Identity Management with SAP NetWeaver IdM
|
|
- Adela Griffith
- 8 years ago
- Views:
Transcription
1 Identity Management with SAP NetWeaver IdM Andreas Müller, BT Global Services
2 Agenda Introduction SAP NetWeaver IdM Project Project ISP Background and Motivation Functionality Lessons Learned Summary
3 SAP NetWeaver Identity Management IDM should be triggered by identity business processes and data Data e.g. on-boarding HCM Definition and rulebased assignment of meta roles HCM Integration Identity Mgmt. monitoring & Audit e.g. Order2Cash Identity virtualization and identity as service through standard interfaces SAP NetWeaver Identity Management Password Management Approval Workflows Business process relies on appropriate user and role assignments in systems Central Identity store Distribution of users and role assignments for SAP and non-sap systems SAP FI SAP BT 2008 SAP XI ABAP Java SAP HR ABAP SAP ERP ABAP SAP Java SAP Portal Java Legacy App. Databases Web App. MS Exchange Operating Systems
4 System Components Workflow Web Front-End for end users Approvals Self-Service Adminstrator Monitoring Front-End User/ Manager Worflow Front-End Administrator Developer Management Console Delegated Administration Monitoring Web Front-End for operations Analyse system activity Management Console for administrators and developers Database System configuration Database holds Identity store Event Event Agent Agent Dispatcher Dispatcher Process configuration Dispatchers execute processes Identity Center Batch synchronization User initiated tasks Provisioning tasks Event Agents Virtual directory Virtual Directory Detect changes in connected systems Virtual Directory Provides additional connectors Target systems Source systems
5 Management Console Example: Request a SAP-Role
6 Monitoring
7 Agenda Introduction SAP NetWeaver IdM Project Project ISP Background and Motivation Functionality Lessons Learned Summary
8 Use of Identity Center at BT Synchronization of Identities from Corporate Directory into Active Directory Provisioning of personal and functional accounts Additional attributes joined from import files Built-in delta mechanism reduces updates to Active Directory to the absolute minimum. Performance Corporate Directory Files Data Synchonization Engine Database Active Directory Delta import once a day Duration 1.5h Full import once a month Duration ca. 5h Source systems Identity Center Target systems Benefits Efficient Delta Mechanism Highly customizable connectors
9 Agenda Introduction SAP NetWeaver IdM Project Project ISP Background and Motivation Functionality Lessons Learned Summary
10 Customer: Internet Service Provider Project Scope Consulting IdM project setup and definition Requirements analysis Detailed vendor selection Longlist, RFI, Shortlist, POC Establish standards for the definition of roles and entitlements Process optimization for IdM administration processes Prepare data protection concepts and works council agreements Quality assurance concept Data cleansing support Implementation Design based on selected IdM-tool (MaXware IC / SAP NetWeaver IDM) Implementation Data model IdM processses Provisioning interfaces to target systems IdM data synchronization Project management Test Migration of existing accounts and entitlements Operations Change und incident management
11 Customer: Internet Service Provider Motivation Project goals Creation of a central identity repository for all non-customer identities accessing computing center applications Implementation of standardized administration processes for entitlements Creation of a central repository for entitlements Increasing data quality of identity and entitlement data Effective demonstration of SOXcompliance Delegation of administrative tasks Increase degree of automation Primary goals: Increase usability, security and audit capabilities Secondary goals: Cost reduction and ROI considerations Tool selection RFI with >10 major IdM vendors Presentations and Proof of Concept Criteria Support for non-standard applications Flexibility, high degree of customization possible Expected implementation effort Match with skills available internally Support for roles and delegated administration Traceability of system and user actions
12 Source and Target Systems Target System Types SAP ISP Test Accounts Building Access Secure VPN LDAP Active Directory Samba SSH Key Management / Key Distribution ARS Remedy Sun Access Manager User groups Employees Group employees Consultants Partner Source Systems HR Group directory Asset database
13 Project History and Milestones Nov Requirements analysis Mai 2005 Tool selection July 2005 Design and start of implementation Feb Go-Live Release 1.0 including Source-system connectivity (HR/Org Master data) Standard request and approval process Internal administrative entitlement model, delegation of admin privileges Target Systems SAP/LDAP June 2007 Release 1.5 Sept Release 1.6 Jan Release 1.7 April 2008 Release 1.8
14 Agenda Introduction SAP NetWeaver IdM Project Project ISP Background and Motivation Functionality Identity Management Entitlement Management Account Management Self-Service Lessons Learned Summary
15 UseCases (1) Identity Management (Re-) Enter company OU change Location change leave company inactive (re-)enter company Position change Sabaticals/maternity leave Leave company Entitlement Management Account Management Self-Service activate active suspended active change location change company change organization change name change position suspend (i.e. maternity leave)
16 Manage Master Data Task Menu
17 Create Person
18 Create Location
19 UseCases (2) Identity Management Entitlement Management Assign (temporary) permissions Revoke permissions Automated role assignement Documentation / Audit Account Management Assign account (De-) Activate Account Delete Account Password management Self-Service Permission VPN-Access Location Hans Mustermann Account Active Directory Company OU Funktional Role Employee Permission AD-Group Employees-MUC
