NT III - Authentication and Authorisation Service

Size: px
Start display at page:

Download "NT III - Authentication and Authorisation Service"

Transcription

1 Tasmanian Cloud - Networking Tasmania Pre-Tender Consultation NT III - Authentication and Authorisation Service Scoping and implementation approach Department of Premier and Cabinet Office of e

2 CONTENTS 1 Purpose Background What are authentication and authorisation services Existing multi-agency authentication services NT III planning HR Systems Identity Integrated Business Intelligence Platform Proof of Concept Risks of current approach Objectives and scope Implementation risks Implementation approach Sponsorship Services Funding model Related initiatives Implementation timeframe Page 2 of 11

3 1 Purpose This paper summarises the proposed scope and objectives of the implementation of the Networking Tasmania (NT) III Authentication and Authorisation Service (AAS) which is part of the NT III project. For background on the NT III project, please refer to the Tasmanian Cloud Networking Tasmania Pre-Tender Consultation paper. This can be found on the TMD website: 2 Background 2.1 What are authentication and authorisation services Authentication and authorisation services are Information and Communication Technology (ICT) services that: Authenticate Authorise verify a known person (user), ICT service (e.g. application), or device is who/what they claim to be. For people, this is often achieved via the use of a user-id and password. provide access or use an ICT service. For example, allow user to utilise an ICT service. Authentication and authorisation services form part of identity management services. Other elements of identity management include the processes to manage staff changes, registration of new services and devices, provisioning of delegations and authorisations. Implementation of financial delegations in an ICT service, such as a finance system, is an example of identity management. 2.2 Existing multi-agency authentication services The diagram and table below outline current authentication and authorisation services that support the TMD managed whole of government services arrangements. Page 3 of 11

4 Figure 1 Current, disparate AAS arrangements for whole of government services Agency account and/or identity data Active Directory HR system IAM system Other CISCO ICE & Radius FIM View 500 (under NT II agreement) Radius CISCO NT II WiFi GDS NT II Remote Access ConnectV (telephony) Table 1 Current, disparate AAS arrangements for whole of government services Applications Service Technology white pages Directory Service 1 Service provider Data source(s) View500 Telstra Agency HR systems, data files Whole of Connect E Microsoft Forefront Identity Manager TMD Agency Active Directories Whole of telephony Connect V CISCO Anittel Manual process by agencies into a TMD/Anittel system Whole of government Wi-Fi service Wi-Fi CISCO ICE, Radius Telstra Agency Active Directories Remote access Remote access Radius Telstra Agency Active Directories In addition, there are many agency IT applications that routinely need to authenticate and authorise users from multiple agencies. Examples of these services are: 1 The GDS is not used as an authentication service, but is included in the table as its underlying business process to maintain the data and its technology platform are similar or the same as required by an authentication service. Page 4 of 11

5 Motor Registry System used by staff of Department of State Growth, Service Tasmania and Tasmania Police. Budget Management System access by selected staff from all agencies. The List s Common Operating Platform (COP) allows Tasmania s emergency services to collaboratively plan, respond, manage and help communities recover from emergency incidents. All of these services have costs to maintain and operate. This includes costs to maintain and support the IT service, but also the costs in maintaining separate user accounts, and the risk that staff movements may be overlooked. 2.3 NT III planning The planning for NT III proposed changing from a network model that determines network access based on a combination of agency and location to a model where network access is based on who the user, device or service actually is. It is anticipated that the new model will be gradually implemented over the term of the NT III agreements. The proposed model is an evolution of the access model implemented for the NT II Wi-Fi service by: Extending the NT access model to include wired, as well Wi-Fi connections. Creation of service zones that cross agency boundaries. Implementation of the Wi-Fi service required the development of an authentication service (see section 2.2 Existing multi-agency authentication services). Implementation of the NT III model will require additional functionality to this current NT II model. 2.4 HR Systems Identity Integrated Business Intelligence Platform Proof of Concept The Department of Premier and Cabinet undertook an Identity Integrated Business Intelligence Platform Proof of Concept Pilot during The Proof of Concept explored the feasibility of enabling an integrated access-control environment and reporting/analytics platform to give agencies better visibility of data relating to the services provided by TMD. This included exploring alternative reporting tools that provide improved self-service reporting by agencies. The key findings were: Current reporting and filtering arrangement prevents data level security causing high levels of manual management, large numbers of complex reports and filters. Thousands of manually managed reports and filters does not support self-service. Page 5 of 11

