MIIS & IAM. 2 Agenda 1.Introduction Original objectives Definition of terms 2.MIIS 3.IAM Introduction Definition Approach.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
ARC203 Planning an IAM Strategy for your Organisation Gary Williams Principal Consultant – Microsoft UK.
ERP Implementation Fundamentals Richard Byrom Oracle Consultant, Speaker and Author
Business Productivity Infrastructure Optimization Campaign 1 Day 2: Topic: Unified Communications and Collaboration (UCC) Partners will understand Microsoft.
Unlocking the Business Value of Information for Competitive Advantage
Windows Role-Based Access Control Longhorn Update
1 Microsoft Project Solution Offerings and the next chapter of EPM September 17th, 2003 Brendan Giles, PMP Systemgroup Management Services.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
Align Business and Information Technology – with SOA Pradeep Nair Director – Software Group (IBM India/SA)
Interoperability. Session Objectives and Takeaways This is a largely a non-technical discussion Session Objective(s): – Share my learning's from the delivery.
Federico Guerrini IDA TSP, EMEA Incubation Team From Identity Synchronization to Identity Management.
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
Comprehensive Project Management Solutions with the.NET Server family.
Microsoft ® Forefront ™ Identity Manager 2010 Infrastructure Planning and Design Published: June 2010.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Michael Saucier - OSIsoft Cliff Reeves - Microsoft Your Portal to Performance An Introduction to the RtPM Platform Copyright c 2004 OSIsoft Inc. All rights.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Building and Implementing An Identity Management Roadmap John Taylor Manager, IT Security & Service Continuity Phil Hall Security Consultant Apologies.
Azure Stack Foundation
Identity and Access Management
Secure Connected Infrastructure
Transforming business
Deployment Planning Services
Data and Applications Security Developments and Directions
Instructional slide to Partner: REMOVE BEFORE PRESENTING TO CUSTOMER
Hyper-V Cloud Proof of Concept Kickoff Meeting <Customer Name>
Microsoft Services Cloud Productivity Solutions
Employee engagement Delivery guide
Microsoft Data Insights Summit
OU BATTLECARD: Oracle Identity Management Training
Microsoft Virtual Academy
Presentation transcript:

Identity and Access Management Strategy and Solution

Agenda   Business Needs   Microsoft’s Strategy   Customer Scenarios   Solution Accelerators   IdM Roadmap   Next Steps

Business Needs ExtendedEnterprise Integrate Partners in Supply Chain Integrate Partners in Supply Chain Connect with Customers Connect with Customers Empower the information workers Empower the information workers Improve Security Reduce number of userid/password Reduce number of userid/password Reduce De-provisioning risks Reduce De-provisioning risks Enforce policies and improve audit capability Enforce policies and improve audit capability Regulatory Compliance HIPAA HIPAA Sarbanes Oxley Act Sarbanes Oxley Act Gramm-Leach-Bliley Gramm-Leach-Bliley Reduce Operational Costs Provide self-service capability Provide self-service capability Decrease IT Security and Management Costs Decrease IT Security and Management Costs Lower application development costs Lower application development costs

Consider the facts  Too Many User Repositories  Enterprises have 68 internal and 12 external account stores  75% of internal users and 38% of external users are in multiple stores  Inefficient Account Provisioning/De-Provisioning  User management consumes 34% of the total time IT spends on IdM  Users gets provisioned in 16 systems and de-provisioned in 10.  Impact on User Productivity  On average IT is managing access to 73 unique applications requiring user access.  Average user spends 16 minutes a day for logins  SSO increases user productivity by 15% and efficiency by 18%  Increasing IT Operational costs  45% of all help desk calls are for p/w resets  15% of users will call help desk for p/w reset  Organisations are managing on average 46 suppliers, spending over 1380 hours managing changes to access privilege. Source: META Group research conducted on behalf of PricewaterhouseCoopers, June 2002, MSFT Internal