20 Create Permissions Creates permission within the IdM-system as well as in the target system
21 Assign/Revoke Permissions Delegated administration for permission owners
22 UseCases (3) Identity Management Entitlement Management Request Account Management Self-Service Password reset Denial 1. Approval? 2. Approval Data protection requirements Self-Service for certain person attributes? Nofiy Denial Request permissions Provision
23 Request Permissions Users may request permissions for themselves or others. Approval process configurable for each permission. Approver roles: Line Manager Permission Owner Target System Owner HR
24 Approval XXXXXXXX XXXXXXXX
25 Agenda Introduction SAP NetWeaver IdM Project Project ISP Background and Motivation Functionality Lessons Learned Summary
26 Lessons Learned Implementation Expectations concerning adaptability were fulfilled Tool supports change and redesign very well in the course of extensions and additions Short implementation cycles achieved System behavior is transparent and follows a consistent paradigm Number of processes (approx. 150 processes, 1300 steps) makes system complex Framework developed on top of built-in functionality (Regression-) Testing indispensable Processes Flexibility (data model, user interface, processes) brings the temptation of relaxing initial standards as the system evolves over time End user help crucial to reduce helpdesk call volume Complexity multiplies (user types x identity states x data sources) General issues Data cleansing and migration may take up to 50% of target system implementation effort Development, Integration and Production environments required to manage changes Pragmatic approach to the use of roles allows for sufficient degree of automation without complex role modeling processes
27 Summary SAP NetWeaver Identity Management fulfilled the expectations regarding the speed and flexibility of a tool-box, but requires thorough design and planning for large deployments. Agile implementation possible Quick reaction to changed requirements High degree of flexibility concerning Data model Process adaptation Front-end extension Comprehensive monitoring tools to diagnose system behavior Flexibility requires Experienced IdM-developers and Designers Mature project and software development organization Comprehensive QA measures appropriate for IdM (i.e. automated regression tests)
28 Thank You Andreas Müller Solutions Architect Global Professional Services BT (Germany) GmbH & Co. ohg Tel:+49 (0)
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options
More informationIdentity Management with midpoint. Radovan Semančík FOSDEM, January 2016
Management with midpoint Radovan Semančík FOSDEM, January 2016 Radovan Semančík Current: Software Architect at Evolveum Architect of Evolveum midpoint Contributor to ConnId and Apache Directory API Past:
More informationSAP NetWeaver Identity Management Experiences from an Implementation at Colgate-Palmolive Company
[ [ SAP NetWeaver Identity Management Experiences from an Implementation at Colgate-Palmolive Company Sarah Henriquez Senior Manager IT Risk Management, Colgate-Palmolive Kristian Lehment Product Manager
More informationBUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT
Solution in Detail NetWeaver BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING NetWeaver IDENTITY MANAGEMENT Identity management today presents organizations with a host of challenges. System landscapes
More informationFirst-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2
First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2 SAP Product Management, SAP NetWeaver Identity Management & Security Kristian
More informationHow Accenture is taking SAP NetWeaver Identity Management to the next level. Kristian Lehment, SAP AG Matthew Pecorelli, Accenture
How Accenture is taking SAP NetWeaver Identity Management to the next level Kristian Lehment, SAP AG Matthew Pecorelli, Accenture In This Session You will receive an overview of the functionality that
More informationRole Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
More informationBusiness-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
More informationBusiness-Driven, Compliant Identity Management
Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System
More informationEnterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
More informationSAP Identity Management Overview
Identity Management Overview Public May 2016 Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password
More informationSAP Identity Management Overview
Identity Management Overview October 2014 Public Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password
More informationCompliant, Business-Driven Identity Management using. SAP NetWeaver Identity Management and SBOP Access Control. February 2010
Compliant, Business-Driven Identity Management using SAP NetWeaver Identity Management and SBOP Access Control February 2010 Disclaimer This presentation outlines our general product direction and should
More information1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
More informationSAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management
Solution in Detail NetWeaver Business-Driven, Compliant Identity Table of Contents 3 Quick Facts 4 Business Challenges Identity for the User Lifecycle 5 The Solution Supporting a Heterogeneous IT Landscape
More information<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
More informationCompliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT
Compliance & SAP Security Secure SAP applications based on state-of-the-art user & system concepts Driving value with IT BO Access Control Authorization Workflow Central User Management Encryption Data
More informationApproaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
More informationIntegrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
More information..making process automation a business priority..