6 There is no automated way to link a user account to their current organisation unit, role or cost centre, and hence requires security filters to be placed upon what the user may view. 3 Risks of current approach The current approach has a number of risks and limitations including: Lack of capability and agility to support new cross agency and cross organisation services Increasing numbers of authentication and authorisation services in use across government to support multi-agency services, resulting in: o o o replication of costs replication of business processes increasing risk of poor levels of security controls Growing unsustainability of current services There are a number of drivers that have generated the current situation, these include: No obvious sustainable funding model for a broad government wide authentication and authorisation model. Lack of strategic coordination of service requirements, resulting in project teams implementing services that only meet their own immediate needs and are not extensible for other, like purposes. 4 Objectives and scope The objectives of the AAS are: 1. Provision of a service to enable government ICT services (including NT) to authenticate devices, applications and staff (using a single account or single signon), and to determine what they are authorised to do. 2. Support the authentication and authorisation requirements of cloud computing services purchased by agencies. 3. Ability to extend, or link with other related services. 4. Be extensible with affordable incremental development 5. To be able, where applicable, to include non-staff user accounts within the system and work with other services that authenticate and authorise non-staff accessing government ICT services. The initial scope of a new service includes: 1. A Meta directory to support the various authentication services. 2. Trusted bidirectional linking (for specified data elements) to agency Active Directories, or if an agency elects, alternate data sources. Page 6 of 11

7 3. Provision of a range of technical services such as Active Directory, LDAP, SAML 2.0, OpenID and OAuth. 4. Support for the requirements of NT III (e.g. general network access, Wi-Fi and remote access) and the -wide Connect service. The AAS must be extensible so that the quality and richness of the identity data held in the system can be improved and the range of services utilising the AAS can be expanded. This requirement extends the scope to include: 1. The ability to extend or populate the meta-directory to support new requirements. 2. The ability to link to more agency sources, such as existing agency HR systems and identity management services to improve the quality of the identity data. 3. Overtime it is expected that additional services will utilise the AAS service, such as the range of ICT services that are accessed by staff from multiple agencies. The scope excludes: 1. Full identity and access management (IAM), agencies will be responsible for providing and maintaining identity information to the AAS, including updating staff and provisioning services. 2. Services that utilise the AAS, noting that- (a) (b) NT III will utilise the service Over time the range of services utilising the AAS is expected to grow 5 Implementation risks Table 2 Risk overview for AAS Risk Impact Mitigation AAS technically too complex to implement. AAS too complex for agencies to provide and maintain data that is fit for purpose. AAS not ready to support initial requirements of the new NT III core. AAS unable to provide appropriate functionality. Initial service, while being extensible, sources the minimum data from each agency to support the initial service requirements. Where possible the initial data should be drawn from a single source from each agency. Have development path to build functionally. Stakeholder engagement and communications plan. Page 7 of 11

8 Risk Impact Mitigation Agencies not willing to utilise the AAS for other services Full business benefits of AAS not realised Ongoing program to build growth in the use of the service. Stakeholder engagement and communications plan. Overlap with proposed Business Intelligence Service initiatives Inability to support current and future emerging technical standards Failure to implement appropriate data standards in the meta directory Duplication of services and effort Service is unable to support current and future business requirements Reduced functionality and capability and/or increased operational costs Work with related projects to identify and capitalise overlaps. Stakeholder engagement and communications plan. Ensure research, specifications and procurement address current technical requirements and flexibility to add new and emerging standards as they emerge Include in implementation and ongoing maintenance a consultative framework and stream of work to establish, maintain and monitor data standards 6 Implementation approach 6.1 Sponsorship The AAS will require high level sponsorship and support. The following sponsorship model is proposed: Strategic business owner Agency ICT Reference Group Initial development business owner NT III Project Steering Committee Initial sponsor Chair of the NT III Project Steering Committee. 6.2 Services The diagram and table below describe how the AAS will be initially implemented and grow over time. Included in the diagram (sections in blue) and table are likely projects to build the service and improve its capability and potential uses of the service. Page 8 of 11

9 Figure 2 Proposed future AAS implementation and potential growth Agency account and/or identity data Active Directory HR system IAM system Other Meta data import engine NT III Authentication & Authorisation Service (AAS) AAS Meta directory Business Intelligence service AAS Services Active Directory LDAP OpenID OAuth SAML 2 NT III (inc Wi-Fi & remote access) ConnectV (telephony) GDS (White Pages) Other servcies Applications and services utilising the AAS Project key: NT III Procurement & Implementation Business Intelligence service Agency initiatives Page 9 of 11

