Identity Management 20/01/2005 Abhai Chaudhary. Facts Today, many organizations routinely create and manage user identities and access privileges in 25.

Slides:



Advertisements
Similar presentations
Manage your technology for optimal return on investment (ROI) The Tivoli ® Configuration & Operations management solution from IBM.
Advertisements

© 2006 IBM Corporation Tivoli Identity Manager Express Tivoli Access Manager for Enterprise Single Sign-On (Product Demonstrations) Tivoli Live! – 15 June.
ADManager Plus Simplify Your Active Directory Management.
Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Team: SuperBad Cats MSIT 458 – Dr. Chen Authentication through Password Protection.
Xavier Verhaeghe Vice President Oracle Security Solutions
Privileged Identity Management Enterprise Password Vault
Microsoft Identity Solutions
Lecture 23 Internet Authentication Applications
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Active Directory: Final Solution to Enterprise System Integration
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
Identity Federation in Healthcare Networks Xiaohui Chen Department of Computer Science University of Virginia.
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Identity Management, what does it solve By Gautham Mudra.
Identity and Access Management
Identity and Access Management — at the Core of Business Andrew A. Afifi, M.Sc. Network Security, CISSP Technology Strategist.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
Microsoft Identity and Access Solutions Market Trends and Futures
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
Identity and Access Management Business Ready Security Solutions.
Single Sign-On -Mayuresh Pardeshi M.Tech CSE - I.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
GatorLink Password Management Policy March 31, 2004.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
MIIS in the Real World - MIIS at Centrica Mathew Rawlings Designer.
Integrating Federated Identity and Web services in the RHIO Environment John Richardson Vice-Chair, Liberty Alliance eHealth SIG Intel Corporation Digital.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Requirement for Enterprise Directory Services A Customer Influenced Perspective TOG DCE Program Group ® Brian Breton Gradient Technologies, Inc.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
NYCDOE Division of Instructional and Information Technology Oren Hamami Chief Information Security Officer New York City Department of Education.
PRESENTATION | OBLIX CORPORATE OVERVIEW Oblix Introduction Securely Managing Business in a Connected World.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Identity Management and Enterprise Single Sign-On (ESSO)
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Microsoft Identity Integration Server & Role Base Access Theo Kostelijk Consultant Microsoft BV
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Identities and Azure AD Premium
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Reduce Risk Across Hybrid IT
Secure Connected Infrastructure
Single sign-on Mike Ladd Nazia Raoof Bret Walker
Reduce Risk Across Hybrid IT
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Reduce Risk Across Hybrid IT
Company Overview & Strategy
Managing Digital Identity
Identity Infrastructure Fundamentals and Key Capabilities
What are IAM Key Processes.
James Cowling Senior Technical Architect
Zero Trust in Practice: Identity Drives an Adaptive Workforce
Presentation transcript:

Identity Management 20/01/2005 Abhai Chaudhary

Facts Today, many organizations routinely create and manage user identities and access privileges in 25 or more individual applications and systems. One industry analyst claims that it takes 28 hours to set up a single user account.

Facts In one financial services firm, RSA security found more than 100 application-specific authentication systems. Most users are forced to remember upwards of 20 passwords for access to various systems and applications.

Facts Some industry analysts estimate that as much as 60 percent of help desk calls are password-related. Password resets are estimated by analysts to cost between $30 and $60 per call.

Facts According to the U.S. Federal trade commission, reported incidents of identity theft increased 73 percent from 2001 to Business processes are becoming more and more complex in nature with multiple entities are involved in decision making

Key Drivers ProductivityManageabilitySecurity Cost effectiveness Consistency Compliance with standards –HIPPA (HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT) –ARTICLE 29

Identity Who you are? ContextProfile

Identity Attributes Certificate PAN number Passport number SSN Driving license number Group memberships Roles Department within an organization etc

Identity Management A solution which provides combination of processes and technologies to manage and secure access to the information and resources of an organization

Scope Define Identity (Person, place or things) Store related information securely Making Identity information available to authorized person Manage relation between Identity and resource

Goals One user One identity One infrastructure

Goals

People Soft ® Oracle ® Windows 2000 ® Sales Help desk EmployeePartnersB2BCustomers Extended Enterprise resources

The Big Picture

One Infrastructure Application Generators Identity Applications Directories Provisioning Solution Management Process Global Sign On Business Applications Security Infrastructure Personal Identifiers

Cross Enterprise Sign On Authentication Data source Authentication Data source A B Trust relation SAML

Key Drivers Productivity –Reduced resource allocation time Manageability –User data synchronization –Centralized data repository Security –Real time record updates –No orphan accounts Cost effectiveness –ROI

Some Examples IMS ( ) PivotPath [Jamcracker Inc] ( ) Oblix ( ) Tivoli ( ) Dot Net Passport ( ) Liberty alliance ( Netegrity ( )

Case Study [ Provisioning ]: GRIC Communications Inc Provides managed broadband service to –Branch offices –Roaming users –Tele workers More than 50,000 Access points across 40 countries

Case Study [ Provisioning ]: GRIC Communications Inc Workflow tasks –Manual –Automatic –Semi Automatic Intra department communication Unknown third party involvement 15 Different applications

Q&A