..making process automation a business priority.. Why do our customers run promentawebflow TM? It provides a solution platform to drive SAP process automation Enable the web based automation of any SAP
More informationSAP User and Access Management with Microsoft Identity Integration Server
Collaboration Technology Support Center Microsoft Collaboration Brief August 2005 SAP User and Access Management with Microsoft Identity Integration Server Authors Rüdiger Berndt, IdM Lead Architect, Oxford
More informationSecuring your business
Securing your business Anders Askåsen Product Manager for OpenIDM * World Wide Coverage ForgeRock.com Enterprise Open Source Software ForgeRock Norway ForgeRock USA ForgeRock UK ForgeRock France Consulting
More informationThe Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
More informationSTATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses
STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with
More informationRSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
More informationOracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
More informationAutomated User Provisioning
Automated User Provisioning NOMINATING CATEGORY: ENTERPRISE IT MANAGEMENT INITIATIVES NOMINATOR: TONY ENCINIAS, CHIEF TECHNOLOGY OFFICER COMMONWEALTH OF PENNSYLVANIA 1 TECHNOLOGY PARK HARRISBURG, PA 17110
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationOracle Privileged Account Manager 11gR2. Karsten Müller-Corbach karsten.mueller-corbach@oracle.com
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach karsten.mueller-corbach@oracle.com The following is intended to outline our general product direction. It is intended for information purposes
More informationSAP Senior Consultant Master of Engineering Diploma in business administration
D A N I E L G R A V E R S E N PERSONAL INFORMATION Degree Company Email Nationality SAP Senior Consultant Master of Engineering Diploma in business administration Figaf ApS Denmark DGR@FIGAF.COM Danish
More informationHow can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
More informationIntroducing SAP s Landscape and Data Center Innovation Platform. Phil Jackson SAP Solution Engineer
Introducing SAP s Landscape and Data Center Innovation Platform Phil Jackson SAP Solution Engineer CIO challenges Business Agility & Innovation Business Continuity Cost Containment Hybrid On-premise, Virtual
More informationQtel ILM to FIM Migration
Case Study Background About Qtel The Qatar Telecom (Qtel) Group is a leading international communications company, with a significant presence in the MENA region and Southeast Asia, and having a consolidated
More informationSAP Certified - Associate Business Foundation & Integration with SAP ERP 6.0 EHP5. SAP ERP Financials
2012 1 30 Application Associate SAP ERP 6.0 EHP5 SAP Certified - Associate Business Foundation & Integration with SAP ERP 6.0 EHP5 SAP ERP Financials SAP Certified Application Associate - Financial Accounting
More informationSAP Certified - Associate Business Foundation & Integration with SAP ERP 6.0 EHP6
2014 9 9 Application Associate SAP ERP 6.0 EHP6 SAP Certified - Associate Business Foundation & Integration with SAP ERP 6.0 EHP6 SAP ERP 6.0 EHP5 SAP Certified - Associate Business Foundation & Integration
More informationTECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR
TECHNOLOGY SOLUTIONS FOR THE INTERNAL AUDITOR (BUY VS BUILD) APRIL 17, 2015 LEVERAGING TECHNOLOGY FOR AUDIT Utilizing Software to Administrate Audit Process 40% 35% 30% 37% Tools Leveraged 32% 36% Yes
More informationData Migration/Conversion to SAP from Legacy systems - Our Strategy
By, WWW.101ERPTEAM.COM Data Migration/Conversion to SAP from Legacy systems - Our Strategy Project Implementation Team ---------------------------------------- SAP Consulting Services - Implementation,
More informationOracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
More informationMinimize Access Risk and Prevent Fraud With SAP Access Control
SAP Solution in Detail SAP Solutions for Governance, Risk, and Compliance SAP Access Control Minimize Access Risk and Prevent Fraud With SAP Access Control Table of Contents 3 Quick Facts 4 The Access
More informationIdentity and Access Management Point of View
Identity and Access Management Point of View Agenda What is Identity and Access Management (IAM)? Business Drivers and Challenges Compliance and Business Benefits IAM Solution Framework IAM Implementation