10 Table 3 Proposed future NT III AAS arrangements for whole of government services Applications Service Technology white pages Service provider Data source(s) Whole of Whole of telephony NT III (eg Wi- Fi, LAN, remote access) Cloud services (SAML 2.0, OAuth) AAS Service interfaces include 2 factor authentication, Active Directory, LDAP, SAML 2.0, OAuth, OpenID To be determined, will include a meta directory To be determined To be determined, automatic data feed from agency systems/services. Evolve into IAM regime for government. Others as developed Additional services are able to be added over time. 6.3 Funding model It is intended that the AAS will form part of the NT III core services, as described in the document Tasmanian Cloud Networking Tasmania Pre-Tender Consultation. These core services have existing, established operational funding models. It is proposed that this model will be used to fund the operational costs of the AAS. Note that the funding of any implementation costs are yet to be determined. 6.4 Related initiatives Proposed Business Intelligence Service - the Department of Premier and Cabinet has been working on a pilot of an integrated identity management business intelligence service. The Directory Service (GDS) is a long standing service that has similar attributes as the AAS. Page 10 of 11

11 There are a number of overlaps between the GDS and the proposed Business Intelligence Service and the AAS such as: All three have a similar requirement for importing staff and related information from agencies. The current GDS processes are, for most agencies, cumbersome to manage and are not of a suitable quality to support an authentication and authorisation service. They have similar core meta directory requirements. The proposed Business Intelligence Service and, over time, the AAS will require information to support their particular business requirements. However, the uses of the information required will differ between all three: GDS is primarily a white pages phone directory, but can be expanded to provide other related services AAS is to authenticate and authorise access to government ICT services The Business Intelligence Service is, in the first instance, to assist in HR planning of agencies and government as a whole. 6.5 Implementation timeframe Table 4 Indicative implementation schedule Date Q Q1-Q Milestone Agreement to scope and implementation model Planning and market consultation 2016 Procurement of services 2016 Implementation of initial service requirements, and testing Q Critical milestone service capable of supporting the new NT III core. Page 11 of 11

PRE-TENDER CONSULTATION

PRE-TENDER CONSULTATION TASMANIAN CLOUD NETWORKING TASMANIA PRE-TENDER CONSULTATION November 2014 Networking Tasmania III Project CONTENTS Minister s Foreword... 3 1. Local ICT sector pre-tender consultation... 4 1.1 Purpose...

More information

Tasmanian Cloud & Government use of public cloud services

Tasmanian Cloud & Government use of public cloud services Tasmanian Cloud - Networking Tasmania Pre- Tender Consultation Tasmanian Cloud & Government use of public cloud services Scoping and implementation discussion paper Department of Premier and Cabinet Office

More information

Identity & Access Management

Identity & Access Management TY TI EN ID WHITE PAPER ON Identity & Access Management Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 IDENTITY AND ACCESS MANAGEMENT FRAMEWORK... 3 AUTHENTICATION... 3 AUTHORISATION...

More information

Project Management Fact Sheet:

Project Management Fact Sheet: Project Management Fact Sheet: Project Documentation Version: 2.2, November 2008 DISCLAIMER This material has been prepared for use by Tasmanian Government agencies and Instrumentalities. It follows that

More information

Ping Identity, Euro Cloud award entry

Ping Identity, Euro Cloud award entry Ping Identity, Euro Cloud award entry Category: Best Cloud Offering Product: PingFederate 6.6 About Ping Identity Ping Identity is the cloud identity security leader, specialising in cloud identity, security,

More information

Presentation to House Committee on Technology: HHS System Identity & Access Management

Presentation to House Committee on Technology: HHS System Identity & Access Management Presentation to House Committee on Technology: HHS System Identity & Access Management Bowden Hight Deputy Executive Commissioner Information Technology Services Health and Human Services Commission May

More information

Protect Everything: Networks, Applications and Cloud Services

Protect Everything: Networks, Applications and Cloud Services Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active

More information

People-Focused Access Management. Software Consulting Support Services

People-Focused Access Management. Software Consulting Support Services People-Focused Access Management Software Consulting Support Services A beautiful experience. Anytime, anywhere. Access: One is an industry-leading Access Management platform that provides you with versatile

