Identity Management 20/01/2005 Abhai Chaudhary
Facts Today, many organizations routinely create and manage user identities and access privileges in 25 or more individual applications and systems. One industry analyst claims that it takes 28 hours to set up a single user account.
Facts In one financial services firm, RSA security found more than 100 application-specific authentication systems. Most users are forced to remember upwards of 20 passwords for access to various systems and applications.
Facts Some industry analysts estimate that as much as 60 percent of help desk calls are password-related. Password resets are estimated by analysts to cost between $30 and $60 per call.
Facts According to the U.S. Federal trade commission, reported incidents of identity theft increased 73 percent from 2001 to Business processes are becoming more and more complex in nature with multiple entities are involved in decision making
Key Drivers ProductivityManageabilitySecurity Cost effectiveness Consistency Compliance with standards –HIPPA (HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT) –ARTICLE 29
Identity Who you are? ContextProfile
Identity Attributes Certificate PAN number Passport number SSN Driving license number Group memberships Roles Department within an organization etc
Identity Management A solution which provides combination of processes and technologies to manage and secure access to the information and resources of an organization
Scope Define Identity (Person, place or things) Store related information securely Making Identity information available to authorized person Manage relation between Identity and resource
Goals One user One identity One infrastructure
Goals
People Soft ® Oracle ® Windows 2000 ® Sales Help desk EmployeePartnersB2BCustomers Extended Enterprise resources
The Big Picture
One Infrastructure Application Generators Identity Applications Directories Provisioning Solution Management Process Global Sign On Business Applications Security Infrastructure Personal Identifiers
Cross Enterprise Sign On Authentication Data source Authentication Data source A B Trust relation SAML
Key Drivers Productivity –Reduced resource allocation time Manageability –User data synchronization –Centralized data repository Security –Real time record updates –No orphan accounts Cost effectiveness –ROI
Some Examples IMS ( ) PivotPath [Jamcracker Inc] ( ) Oblix ( ) Tivoli ( ) Dot Net Passport ( ) Liberty alliance ( Netegrity ( )
Case Study [ Provisioning ]: GRIC Communications Inc Provides managed broadband service to –Branch offices –Roaming users –Tele workers More than 50,000 Access points across 40 countries
Case Study [ Provisioning ]: GRIC Communications Inc Workflow tasks –Manual –Automatic –Semi Automatic Intra department communication Unknown third party involvement 15 Different applications
Q&A