IAM Adoption Drivers Reduce Identity Related Operational Costs Reduce help desk costs for user management and password resets Reduce cost of provisioning and de-provisioning customers Reduce the cost of managing multiple user-repositories E-Business Enablement Increase efficiency with supply chain with partner integration Improve customer experience Employee portal/personalisation Reduce Risk of Unauthorised Access Auditing and reporting Rapid revocation of access Enforcement of security and privacy policy across the enterprise Comply with Regulatory Compliances Sarbannes-Oxley Act GLB Act HIPAA

IAM Solution Requirements Directory Services Brings multiple data stores together to form a single digital identity. It includes security and profile information. Provisioning How identities are created, modified and retired using taking advantage of user information in the directory infrastructure. Authentication Proving an identity to a network application or resource. This includes user-id/password log-ons and public key certificates. Authorisation Determine the entitlements of the digital identity once it is authorised for access and action performance. Privacy Provide precise control of access rights and privileges, digital information is secured and privacy is protected. Applications Ultimate consumers of digital identity and the enforcers of the entitlements derived from the identity. Active Directory & Microsoft Identity Integration Server Security Services in Windows Server 2003 Role Based Access Control in Windows Server 2003 Active Directory & Microsoft Identity Integration Server Microsoft Applications

Key Solution Scenarios Business to Enterprise Business to Business Business to Consumer Required level of authorisation security Elimination of multiple sign-ins for all client platforms Synchronisation of digital identity across multiple platforms Application integration and business process automation across multiple platforms Access to host based systems and management of digital assets located on other platforms Secure management of information assets Active Directory MIIS Biztalk Server 2004 Host Integration Server Unix, Netware & Mac Services Establish and maintain trust between separate but trusted business partners Federate systems with a single trust relationship to provide a seamless authentication and authorisation experience Active Directory Windows Server 2003 Oblix and OpenNetwork partner products Extend information systems and applications to consumer Outsource consumer authorisation tasks but still maintain control of authorisation Integration with a system or platform that is not supported by a Microsoft product Active Directory Windows Server 2003 Microsoft.NET Passport Oblix and OpenNetwork

Microsoft IAM Architecture AD/AM Web apps.NET Passport Web users Users Windows based Infrastructure Directory Services Opportunity Active Directory Sale: Required level of authorisation security Extend information systems and applications to consumer Outsource consumer authorisation tasks but still maintain control of authorisation

Microsoft IAM Architecture AD/AM Web apps.NET Passport Web users Windows based Infrastructure Multi-Platform Integration Opportunity BizTalk/HIS/Platform Services Synchronisation of digital identity across multiple platforms Application integration and business process automation across multiple platforms Access to host based systems and management of digital assets located on other platforms LegacySystems Novell Unix/Linux BizTalkHISSFU/SFN Users

Microsoft IAM Architecture AD/AM Web apps.NET Passport Web users Windows based Infrastructure Role/Workflow Opportunity MIIS/Trusted Partner Sale: Elimination of multiple sign-ins for all client platforms Establish and maintain trust between separate but trusted business partners Federate systems with a single trust relationship to provide a seamless authentication and authorisation experience Integration with a system or platform that is not supported by a Microsoft product XML iPlanet Databases XML iPlanet Databases NT Domains Novell Lotus Others MIIS Users

Microsoft IAM Product Mapping  Directory Services  Access Management  Authentication  Authorization  Provisioning  Identity Interoperability  Account Provisioning  Password Management  Application Provisioning/Workflow  Policy Management  Password Synchronization  Web Single Sign On  Privacy -Active Directory -MIIS -Windows Server -MIIS -BizTalk -Group Policy -MIIS -Partners -Windows Rights Management

Consulting Opportunity Willingness to Use Non-Product Vendor Consulting On a scale of 1 to 5, where 1 is low willingness and 5 is high willingness Key Takeaways  Participants are most willing to use non- product vendor consulting for assessment capabilities, followed by design capabilities Assess Design Staff Augmentation Implementation Post—Implementation Support Source: 2002 Gartner IAM Final Report 21 Executive Interviews with: Large Enterprises (over 5000 employees) 3 Verticals (Financial, Healthcare and Manufacturing)