More information

Tasmanian Government Web Publishing Framework. Tasmanian Government Web Domain Naming Guidelines

Tasmanian Government Web Publishing Framework. Tasmanian Government Web Domain Naming Guidelines Web Publishing Framework CONTENTS 1 Policy Context... 3 2 Introduction... 3 3 Purpose and Goals... 3 4 Rationale... 4 5 Scope... 4 6 Domain Name Management... 4 6.1 Domain Name Principles... 4 6.1.1 Consider

More information

Service Tasmania Unit

Service Tasmania Unit Service Tasmania Strategic Plan 2010-2015 1 Service Tasmania 2010-15 Strategic Plan Department of Premier and Cabinet Service Tasmania Unit Purpose The Service Tasmania Strategic Plan 2010-2015 identifies

More information

JOINT CORE STRATEGY PROGRAMME MANAGEMENT FRAMEWORK GOVERNANCE PROCESSES AND PROCEDURES. Draft

JOINT CORE STRATEGY PROGRAMME MANAGEMENT FRAMEWORK GOVERNANCE PROCESSES AND PROCEDURES. Draft APPENDIX 1 JOINT CORE STRATEGY PROGRAMME MANAGEMENT FRAMEWORK GOVERNANCE PROCESSES AND PROCEDURES Draft CONTENTS 1. INTRODUCTION 2. SCOPE 3. PROGRAMME AND PROJECT MANAGEMENT GOVERNANCE 4. PROGRAMME MANAGEMENT

More information

University of Southern California Identity and Access Management (IAM)

University of Southern California Identity and Access Management (IAM) University of Southern California Identity and Access Management (IAM) Brendan Bellina Identity Services Architect Mgr, Enterprise Middleware Development Information Technology Services University of Southern

More information

1 Executive Summary... 3. 2 Document Structure... 5. 3 Business Context... 6

1 Executive Summary... 3. 2 Document Structure... 5. 3 Business Context... 6 Contents 1 Executive Summary... 3 2 Document Structure... 5 3 Business Context... 6 4 Strategic Response... 8 4.1 Platform... 8 4.2 Network... 10 4.3 Unified Communications... 11 5 Implementation status...

More information

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014 Introduction to Identity and Access Management for the engineers Radovan Semančík April 2014 How it works now? Manager Admin Login Users Login Admin Login Login Login Theory Manager Admin Forgot password

More information

Project Management Fact Sheet:

Project Management Fact Sheet: Project Management Fact Sheet: Steering Committee nuts and bolts Version: 1.2, November 2008 DISCLAIMER This material has been prepared for use by Tasmanian Government agencies and Instrumentalities. It

More information

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Identity & Access Management in the Cloud: Fewer passwords, more productivity WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability

More information

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1 Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness

More information

Guideline on Implementing Cloud Identity and Access Management

Guideline on Implementing Cloud Identity and Access Management CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National

More information

FUNDING APPROVAL FOR IMPLEMENTATION OF CLOUD-BASED PRODUCTIVITY AND COLLABORATION TOOLS (OFFICE 365)

FUNDING APPROVAL FOR IMPLEMENTATION OF CLOUD-BASED PRODUCTIVITY AND COLLABORATION TOOLS (OFFICE 365) London Borough of Hammersmith & Fulham CABINET 2 NOVEMBER 2015 FUNDING APPROVAL FOR IMPLEMENTATION OF CLOUD-BASED PRODUCTIVITY AND COLLABORATION TOOLS (OFFICE 365) Report of the Leader - Councillor Stephen

More information

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted

More information

The Unique Alternative to the Big Four. Identity and Access Management

The Unique Alternative to the Big Four. Identity and Access Management The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing

More information

Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015

Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015 SMS PASSCODE 2015 Guide for implementing SMS PASSCODE protection with Palo Alto Networks. This document outlines the process of configuring a Palo Alto Networks GlobalProtect VPN with SMS PASSCODE RADIUS

More information

Tasmanian Government Identity and Access Management Toolkit

Tasmanian Government Identity and Access Management Toolkit Tasmanian Government Identity and Access Management Toolkit Summary January 2010 Department of Premier and Cabinet For further information on the Toolkit, contact the Office of egovernment: egovernment@dpac.tas.gov.au

More information

EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.

EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole. KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings pc@kuppingercole.com October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single

More information

Program and Budget Committee

Program and Budget Committee E WO/PBC/21/12 ORIGINAL: ENGLISH DATE: JULY 1, 2013 Program and Budget Committee Twenty-First Session Geneva, September 9 to 13, 2013 PROGRESS REPORT ON THE IMPLEMENTATION OF A COMPREHENSIVE INTEGRATED

More information

Identity and Access Management Memorial s Strategic Roadmap

Identity and Access Management Memorial s Strategic Roadmap Identity and Access Management Memorial s Strategic Roadmap Executive Summary January 29, 2015 Identity and Access Management Identity and Access Management (IAM) is an integrated system of policies, business

More information

The Human Capital Management Systems Business Case A Checklist to assist agencies developing a business case

The Human Capital Management Systems Business Case A Checklist to assist agencies developing a business case The Human Capital Management Systems Business Case A Checklist to assist agencies developing a business case Final version for release Human Capital Management See more at psc.nsw.gov.au/hcm Index - Business

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services

More information

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013 Government of Canada Directory Services Architecture Presentation to the Architecture Framework Advisory Committee November 4, 2013 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks Objective for

More information

CA Federation Manager

CA Federation Manager PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND

More information

- Identity & Access Management

- Identity & Access Management IBM Software Group NSHE - Identity & Access Management 2006 IBM Corporation Identity & Access Management Access Management and The Monitoring, Auditing and Reporting for Compliance So What s The Problem

More information

Google Apps. Google Apps. On Steroids. Extend Google Apps to your directory services. Extend Google Apps to your directory services

Google Apps. Google Apps. On Steroids. Extend Google Apps to your directory services. Extend Google Apps to your directory services Google Apps Google Apps On Steroids Extend Google Apps to your directory services Extend Google Apps to your directory services Google Apps On Steroids There has never been a better time in history to

More information

Microsoft Active Directory Project

Microsoft Active Directory Project Microsoft Active Directory Project Simcoe County District School Board Project Kick-off Meeting Rami Wehbe (Solution Architect) January 18, 2012 Agenda Introductions Project objectives and drivers Approach

More information

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner

More information

Strategic Identity Management for Industrial Control Systems

Strategic Identity Management for Industrial Control Systems Strategic Identity Management for Industrial Control Systems Justin Harvey Encari ICSJWG 2010 Spring Conference Ground Rules Sticking to vendor neutral Questions Welcome Email me for a copy of the deck:

More information

Federated Identity for Cloud Computing and Cross-organization Collaboration

Federated Identity for Cloud Computing and Cross-organization Collaboration Federated Identity for Cloud Computing and Cross-organization Collaboration Steve Moitozo Strategy and Architecture SIL International 20110616.2 (ICCM) Follow me @SteveMoitozo2 2 Huge Claims You want federated

More information

Fit for Future Back Office. Project Board Meeting 18 May 2012 Agenda Item 2.1. Mobile Device Strategy

Fit for Future Back Office. Project Board Meeting 18 May 2012 Agenda Item 2.1. Mobile Device Strategy Fit for Future Back Office Project Board Meeting 18 May 2012 Agenda Item 2.1 Mobile Device Strategy 1 Purpose 1.1 The purpose of this report is to; present for discussion and approval the proposed key

More information

BYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity

BYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity BYE BYE PASSWORDS The Future of Online Identity Hans Zandbelt Sr. Technical Architect CTO Office - Ping Identity 2015 Copyright 2014 Ping Identity Corp. All rights reserved. 1 Agenda 1 2 3 Cloud & Mobile:

More information

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2

More information

Use of Exchange Mail and Diary Service Code of Practice

Use of Exchange Mail and Diary Service Code of Practice Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are

More information

3Si Managed Authentication Services Service Description

3Si Managed Authentication Services Service Description 3Si Managed Authentication Services Service Description [Pick the date] 3Si Managed Authentication Services Service Description [Type the document subtitle] JT www.3sicloud.com www.3sicloud.com enquiry@3sicloud.com

More information

MY1LOGIN SOLUTION BRIEF: PROVISIONING. Automated Provisioning of Users Access to Apps

MY1LOGIN SOLUTION BRIEF: PROVISIONING. Automated Provisioning of Users Access to Apps MY1LOGIN SOLUTION BRIEF: PROVISIONING Automated Provisioning of Users Access to Apps MY1LOGIN SOLUTION BRIEF: PROVISIONING Automated Provisioning of Users Access to Apps The ability to centrally provision

More information

Understanding Enterprise Cloud Governance

Understanding Enterprise Cloud Governance Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination

