Identity Management and Enterprise Single Sign-On (ESSO)

Slides:



Advertisements
Similar presentations
Agenda AD to Windows Azure AD Sync Options Federation Architecture
Advertisements

Autenticazione e Gestione delle Identità Giacomo Aimasso – CISM – CISA.
Quality in Identity and Access Management Systems IDM: Overview Michele Brass, PMP PMI Westchester Chapter Program Manager – Collaboration Tools.
Lecture 23 Internet Authentication Applications
Understanding Active Directory
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Identity and Access Management
Access and Identity Management for Enterprise Portals Rohit Gupta Director, Identity Management Product Management Oracle Corporation.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Single-Sign On and Federated Identity.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
ICT Strategy Service Management. As-is situation Two separate technical infrastructures OSS vs. BSS OSS is 16x greater in financial terms Two “parallel.
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Identity Lifecycle Management Jonny Chambers Senior Technical Specialist Microsoft Ireland
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
Identity and Access Management Business Ready Security Solutions.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
APS (Keystone) Security “dial tone” Doron Grinstein Chief Architect October 2012 | Version 0.2 | Confidential.
Unify and Simplify: Security Management
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Sample for a picture in the title slide SAP and Novell Collaborate on Comprehensive, Integrated Governance, Risk, and Compliance Solutions.
11g SOA and BPM Real-Time business visibility Business process efficiency Simplify operational environment Manage increasing event and service volumes.
Using AS 10g with EBS What are the Benefits of Integrating AS 10g with Oracle Applications?
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Sudha Iyer Principal Product Manager Oracle Corporation.
1 MIIS IAM Nationwide Journey - MIIS & IAM. 2 Agenda 1.Introduction Original objectives Definition of terms 2.MIIS 3.IAM Introduction Definition Approach.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Access resources in a federation partner organization.
Web Services Security Patterns Alex Mackman CM Group Ltd
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
KC-ROLO Project Kidderminster College Repository Of Learning Objects Graham Mason & Ed Beddows.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Brian Puhl Technology Architect Microsoft IT Session Code: ITS212.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Reduce Risk Across Hybrid IT
Identity and Access Management
Secure Connected Infrastructure
Reduce Risk Across Hybrid IT
Data and Applications Security Developments and Directions
SAP Enterprise Digital Rights Management by NextLabs
Identity and Access Management
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Reduce Risk Across Hybrid IT
Secure & Unified Identity
BOMGAR REMOTE SUPPORT Karl Lankford
Enterprise Single Sign-On
Company Overview & Strategy
ESA Single Sign On (SSO) and Federated Identity Management
ICT Strategy Service Management.
KNOWLEDGE MANAGEMENT (KM) Session # 34
STR -11 What if Saas tools work together, what would this mean for IBM #engageug.
Microsoft Virtual Academy
Presentation transcript:

Identity Management and Enterprise Single Sign-On (ESSO) ICT Strategy Identity Management and Enterprise Single Sign-On (ESSO)

Introduction Follows on from other related themes: Unified Operator Interface (UOI) Network Convergence Network Security and Domains Circles of Trust Federated Identities Security as a Service Location transparency Virtualisation

Identity Management Business Value “Identity management projects are much more than technology implementations — they drive real business value by reducing direct costs, improving operational efficiency and enabling regulatory compliance.”

Explosion of ID’s Business Automation # of Digital IDs Time Internet Intra-Agency (B2E) Partners (B2B) Customers (B2C) Mobility # of Digital IDs Internet Client Server Applications Mainframe Time Pre 1980’s 1980’s 1990’s 2000’s

The Disconnected Reality Authentication Authorisation Identity Data HR System Authentication Authorisation Identity Data NOS Authorisation Identity Data Authentication Web Apps Enterprise Directory Authentication Authorisation Identity Data Infrastructure Application Authentication Authorisation Identity Data COTS Application Authentication Authorisation Identity Data In-House Application Authentication Authorisation Identity Data In-House Application “Identity Chaos” Lots of users and systems required to do business Multiple repositories of identity information; Multiple user IDs, multiple passwords Decentralised management, ad hoc data sharing

Multiple Contexts Our SUPPLIERS Our CUSTOMERS Our AGENCY and EMPLOYEES Customer satisfaction & customer intimacy Cost competitiveness Reach, personalisation Collaboration Outsourcing Faster business cycles; process automation Value chain Our AGENCY and EMPLOYEES Our PARTNERS Our REMOTE and VIRTUAL EMPLOYEES Mobile workforce Flexible/temp workforce

Pain Points Too many user stores and account admin requests IT Admin Developer End User Security/ Compliance Business Owner Too many user stores and account admin requests Unsafe sync scripts Redundant code in each app Rework code too often Too many passwords Long waits for access to apps, resources Too many orphaned accounts Limited auditing ability Too expensive to reach new partners, channels Need for control

To-Be Authentication Should only have to login once Identity is federated across domains Access permissions determined by Role(s), Groups and Policies Automated provisioning linked to ERP Systems Employees joining/leaving (HR) Contractors (Procurement)

Federated Identities Cross domain trust using: Security Access Markup Language (SAML) Liberty Alliance (ID-FF)/WS-Federation protocols Digital Certificates

IAM Architecture