More informationmidpoint Overview Radovan Semančík December 2015
midpoint Overview Radovan Semančík December 2015 Agenda Identity Management Introduction midpoint Introduction midpoint Architecture Conclusion Identity Management Introduction Identity Management System
More informationBy Makesh Kannaiyan makesh.k@sonata-software.com 8/27/2011 1
Integration between SAP BusinessObjects and Netweaver By Makesh Kannaiyan makesh.k@sonata-software.com 8/27/2011 1 Agenda Evolution of BO Business Intelligence suite Integration Integration after 4.0 release
More informationManageEngine ADManager Plus
ManageEngine ADManager Plus Solution Document www.admanagerplus.com Contents 1. Introduction... 1 2. ADManager Plus: Under the hood... 2 2.1 Modules 3 2.2 Access to product s features 4 3. Management Active
More information[ ] Integrating Umoja and UNGM. HLCM-PN Turin, March 2014
Integrating Umoja and UNGM HLCM-PN Turin, March 2014 Agenda Introduction - Overview of Umoja UN Vendor Database before and after Vendor Data Cleansing project Establishing an Interface between UNGM and
More informationIdentity Governance Evolution
Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle
More informationApplication Management Services (AMS)
Contents 1. AMS : An Overview 2. AMS : Models 3. Delivery Organization 4. Processes & Tools 5. Transition Methodology 6. Pricing Application Management Services (AMS) Enterprise Application Services Capability
More informationPassword Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions
Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including
More informationIdentity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
More informationDirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
More informationOracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004
Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory
More informationSupporting SAP business processes with ECM. SAP Extended ECM by OpenText
Supporting SAP business processes with ECM SAP Extended ECM by OpenText SAP and OpenText 20 Years of Partnership SAP Portal Content SAP Portal Site SAP Travel Receipts SAP Document Presentment SAP Employee
More informationOracle Fixed Scope Services Definitions Effective Date: October 14, 2011
Oracle Fixed Scope Services Definitions Effective Date: October 14, 2011 "You" and "your" refers to the individual or entity that has ordered Advanced Customer Services from Oracle or an authorized distributor.
More informationSAP Enterprise Architecture in the Era of SAP HANA, Infrastructure, Platforms, Software and Everything-as-a-Service
SAP Enterprise Architecture in the Era of SAP HANA, Infrastructure, Platforms, Software and Everything-as-a-Service Chuck Kichler (kichler@us.ibm.com) LEARNING POINTS How to consume the on-premise vs.
More informationIntegration of SAP central user administration with Microsoft Active Directory
Collaboration Technology Support Center Microsoft - Collaboration Brief June 2005 Integration of SAP central user administration with Microsoft Active Directory Chris Kohlsdorf, Senior System Architect
More informationDirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
More informationapiomat Enterprise Mobile Enterprise Application Platform the Next Generation
Mobile Enterprise Application Platform the Next Generation Digital Transformation Mobile is changing the game Starting with Apple s iphone mobile devices have changed economy from the scratch new business
More informationDiscussion Overview. Company Background. IAM Inertia. IAM at Chase. IAM Program Progress. IAM Tools Integration. Program Lessons Learned
Discussion Overview Company Background IAM Inertia IAM Value Proposition IAM at Chase IAM Team Scope and Mission IAM Program Functional Structure IAM Team Functional Structure IAM Program Progress IAM
More informationOrange County Convention Center Orlando, Florida June 3-5, 2014. Architecturing the cloud for your SAP landscape Florian Stilkerich
Orange County Convention Center Orlando, Florida June 3-5, 2014 Architecturing the cloud for your SAP landscape Florian Stilkerich LEARNING POINTS What are the different types of Cloud Enterprise Architecture
More informationAchieving HIPAA Compliance with Identity and Access Management
