OFFICE OF INFORMATION TECHNOLOGY Identity & Access Management at BYU.

Slides:



Advertisements
Similar presentations
Expanding LTE for Devices European Commission Information Society and Media The aim of EXATED is to realise the vision of a new scalable.
Advertisements

Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Building the Future: Millennium’s Relationship with Campus Systems and Services John Culshaw Faculty Director for Systems University of Colorado at Boulder.
1 Collaborators at the Gates of Troy: Extending eServices at USC.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
WSO2 Identity Server Road Map
Emory University Case Study I2 Day Camp November 5, 2010 John Ellis & Elliot Kendall.
Federal Student Aid Technical Architecture Initiatives Sandy England
Overview of Centra 7. Centra 7 Highlights A real-time collaboration and communication platform Security, Scalability, Flexibility Supports all the critical.
July 12, 2005 CSU SIMI Workshop - Melding Policy and Technology to Manage Identity1 Provisioning Services Collaborative CSU, East Bay and CSU, San Bernardino.
John Sadd Progress Fellow and OpenEdge Evangelist
Access and Identity Management for Enterprise Portals Rohit Gupta Director, Identity Management Product Management Oracle Corporation.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Microsoft Cloud Services Training and Certification Presented by Name Goes Here, Title.
UAGSharePoint InternetIntranet.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Be there without going there. Microsoft Lync is an enterprise-ready, unified communications platform that connects users everywhere, providing a consistent,
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
NASA Growth Strategy Cindy Bolt Group Vice President March 10, 2009.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
For Business Partner use only IBM Software Group © 2003 IBM Corporation Competitive Update 2003 Business Partner Version.
Character Development is Part of Every Great Story.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Energy Ecosystem Overview David Miller Chief Security Officer.
National Science Foundation Chief Information Officer CIO Fall Update for the Advisory Committee for Business and Operations: Identity Management 2.0 George.
1. 2 IT innovations in specialized areas where competitors will have difficulty copying Excellence in design of processes and activities and how they.
…optimise your IT investments Nigel Stanley Practice Leader, Security Bloor Research Identity Management as a Service Peter Cooke Associate Analyst Bloor.
Single Sign-On with Microsoft Azure
44 Montgomery Street Suite 960 San Francisco, CA USA Tel Cell
SCSC 311 Information Systems: hardware and software.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved. Customer Name Date Cisco Transformative Networking Lifecycle Financing that.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
INTERNAL COMPANY CONFIDENTIAL John Einhaus, Micro Focus NetIQ: Single Sign On and Advanced Authenticaion SUSE: Linux.
2009 Federal IT Summit Cloud Computing Breakout October 28, 2009.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Federal Student Aid Enterprise Information Technology Architecture (EITA) Operation and Maintenance Contract Presented by: Dr. Wayne Fleming | 5/17/2013.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
1:1 Learning Scott Drossos :1 Learning2.
Access resources in a federation partner organization.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Global Multi-factor Authentication Market WEBSITE Single User License: US$ 2500 No of Pages: 51 Corporate User License:
Going Hybrid – part 1 Moving to Hybrid Cloud with Windows Azure Virtual Machines & System Center 2012 R2.
Introduction to Terra Dotta Applications Integration with Campus Data Systems for institutions beginning their software implementation.
© 2016 ForgeRock. All rights reserved. Lars Gunnar Tiben – Senior Customer Engineer Nordic
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Clouding with Microsoft Azure
Identity and Access Management
The Self-Service Business Intelligence Suite
Title Arrow Cloud NOTE: Remember to update name on slide.
The Self-Service Business Intelligence Suite
Security. Audit. Compliance
Enabling Collaboration with IT
Novell eDirectory™ Competitive Comparisons
Corporate Messaging Architecture by Segment
Law and Poverty Colloqium
Remedy Integration Strategy Leverage the power of the industry’s leading service management solution via open APIs February 2018.
Zero Trust in Practice: Identity Drives an Adaptive Workforce
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

OFFICE OF INFORMATION TECHNOLOGY Identity & Access Management at BYU

OFFICE OF INFORMATION TECHNOLOGY Foundations 1.Strong University-based Identity Management Processes Established 1984 Long-standing working committee of university partners 2.Well-managed Replicated Identity Stores Home-grown Oracle database to facilitate sharing Directory Structures based on E-Directory and Active Directory Replication facilitated by NetIQ’s IDM product and the Informatica ETL 3.Single Sign-on Authentication based on Open Source CAS project 4.Complete Web Services API (1 st generation)

OFFICE OF INFORMATION TECHNOLOGY 4 Key Business Needs 1.Allow Identity and Access Rights to be Maintained “Globally” Modernize our Data Model & Identity Store Event-Driven Architecture Standards and Protocols Federation 2.Expand our Constituencies We do a good job with our core constituencies: Students, Employees, and Dependents We do a fair job with Prospective Students and Potential Employees We do a poor job with Parents / Proxies, Alumni, EFY/Camps/Education Week, Suppliers, Ecclesiastical Leaders, etc.

OFFICE OF INFORMATION TECHNOLOGY 4 Key Business Needs 3.Strengthen Security Multi-factor Authentication Strong Authentication Monitoring and Repudiation Adaptive Authentication 4.Improve the User Experience Mobile Platforms Social Identity / Global Identity Improved Access Rights Management (Provisioning, Delegation, Virtualization, etc.)

OFFICE OF INFORMATION TECHNOLOGY Architectural View

OFFICE OF INFORMATION TECHNOLOGY Considering Our Options 1.Working with Industry Analysts Series of discussions with Gartner have been helpful Vendor discussions have also been helpful (Unicon & NetIQ) We are scheduled to talk with several universities in the next few weeks We are scheduled to meet with the Church next Wednesday 2.Looking at Technology Trends and Vendors New Technologies and Standards are creating new opportunities No vendor has a “one stop” solution…build to standards and stay flexible 3.Prioritizing our Opportunities We see opportunities that will lower the cost of application system integration We see opportunities that will reduce complexity and support costs We see opportunities to improve the user experience 4.We expect to start seeing results this summer

OFFICE OF INFORMATION TECHNOLOGY Identity & Access Management at BYU