More information

Microsoft Enterprise Project Management. James Wright Christopher Pond

Microsoft Enterprise Project Management. James Wright Christopher Pond Microsoft Enterprise Project Management James Wright Christopher Pond EPM Solution: Executive Overview and Discussion 1 Agenda 9:30 09:45 Introduction 9:45 10:45 Microsoft Project Server 2010 James Wright

More information

Administration Systems Plan. UCD IT Services. Seirbhísí TF UCD

Administration Systems Plan. UCD IT Services. Seirbhísí TF UCD Administration Systems Plan UCD IT Services Administrative Systems Plan All administrative areas within UCD have benefited from the deployment of a range of administrative back-end systems over the past

More information

4net Technologies. Managed Services and Cloud Solutions

4net Technologies. Managed Services and Cloud Solutions 4net Technologies Managed Services and Cloud Solutions Managed Services and Cloud Solutions Managed Services and Cloud Solutions are an opportunity for organisations to bring control to complexity by managing

More information

Project Appraisal and Scrutiny Committee Recommendation STRATEGY & RESOURCES 23 MARCH 2015

Project Appraisal and Scrutiny Committee Recommendation STRATEGY & RESOURCES 23 MARCH 2015 Cambridge City Council Project Appraisal and Scrutiny Committee Recommendation Project Name: Telecommunications To: Report by: Scrutiny committee: Wards affected: Recommendation/s Executive Councillor

More information

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise

More information

Identity Management. Presented by Richard Brown. November 2014. November 2014. MILCIS IdM

Identity Management. Presented by Richard Brown. November 2014. November 2014. MILCIS IdM Identity Management Presented by Richard Brown Who is Cogito? Who are we? Why listen to us? Started as an information protection company working on the ADO PKI Moved into IdM as natural progression to

More information

RSA enables rapid transformation of Identity and Access Governance processes

RSA enables rapid transformation of Identity and Access Governance processes RSA enables rapid transformation of Identity and Access Governance processes Sean Peasley, Principal Laxman Tathireddy, Senior Manager Deloitte & Touche LLP Cyber Risk Services Identity and Access Governance

More information

Telstra Service Management Framework. Your assurance of first-class network support

Telstra Service Management Framework. Your assurance of first-class network support Telstra Service Framework Your assurance of first-class network support The Service Framework delivers comprehensive, integrated support Service Frame work SERVICE IMPROVEMENT & REPORTING Performance &

More information

Project Management Fact Sheet:

Project Management Fact Sheet: Project Management Fact Sheet: Developing a Gantt Chart Version: 1.2, November 2008 DISCLAIMER This material has been prepared for use by Tasmanian Government agencies and Instrumentalities. It follows

More information

Career proposition for software developers and web operations engineers

Career proposition for software developers and web operations engineers Career proposition for software developers and web operations engineers Introduction The Government Digital Service is at the centre of the digital transformation of government, making information and

More information

Logicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device

Logicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Solutions & Services Are you struggling to support today

More information

Identity Governance Evolution

Identity Governance Evolution Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle

More information

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with

More information

SINGLE & SAME SIGN-ON ASPECTS

SINGLE & SAME SIGN-ON ASPECTS SINGLE & SAME SIGN-ON ASPECTS OF AZURE ACTIVE DIRECTORY Harold Baele Senior ICT Trainer JULY 2, 2015 SLIDE 1 TRAINER INFO Harold Baele MCT at RealDolmen Education Harold.baele@realdolmen.com - @hbaele

More information

Pick an Identity and Access Management Standard, Any

Pick an Identity and Access Management Standard, Any Pick an Identity and Access Management Standard, Any Standard Andras Cser Principal Analyst Forrester Research, Inc. O l F d ti I C bl f Only Federation Is Capable of Meeting the Identity and Access Management

More information

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

SECURITY AND REGULATORY COMPLIANCE OVERVIEW Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for

More information

Open Source Identity Management

Open Source Identity Management Open Source Management OpenAlt 2015 Radovan Semančík November 2015 Ing. Radovan Semančík, PhD. Software architect Co-owner of Evolveum (open source company) Architect of midpoint project Apache committer

More information

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

Can We Reconstruct How Identity is Managed on the Internet?