Achieving HIPAA Compliance with Identity and Access Management A Healthcare Case Study Stephen A. Whicker Manager Security Compliance HIPAA Security Officer AHIS/St. Vincent Health DISCLAIMER: The views
More informationSAP NetWeaver Information Lifecycle Management
SAP NetWeaver Information Lifecycle Management What s New in Release 7.03 and Future Direction June 2012 SAP NetWeaver Information Lifecycle Management Information lifecycle management Retention management
More informationAryzta Commercial Excellence (ACE) ACE Project Overview
Aryzta Commercial Excellence (ACE) ACE Project Overview ( Cloud for Customer, mobile BI, Product Catalogue ) Agenda Introduction to ARYZTA Overview of the Project: Background, Objectives and Key Business
More informationSAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned
SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned Executive Summary Organizations evaluating technology solutions to enhance their governance, risk and compliance
More informationSun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost
Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Timothy Siu SE Manager, JES Nov/10/2003 sun.com/solutions/
More informationT 0800 288 9199 E elite@elitetele.com W www.elitetele.com VARONIS VARONIS DATAPRIVILEGE DATAPRIVILEGE. DataPrivilege
T 0800 288 9199 E elite@elitetele.com W www.elitetele.com VARONIS VARONIS DATAPRIVILEGE DATAPRIVILEGE 1 VARONIS DATAPRIVILEGE Features and Benefits AUTOMATED ENTITLEMENT REVIEWS Data owners are provided
More informationThe School Board of Palm Beach
Project Change Request Customer Name: County, Florida Customer Number: 6873401 The School Board of Palm Beach Reference Agreement: Florida State Term Software contract: 252-008-05-ACS Contract #: CFTJQOP
More informationService Offering: Outsourced IdM Administrator Service
Service Offering: Outsourced IdM Administrator Service 2014 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 The Outsourced IdM Administrator Service 2 2.1 Hitachi ID Systems and
More informationIDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
More informationSimplify Identity Management with the CA Identity Suite
SOLUTION BRIEF CA DATABASE IDENTITY SUITE MANAGEMENT IDENTITY FOR MANAGEMENT DB2 FOR z/os DRAFT Answer the cover question by stating how the solution can deliver the desired benefits; typically, technical
More informationPassword Management Before User Provisioning
Password Management Before User Provisioning 2015 Hitachi ID Systems, Inc. All rights reserved. Identity management spans technologies including password management, user profile management, user provisioning
More informationManageEngine ADSolutions
ManageEngine ADSolutions We Think. We Innovate. We dare to differ. So that you go home happy. Apu Pavithran Product Consultant apupavithran@manageengine.com ADSolutions: Innovations We Introduced Pioneers
More informationOracle Human Capital Management Cloud Securing Oracle HCM Cloud. Release 10
Oracle Human Capital Management Cloud Release 10 Oracle Human Capital Management Cloud Part Number E61339-03 Copyright 2011-2015, Oracle and/or its affiliates. All rights reserved. Authors: Suzanne Kinkead,
More informationIdentity Management. Presented by Richard Brown. November 2014. November 2014. MILCIS IdM
Identity Management Presented by Richard Brown Who is Cogito? Who are we? Why listen to us? Started as an information protection company working on the ADO PKI Moved into IdM as natural progression to
More informationDocumentation. CloudAnywhere. http://www.cloudiway.com. Page 1
Documentation CloudAnywhere http://www.cloudiway.com Page 1 Table of Contents 1 INTRODUCTION 3 2 OVERVIEW 4 2.1 KEY FUNCTIONALITY 4 2.2 PREREQUISITES 5 3 FEATURES 6 3.1 A UNIVERSAL PROVISIONING SOLUTION.
More information1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing
1 Introduction to Identity Management Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications An overview of business drivers and technology solutions. 2 Identity and Access Needs
More informationImplementing SAP E-Recruiting EHP4 at a Public Sector Customer
Implementing SAP E-Recruiting EHP4 at a Public Sector Customer Julia Yatskar, Suite Solution Management HCM Venki Krishnamoorthy, SAP Strategic Industries, Public Services May 16, 2011 Orlando Agenda 1.
More informationAdditionally, as a publicly traded company, there are regulatory compliance motivations.
