8.1 Lawson Security Overview Del Dehn Product Manager.

Slides:



Advertisements
Similar presentations
Efficient, Productive Solutions SECURITY SOLUTIONS for LAWSON SOFTWARE Part of our RISK MANAGEMENT SUITE FOR LAWSON S3 Thank you for taking the time to.
Advertisements

C6 Databases.
0 UMN 2011 ERP Terapan SAP BASIS General Concept Session # 3.
IBM Software Group ® Accessing Domino via Outlook iNotes Access for Microsoft Outlook - Notes Domino 5.5 – Domino Access for MS Outlook - Notes Domino.
Access Control Methodologies
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Copyright © 2008 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Andrew Stone Common Security.
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Active Directory: Final Solution to Enterprise System Integration
Understanding Active Directory
University of Southern California Enterprise Wide Information Systems Instructor: Richard W. Vawter.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Chapter 6 Database Design
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Identity and Access Management
Access and Identity Management for Enterprise Portals Rohit Gupta Director, Identity Management Product Management Oracle Corporation.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Product Offering Overview CONFIDENTIAL AND PROPRIETARY Copyright ©2004 Universal Business Matrix, LLC All Rights Reserved The duplication in printed or.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
Chapter 7 Database Auditing Models
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
“This presentation is for informational purposes only and may not be incorporated into a contract or agreement.”
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
WebFOCUS 8: Best Practices for Migration
Security & Auditing Solutions for Infor-Lawson Software 1.
Segregation of Duties for Infor-Lawson Software 1.
Windows 2000 Active Directory Service COSC 513 Yongquan Cai 03/10/2001.
IST 210 Database Design Process IST 210 Todd S. Bacastow January 2005.
Week 4 Lecture Part 3 of 3 Database Design Samuel ConnSamuel Conn, Faculty Suggestions for using the Lecture Slides.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
Using AS 10g with EBS What are the Benefits of Integrating AS 10g with Oracle Applications?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Riva Managed Identity Integration for Active Directory and Novell ® GroupWise ® Aldo Zanoni CEO, Managing Director Omni Technology Solutions
DC440: Security (Part 2 of 2): Logons, permissions and views - how these systems work and how to manage them Pradeep GanapathyRaj Program Manager Project.
DEV-09: User Authentication in an OpenEdge™ 10.1 Distributed Computing Environment Michael Jacobs Development Architect.
1 Windows 2008 Configuring Server Roles and Services.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Requirement for Enterprise Directory Services A Customer Influenced Perspective TOG DCE Program Group ® Brian Breton Gradient Technologies, Inc.
Information Security - City College1 Access Control in Collaborative Systems Authors: Emis Simo David Naco.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Windows Role-Based Access Control Longhorn Update
Database Administration
BAP347 Microsoft Business Solutions–Axapta: A Truly Global Business Application Jeff McKee Director Product Management Axapta Global Product Management.
Presented by Vishy Grandhi.  Architecture (Week 1) ◦ Development Environments ◦ Model driven architecture ◦ Licensing and configuration  AOT (Week 2)
Workforce Scheduling Release 5.0 for Windows Implementation Overview OWS Development Team.
Introduction to Active Directory
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
CEG 2400 Fall 2012 Directory Services Active Directory Tree Domain.
Secure Data Access with SQL Server 2005 Doug Rees Associate Technologist, CM Group
CERN IT Department CH-1211 Genève 23 Switzerland t Single Sign On, Identity and Access management at CERN Alex Lossent Emmanuel Ormancey,
Context Aware RBAC Model For Wearable Devices And NoSQL Databases Amit Bansal Siddharth Pathak Vijendra Rana Vishal Shah Guided By: Dr. Csilla Farkas Associate.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Secure Connected Infrastructure
Software Project Configuration Management
Extensible Platform Microsoft Dynamics 365
Chapter 6 Database Design
Servicenow Admin Certification Training
SERVICENOW ADMIN & ADVANCED ONLINE TRAINING
Cisco Real Exam Dumps IT-Dumps
MANAGING DATA RESOURCES
Lawson ProcessFlow Overview and Actual ProcessFlow Solutions
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
Presentation transcript:

8.1 Lawson Security Overview Del Dehn Product Manager

Agenda Security domains Upgrade considerations Summary 8.1 Technology project update Questions and answers

Lawson Security Domains Technology Security Domains User management Authentication Authorization

Lawson Security Authorization Authentication/ Single sign-on Resource Management

Lawson Security Business process focused security Central repository for security administration (Resources) Organizational modeling (Roles) Rules builder (Rules) Single sign-on Additive security paradigm Database auditing (front-end, back-end sign-on)

Lawson Security: Design Features Designed as a centralized service –Callable by all Lawson layers Roles and Rules based –An industry prevalent approach Driven by user and corporate information –Flexible security to accommodate the customer’s business structures Administration tool for policy modeling –Test new structures or security policies Attribute based security –Same concept as attributes in LDAP structures Fine grained securable objects –For example, field level security

