Download presentation
Presentation is loading. Please wait.
Published byPeregrine Palmer Modified over 9 years ago
1
Identity Management 20/01/2005 Abhai Chaudhary
2
Facts Today, many organizations routinely create and manage user identities and access privileges in 25 or more individual applications and systems. One industry analyst claims that it takes 28 hours to set up a single user account.
3
Facts In one financial services firm, RSA security found more than 100 application-specific authentication systems. Most users are forced to remember upwards of 20 passwords for access to various systems and applications.
4
Facts Some industry analysts estimate that as much as 60 percent of help desk calls are password-related. Password resets are estimated by analysts to cost between $30 and $60 per call.
5
Facts According to the U.S. Federal trade commission, reported incidents of identity theft increased 73 percent from 2001 to 2002. Business processes are becoming more and more complex in nature with multiple entities are involved in decision making
6
Key Drivers ProductivityManageabilitySecurity Cost effectiveness Consistency Compliance with standards –HIPPA (HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT) –ARTICLE 29
7
Identity Who you are? ContextProfile
8
Identity Attributes Certificate PAN number Passport number SSN Driving license number Group memberships Roles Department within an organization etc
9
Identity Management A solution which provides combination of processes and technologies to manage and secure access to the information and resources of an organization
10
Scope Define Identity (Person, place or things) Store related information securely Making Identity information available to authorized person Manage relation between Identity and resource
11
Goals One user One identity One infrastructure
12
Goals
13
People Soft ® Oracle ® Windows 2000 ® Sales Help desk EmployeePartnersB2BCustomers Extended Enterprise resources
14
The Big Picture
15
One Infrastructure Application Generators Identity Applications Directories Provisioning Solution Management Process Global Sign On Business Applications Security Infrastructure Personal Identifiers
16
Cross Enterprise Sign On Authentication Data source Authentication Data source A B Trust relation SAML
17
Key Drivers Productivity –Reduced resource allocation time Manageability –User data synchronization –Centralized data repository Security –Real time record updates –No orphan accounts Cost effectiveness –ROI
18
Some Examples IMS ( www.courion.com ) www.courion.com PivotPath [Jamcracker Inc] ( www.jamcracker.com ) www.jamcracker.com Oblix ( www.oblix.com ) www.oblix.com Tivoli ( http://www-306.ibm.com/software/tivoli/ ) http://www-306.ibm.com/software/tivoli/ Dot Net Passport ( www.passport.net ) www.passport.net Liberty alliance (www.projectliberty.org) www.projectliberty.org Netegrity ( www.netegrity.com ) www.netegrity.com
19
Case Study [ Provisioning ]: GRIC Communications Inc Provides managed broadband service to –Branch offices –Roaming users –Tele workers More than 50,000 Access points across 40 countries
20
Case Study [ Provisioning ]: GRIC Communications Inc Workflow tasks –Manual –Automatic –Semi Automatic Intra department communication Unknown third party involvement 15 Different applications
21
Q&A
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.