Case Study Retail Industry Sage, TIM & TAM Author: Mark Funk, Trinity Solutions Senior Tivoli Consultant, with over 25 years of extensive experience in the Information Technology Industry with a excellent
More informationADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT
OMADA IDENTITY SUITE - Adaptable Identity Management and Access Governance Governance Compliance Identity Management Cloud Self-Service Security Complete control of who has access to what is an essential
More informationSAP Identity Management Connector Overview. SAP SE Walldorf, August 2015
SAP Identity Management Connector Overview SAP SE Walldorf, August 2015 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This
More informationQlikView's Value Proposition to SAP Accounts
QlikView's Value Proposition to SAP Accounts Key Themes and Agenda Time To Value Performance Total Cost of Ownership SAP Background QlikView and SAP Business Warehouse Business Objects Common Data Warehouse
More informationCourse 50382A: Implementing Forefront Identity Manager 2010 OVERVIEW
Course 50382A: Implementing Forefront Identity Manager 2010 OVERVIEW About this Course This four-day instructor-led courseintroduces and explains the features and capabilities of Microsoft Forefront Identity
More informationGovernance, Risk & Compliance for Public Sector
Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment
More informationREALTECH ChangePilot 1.0
1.0 (Version 2/2009) Introduction In times of globalization and rapid change, it is crucial for companies to adapt to changing conditions. Their agility is more and more determined by the ability of their
More informationOIM Business Acceleration. On-boarding Six Hundred Applications in Oracle Identity Management
OIM Business Acceleration On-boarding Six Hundred Applications in Oracle Identity Management CHAIN SYS Fast-Growing Technology and Solution Delivery Organization: Established in 1998. Strong Focus on Products,
More informationEnterprise Management Solutions Protection Profiles
Enterprise Management Solutions Protection Profiles Eric Winterton, Booz Allen Hamilton Joshua Brickman, CA Inc. September 2008 Copyright 2008 CA, Inc. and Booz Allen Hamilton. All rights reserved. All
More informationRegulatory Compliance Using Identity Management
Regulatory Compliance Using Identity Management 2015 Hitachi ID Systems, Inc. All rights reserved. Regulations such as Sarbanes-Oxley, FDA 21-CFR-11 and HSPD-12 require stronger security, to protect sensitive
More informationSEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
More informationAddressing the SAP Data Migration Challenges with SAP Netweaver XI
Addressing the SAP Data Migration Challenges with SAP Netweaver XI Executive Summary: Whether it is during the final phases of a new SAP implementation, during SAP upgrades and updates, during corporate
More informationPCI DSS Compliance: The Importance of Privileged Management. Marco Zhang marco_zhang@dell.com
PCI DSS Compliance: The Importance of Privileged Management Marco Zhang marco_zhang@dell.com What is a privileged account? 2 Lots of privileged accounts Network Devices Databases Servers Mainframes Applications
More informationAlex Wong Senior Manager - Product Management Bruce Ong Director - Product Management
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release
More informationSAP NetWeaver Identity
SAP NetWeaver SAP NetWeaver Identity Management: The Time Is Now Replace CUA Set a Strategic Course in User Administration CONTENT 4 Bring New Efficiency to Your User Administration 5 At Home in Every
More informationAndreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security
Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security Agenda Motivation SAP Threat Vectors / SAP Hack Solution Approach the 360 of agilesi Threat Detection Secenarios / SIEM use cases
More informationAIA Integration CRM On Demand to Quoting. NorCal OAUG Presentation January 21, 2009
AIA Integration CRM On Demand to Quoting NorCal OAUG Presentation January 21, 2009 Nicole Anderson Jill Vickers www.oacsi.com Agenda Introductions Project Objective and Scope Business Drivers and Benefits
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationStrategic Briefing Data Center Management & Automation
Strategic Briefing Data Center & Automation Contents Why is Data Center & Automation (DCMA) so important? 2 The Solution Pathway: Data Center and Automation 2 Identifying and Addressing the Challenges
More informationTrust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager (olaf.stullich@oracle.com) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
More informationITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes. October 2013
ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes October 2013 Disclaimer This presentation outlines our general product direction and should not be relied on in making
More informationService Orchestration
June 2015 Service Orchestration Infos and Use Cases Falko Dautel Robert Thullner Agenda + Overview + Use Cases & Demos VM Provisioning with ServiceNow Employee Onboarding + Summary + Questions & Answers
More informationIdentity & Access Management new complex so don t start?
IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach
More informationBUYER S GUIDE. Identity Management and Governance
BUYER S GUIDE Identity Management and Governance 2 BUYER S GUIDE: IDENTITY MANAGEMENT AND GOVERNANCE Overview For those charged with selecting all or part of their organization s Identity Management and
More information