Identity Management, what does it solve By Gautham Mudra.

Slides:



Advertisements
Similar presentations
© 2006 IBM Corporation Tivoli Identity Manager Express Tivoli Access Manager for Enterprise Single Sign-On (Product Demonstrations) Tivoli Live! – 15 June.
Advertisements

ADManager Plus Simplify Your Active Directory Management.
McAfee One Time Password
Security for Mobile Devices
PayAdvantageHR Imagine an integrated HRIS – Payroll – Enrollment platform with one login at your fingertips Presents.
ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Autenticazione e Gestione delle Identità Giacomo Aimasso – CISM – CISA.
To learn more about Directory Concepts and how we can help your organisation please contact a Directory Concepts relationship manager near you: Sydney.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Access Control Methodologies
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
IdM & OpenID Present by Fangli cai Prantap Bedi. The need for IdM &OpenID As the world of e-business gains global acceptance, the traditional processes.
Peter Deutsch Director, I&IT Systems July 12, 2005
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Shopping and ORM Solutions
Identity and Access Management
Microsoft Identity and Access Solutions Market Trends and Futures
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
1 ASP.NET SECURITY Presenter: Van Nguyen. 2 Introduction Security is an integral part of any Web-based application. Understanding ASP.NET security will.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Energy Ecosystem Overview David Miller Chief Security Officer.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Identity and Access Management PM COP Forum May 20, 2014Tuesday10100 AMLamont Library.
Developing Applications for SSO Justen Stepka Authentisoft, LLC
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
Enterprise Security for Microsoft Dynamics GP Jeff Soelberg
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Identity Management 20/01/2005 Abhai Chaudhary. Facts Today, many organizations routinely create and manage user identities and access privileges in 25.
Sentry’s Implementation and Use of the Supplier Contract Module Presented by: Barry Estes - Director of Procurement and Contracts Blake Barron - Contract.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Information Security Antipatterns in Software Requriements Engineering Miroslav Kis Presented by Liping Cai.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Network design Topic 1 Business goals. Agenda Network life cycle Network design process Business goals Scope Constraints.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Identity Management and Enterprise Single Sign-On (ESSO)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
HRMS Implementation Project HRMS Security Overview Module.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
Some Great Open Source Intrusion Detection Systems (IDSs)
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Identity and Access Management
ClearAvenue, LLC Headquartered in Columbia, Maryland
Case studies on Authentication, Authorization and Audit in SOA Environments Dr. Srini Kankanahalli.
Company Bundesdruckerei GmbH Headquarters Berlin Industry High tech
SECURITY PLANNING AND ADMINISTRATIVE DELEGATION
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
Novell Account Management Introduction and Overview
Identity and Access Management
Automating Mainframe Authentication Using SecureLogin
What Features Should Workforce Automation Have? Workforce Automation Workforce automation solution plays a key role in aligning your people. Know what.
Microsoft Services Cloud Productivity Solutions
Enterprise Single Sign-On
Azure AD Deployment Are you maximising your Azure AD investment?
Single Sign On Glen Dorton 1/18/2019.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Example Use Case for Attribute Authorities and Token Translation Services - the case for eduGAIN Andrea Biancini.
What are IAM Key Processes.
Azure AD Simon May Technical Evangelist.
INTRODUCTION TO AZURE AD
iSecurity Password-Reset Training
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Identity Management, what does it solve By Gautham Mudra

Agenda  Introduction  Security and Business Issues  Benefits of Identity Management  Architecture  Features of Identity Management  Conclusion  Q & A

Introduction Identity Management is all about  Authorization/ Authentication  Access Control  Auditing  User Provisioning  Single Sign On

Security Issues  Typically the users have to remember passwords. Consequently they either choose easy to crack passwords or even worse write it down on piece of paper.  Each application implements its own security modules which might be weak.  Denying access to a user for all the applications when he quits the organization.  Distribution of information and access control based on their identity.

Business Issues  Some industry analysts estimate that as much as 60 percent of help desk calls are  Password related.  Password resets are estimated by analysts to cost between $30 and $60 per call.  Delays in workflow processes to enable a new employee work status.  Bad user experience through multiple required login.

Benefits of Identity Management  Reduce administration, Help desk and technical support costs  Provide competitive advantage through enabling automation and streamlining workflow.  Improve customer and employee service  confidentiality of customers, suppliers, and employees  Reduce time taken to enable new employees to get access to required resources within the organization  Reduce risk of ex-employees retaining access to organizational resources  Data Integrity

Features of Identity Management

Identity Management

Architecture

Authorization/Authentication

Provisioning

Access Control  Commercial products offer Role Based Access Control  Implement Multi layer and Multi lateral security models.  Access Control based on roles assigned to users.

Auditing  Logging information for the administrator  Smart Auditing systems can implement a simple IDS  Detects brute force password attacks.

Single Sign On 2 Categories  Single sign on into all the applications with in the enterprise  Federated Identity

Federated Identity

Conclusion  Identity Management is a rapidly evolving market.  Its not an off the shelf product but needs lot of customization.  Implementation of these solutions is very difficult  But it’s very promising and if rightly implemented will reap lot of security and business benefits.

Q & A