Can We Reconstruct How Identity is Managed on the Internet? Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand

More information

Identity and Access Management for the Hybrid Enterprise

Identity and Access Management for the Hybrid Enterprise Identity and Access Management for the Hybrid Enterprise Redmond Identity Summit 2014 Directories Devices Identity Keith Brintzenhofe Microsoft Corporation Thank You to our Sponsors Gold Silver Plus Silver

More information

The SAS Transformation Project Deploying SAS Customer Intelligence for a Single View of the Customer

The SAS Transformation Project Deploying SAS Customer Intelligence for a Single View of the Customer Paper 3353-2015 The SAS Transformation Project Deploying SAS Customer Intelligence for a Single View of the Customer ABSTRACT Pallavi Tyagi, Jack Miller and Navneet Tuteja, Slalom Consulting. Building

More information

The Scottish Wide Area Network Programme

The Scottish Wide Area Network Programme The Scottish Wide Area Network Release: Issued Version: 1.0 Date: 16/03/2015 Author: Andy Williamson Manager Owner: Anne Moises SRO Client: Board Version: Issued 1.0 Page 1 of 8 16/04/2015 Document Location

More information

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision

More information

Identity Access Management Guidelines

Identity Access Management Guidelines Tasmanian Government Identity and Access Management Toolkit Part 4 Identity Access Management Guidelines Department of Premier and Cabinet For further information on the Toolkit, contact the Office of

More information

Tasmanian Government. Introduction Workshop

Tasmanian Government. Introduction Workshop Tasmanian Government Project Management Framework Introduction Workshop Kathy Kuryl, Program Manager Inter Agency Policy and Projects Unit Workshop Purpose To introduce the basics of project management

More information

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM Toby Emden Vice President Strategy and Practices 2014 CONTENTS Evolution Business Drivers Provisioning

More information

White paper. Planning for SaaS Integration

White paper. Planning for SaaS Integration White paper Planning for SaaS Integration KEY PLANNING CONSIDERATIONS: Business Process Modeling Data Moderling and Mapping Data Ownership Integration Strategy Security Quality of Data (Data Cleansing)

More information

ICT Digital Transformation Programme

ICT Digital Transformation Programme Officer and Date Item Cabinet 11 th May 2016 Public ICT Digital Transformation Programme Responsible Officer: Clive Wright, Chief Executive Email: Clive.wright@shropshire.gov.uk Tel: 01743 252007 1.0 Summary

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

Federated Identity- and Access Management for the Max-Planck Society

Federated Identity- and Access Management for the Max-Planck Society Federated Identity- and Access Management for the Max-Planck Society Organisational Aspects & Funding Prof. Dr. Ramin Yahyapour Christof Pohl, Andreas Ißleiber GWDG Gesellschaft für wissenschaftliche Datenverarbeitung

More information

SMART Considerations for Active Directory Migration. A Strategic View and Best Practices for Migrating the Corporate Directory

SMART Considerations for Active Directory Migration. A Strategic View and Best Practices for Migrating the Corporate Directory SMART Considerations for Active Directory Migration A Strategic View and Best Practices for Migrating the Corporate Directory Table of Contents Introduction: The Strategic View of Active Directory Migrations...

More information

1.1 Approve the proposals for the roll-out of the new telephone system as set out in this report.

1.1 Approve the proposals for the roll-out of the new telephone system as set out in this report. APPENDIX L Agenda Item No. 13 REPLACEMENT OF TELEPHONE SYSTEM Councillor Cartwright Leader of the Council 1.0 Purpose The purpose of this paper is to recommend the progressive roll-out of new telephone

More information

The Principles of Audit Automation for Access Control

The Principles of Audit Automation for Access Control The Principles of Audit Automation for Access Control Redmond Identity Summit 2014 Directories Devices Identity Marvin Tansley Thank You to our Sponsors Gold Silver Plus Silver Agenda The Role of Identity

More information

Transatlantic Real-time Collaboration Proves Less Taxing for Top Accountancy Firm. Case Study: Frank Hirth

Transatlantic Real-time Collaboration Proves Less Taxing for Top Accountancy Firm. Case Study: Frank Hirth Transatlantic Real-time Collaboration Proves Less Taxing for Top Accountancy Firm Integrating its virtual desktop and Cisco IP phone infrastructures with Microsoft Lync 2013 enabled Frank Hirth to securely

More information

Voice and Data Convergence

Voice and Data Convergence Voice and Data Convergence Business Benefits and Deployment Strategy WHITEPAPER - MAY 2012 Data & Internet Voice & Mobile VOICE AND DATA COVERGENCE 2012 2 INTRODUCTION Over the past six years we have seen