Opportunity Summary Provisioning Applications with Education and Service Gartner study showed that enterprises span a continuum in understanding and implementation of IAM enterprise solutions, associated best practices, and relative ROIs Service providers (SPs) that can assist enterprises to architect and implement the IAM “solution road map” and help prioritise and assemble the puzzle pieces offer a great value proposition  Role-based provisioning  Workflow  Directory strategies Vendors who can assemble the full solution suite will become market leaders  User provisioning solutions will perform all user account and privilege management functionality for both internal and external users for web and non-web applications  EAM solutions will perform the real-time enforcement of privileges for the user SPs need to help their clients understand the business value of implementing these EAM solutions: increasing end user productivity, increase focus on business process, and decrease focus on cumbersome IT processes Source: 2002 Gartner IAM Final Report

IdM Solution Accelerator  Planning and Implementation Guide  Scenarios – Implementation focus  Identity aggregation and integrity (multi-systems)  Provisioning and de-provisioning  Web portal self-provisioning  Delegated administration  Web SSO  SAP integration  UNIX workstation Kerberos integration  Technologies  Directory  Certificate Authority  Kerberos (Windows and UNIX)  3 rd party Web Single Sign On (OpenNetwork, Oblix)

MS QuickStart Program: Overview

Program Goal Rapidly move customers through evaluation and early planning into product purchase and end-to-end implementation services  Deploy Microsoft software faster  Integrate sales and services  Predictable partner engagement

MS QuickStart Program  Suite of packaged consulting offerings  Powerful combination of 3 elements: 1.Service packaging  Fixed price, length, scope simplifies sale  High value start leads to larger sales 2.Microsoft service delivered by partners  Microsoft best practices and involvement  Subject matter expert partners prime 3.Detailed, prescriptive content  Deliver higher value at lower risk  Allows more customer face time

Customer Solution Roadmap Evaluate Phase Pre-sales coordination of sales and services Microsoft Solutions Framework Common Disciplines & Shared Focus Microsoft Operations Framework Plan Build Deploy Operate Customer ready implementation roadmap Implement Phase MSF / MOF MS QuickStart Plan services accelerate implementation

MS QuickStart Evaluate Phase  Goal: Convince customer to purchase product and consulting to deploy  Support the Server Solutions Campaign  Use one or more offerings as needed:  Idm Briefing  Architecture Design Session  Proof of Concept Workshop  Technical environment and business needs mapped to MS solution

Customer Value  Focused and timely delivery  Rigorous schedule avoids scope creep  Low cost, high value starting point  Predictable results  Well-documented deliverables help customer champion solution internally  Risk assessment flags costly obstacles early  Best practices  Experience from many other customers  Early planning decisions greatly impact later deployment

Partner Value  Easy to sell entry-point services  Leverage Microsoft brand and IP  Coordinate with MS sales  Profitable engagements  Low cost of sale  Detailed materials lower cost of delivery  Good margins in fixed price  Demonstrate value  High value, low risk entry-point service  Up sell customer on larger engagement

Microsoft Value  MS QuickStart speeds deployments  Customer satisfaction = license renewal  Predictable way to engage partners  Defined expectations and results  Joint selling opportunities  Clear role for MS Services  Develop and package IP early in product lifecycle  Support partners in delivery

Consultant Resource Kit  Consultant Delivery Guide  How to structure the engagement  Deliverable Template  Starting point for customer deliverable  Pre-written text key to timely delivery  Consultant Template Guide  Topic-by-topic guide matching deliverable template  Consultant guide, examples, and resources  Resource Planning Guide  Team members and meeting schedule  Training  Video of lead author explaining how to deliver

Microsoft IAM Roadmap Longhorn Wave MIIS 3.0 Active Directory Application Mode 2004 XML Web Services Specifications Jupiter TrustBridge 2003

Summary  Identity management essential part of business strategy  Highly leveraged – simultaneously increase security and productivity while reducing costs  Competitive advantage - quickly enable new scenarios, business opportunities  Microsoft and partners deliver complete solution  Get more from investment in Active Directory  Cross-platform capable

© 2003 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.