User Management

User Management Domain Lawson Resource Management Central repository for globally interesting data –user name, address and roles Create custom attributes Structure – organizational chart modeling Non-organizational chart structures allowed

Organizational Modeling: Changes for Individuals Project Manager is promoted to CFO “Roles” domain LDAP Server Microsoft ADAM 2003 Changes to structures can be made in a “drag and drop” fashion

Organizational Modeling: Changes for Groups Director of Marketing with all of his/her directly reporting Marketing Managers is moved to the direct supervision of the newly created position of VP of Marketing LDAP Server Microsoft ADAM 2003 “Roles” domain Changes to structures can be made in a “drag and drop” fashion

Resource Management: Structure

Authentication

Authentication Domain Lawson Authentication –Single Sign-on –Database (DB) user authentication –Session management –Secure credential storage –Identity management

Single Sign-on for End Users

Authorization

Authorization Domain The new Lawson Security model Business process focused Rules and Roles based Granular security checking Object oriented Flexible policy modeling –Allows organizational modeling for security –Allows attribute driven policies –Element based policies Allows for distributed administration

Authorization: Roles and Rules Roles –Organizational roles –Organizational structures Rules –Rules builder –Simple or complex Rules written for Roles govern the security privileges of end-users assigned to a Role(s)

Benefits of Role-Based Security Transparency –User’s roles are defined by business needs –Security classes and privileges are defined by business tasks Stability –Access needs for a task do not change often –User’s roles change more frequently Efficiency –Changing access for a given task accomplishes changes for all affected users

Lawson Security: New Rules Rules apply to “securable objects” –Product lines –System codes –Forms and their fields –Drill Around® –Tables and the columns in a row –Environment objects – printers, etc.

Security Rules Rules can be unconditional –Grant All Access/Deny Any Access –Builds fast, efficient access control lists Rules can be unconditional but allow limited access –Inquire only, for example Example –ADD_EMPLOYEE class: EMPLOYEE table: ALL_ACCESS (users that are employees can view their own information)

Conditional Rules Data can be secured based on attributes of the user –If (user.getAttribute(‘Department’)== ‘HR’) then ‘IACD’ else ‘I’ (if user is in HR Department, then can change information) Data can be secured based on the data values –If (table.EMPLOYEE == user.getEmployeeId()) then ‘IACD’ else ‘I’ (user can change own information and see all others) Data can be secured using other kinds of functions –Time of day, database reads, etc.

New Security Model Rules express security policies - Rule execution allows or denies access to a securable object Security Classes group rules for common tasks - Constitutes a task oriented privilege pack Multiple security classes to Roles - Easy creation of Roles with overlapping functionalities Multiple Roles to users - Allows for multiple responsibilities

A Security Policy Illustration Users Roles Security Classes Securable Objects Jane John Steve Mary Employee HR Manager Payroll Manager Payroll Clerk Employee Info Manager Info Payroll Access Form HR11 Check Printer Note: Users can be assigned multiple Roles simultaneously

Lawson Security Securable Objects

Deny Access to a Form Field

Security “Off” – All Form Transfers are Available *

Secured: Form Transfers are Hidden

Upgrade Considerations

Lawson Security: 8.1 release Provides security for all Lawson Portal based products –LAUA security – not required –Security extensions (Ex. HR security) - not required Lawson Security and LAUA security can operate concurrently –Lawson Security – Lawson Portal Users ONLY –LAUA security – Lawson Portal Users and LID users –Each end user must be secured by only one security mechanism, not both

Transitioning to 8.1 Lawson Security Security mechanism assignment per end user Enables phased migration from LAUA security to Lawson Security Migration from LAUA to Lawson Security by: –End user –Role –Group –Structure –Etc. Not a “Big Bang” approach

Lawson 8.1 Technology Release 8.1 Technology = Environment, Internet Object Services (IOS) and Lawson Portal 8.1 Technology will support: –8.1 Applications –8.0.X Applications Existing or upgrading 8.0.X Applications customers are not “cut off” from implementing 8.1 Technology 8.0.X Applications customers can utilize 8.1 Technology features without needing to upgrade to 8.1 Applications

8.1 Lawson Security: Summary Flexibility and power to create security policies based on how your organization does business Major components: –Resource Management and LDAP (roles, structures) –Authorization (rules engine) –Authentication and Single sign-on (SSO)

8.1 Technology Project Update The scheduled release of Lawson 8.1 Technology has been moved to Lawson’s Q1FY06 (June – August 2005) after a recent review of the project’s milestones and metrics. This release is being measured against the quality standards and milestones of Lawson’s CMMI methodology and whole company readiness metrics. The review indicated that an adjustment to the proposed schedule would not only deliver much improved performance, usability and security, but also a quicker time to benefit for Lawson clients.

Questions?