More information

Secure Your Enterprise with Usher Mobile Identity

Secure Your Enterprise with Usher Mobile Identity Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize

More information

Oracle Taleo Cloud Service Global Price List October 9, 2014

Oracle Taleo Cloud Service Global Price List October 9, 2014 Oracle Taleo Cloud Service Global Price List October 9, 2014 change without notice. 1 of 6 Oracle Taleo Enterprise Cloud Service Subscription Services Pricing Taleo Enterprise Cloud Service Platform Taleo

More information

7/31/2013. » Project List» Individual Project Status» Future Updates this format, dashboard or written summary?» Questions. July 31th, 2013 3PM

7/31/2013. » Project List» Individual Project Status» Future Updates this format, dashboard or written summary?» Questions. July 31th, 2013 3PM July 31th, 2013 3PM» Project List» Individual Project Status» Future Updates this format, dashboard or written summary?» Questions 2 1 » ALL - Data Center Consolidation» ALL - SAP FIRST HR» LGL/ARA/HITS

More information

Swansea University. ICT Infrastructure Strategic Plan: 2015 2017

Swansea University. ICT Infrastructure Strategic Plan: 2015 2017 Swansea University ICT Infrastructure Strategic Plan: 2015 2017 Context ICT is essential for the University to achieve its ambitious expansion plans and to operate on a day today basis. IT underpins our

More information

Project Management Guidelines

Project Management Guidelines Tasmanian Government Project Management Guidelines Version 7.0 (July 2011) Department of Premier and Cabinet Publisher and Editor: Office of egovernment Department of Premier and Cabinet Tasmania Acknowledgments:

More information

DIGITAL STRATEGY 2014-2017

DIGITAL STRATEGY 2014-2017 DIGITAL STRATEGY 2014-2017 Digital Strategy CONTENTS Introduction 1 Our Vision 3 Benefits 5 Our Digital Design Principles 6 Our Strategy 8 Our Key Enablers 11 INTRODUCTION SFRS uses digital technology

More information

The 7 Deadly Sins of Failed Cloud Projects A WHITE PAPER

The 7 Deadly Sins of Failed Cloud Projects A WHITE PAPER The 7 Deadly Sins of Failed Cloud Projects A WHITE PAPER Executive Summary Cloud computing provides more choices than ever, putting increasing pressure on enterprise IT to satisfy the demands of their

More information

This report outlines the business case for the purchase of an integrated HR & Payroll system.

This report outlines the business case for the purchase of an integrated HR & Payroll system. Agenda Item No. 10 HR & Payroll system HR&OD Manager This report outlines the business case for the purchase of an integrated HR & Payroll system. Cabinet member(s): Garry Wheatley Ward(s) affected: All

More information

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment

More information

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an

More information

PROCUREMENT OF A PAYROLL SERVICE AND SYSTEM. Donna Reed, Director of Shared Services and Juli Oliver-Smith, Head of EK Human Resources

PROCUREMENT OF A PAYROLL SERVICE AND SYSTEM. Donna Reed, Director of Shared Services and Juli Oliver-Smith, Head of EK Human Resources Subject: PROCUREMENT OF A PAYROLL SERVICE AND SYSTEM Meeting and Date: Cabinet 3 March 2014 Scrutiny (Policy & Performance) Committee 11 March 2014 Joint Report of: Portfolio Holder: Decision Type: Classification:

More information

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory

More information

Appendix A: ICT and Information Management Strategy

Appendix A: ICT and Information Management Strategy Appendix A: ICT and Information Management 2014 2019 Head of Information and Business Change Sarah Caulkin October 2014 1 Version Control: Date Version Author Comments 04/08/14 0.1 Jo Harley First draft

More information

ONLINE SERVICES. Business and ICT Service Delivery Redefined

ONLINE SERVICES. Business and ICT Service Delivery Redefined ONLINE SERVICES Business and ICT Service Delivery Redefined RULES AND ROLES Even ten years ago, the rules and roles which governed the provision of ICT business services were very different. Business demands

More information

NSW Government. Wireless services (WiFi) Standard

NSW Government. Wireless services (WiFi) Standard NSW Government Wireless services (WiFi) Standard May 2014 CONTENTS 1. CONTEXT 2 1.1. Background 2 1.2. Purpose 2 1.3. Scope and application 2 2. STANDARDS GOVERNANCE 2 2.1. Standards to support the ICT

More information