Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology
|
|
- Brittney Fields
- 8 years ago
- Views:
Transcription
1 UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an increasingly complex regulatory environment demand a new approach to the University s core business processes and structure. In order to support this significant projected growth, UC must begin to put into place a New Business Architecture that will scale to meet the challenges driven by enrollment growth, technological advances, and the rising expectations of our constituents. As the New Business Architecture evolves to better support basic administrative operations, it will offer similar opportunities in the administration of such mission critical activities as sponsored research and student services. 1 In response to the UC 2010: A New Business Architecture report, UC Davis has established a New Business Architecture (NBA) Initiative, with a local steering committee co-chaired by Vice Chancellor, Janet Hamilton, and Vice Provost, John Bruno. The central component of the NBA Initiative is a Business Portal designed to implement integrated and streamlined user-centric services for students, faculty, and staff. Access to services must be provided through a common, Web enabled, enterprise portal. Legacy system services and new applications, implemented over top of our legacy systems, must be accessible via this common enterprise portal. A comprehensive middleware infrastructure is a centralized way to provide portal authentication, authorization, and personalization. The UC Davis information assets are distributed among a large number of administrative and academic computing systems making it difficult to achieve coordinated access to institutional data. It also complicates the delivery of effective decision support systems, since there is no single centralized representation of this information. As the UC Davis campus makes deeper commitments to the development and implementation a business portal, middleware, and Enterprise Directory Services (EDS) in particular, has emerged as a fundamental technological foundation. Current Situation We have made important strides at UC Davis with the development of MyUCDavis, an enterprise portal. MyUCDavis delivers functionality for students and faculty and is just beginning to provide for new business functionality. The development of new portal 1 UC 2010: A New Business Architecture, UNIVERSITY OF CALIFORNIA (Letterhead for interdepartmental use)
2 functionality will depend heavily on our ability to access and share information from our legacy administrative computing systems. Today at UC Davis, there are islands of information providing overlapping sources of person identity and attributes with varying levels of data currency, validity, integrity, and security. Some of the principle sources of identity and person information come from: The Account Management System, The Payroll Personnel System, The Student Information System, The Library Information System, The Advancement Information System, University Extension, HR systems, The Financial Information System, Campus billing systems, and The Telephone Directory. As a result of the independence of our legacy systems, each one tends to develop its own middleware infrastructure to support authentication, authorization, and workflow. This is insecure since we have to remember multiple account information (login IDs and passwords), various authorization schemes (each one different), and the separate workflow infrastructures. Information in the legacy systems is not shared and therefore suffers from inconsistencies (an address update in one system is not propagated to the others!). Ultimately, this becomes an increasing and unnecessary burden on students, faculty, and staff who must navigate among these legacy systems. Additionally, each of our legacy systems presents a different client-side access method. Some of our more recent systems are Web enabled, but many require downloading fat client-side software that varies from system-to-system and without a consistent user interface. The existence of Citrix servers is witness to the current state of affairs with fat clients and clients that fail to run on common desktop platforms. UC Davis has a directory lookup service for finding people. This directory service is built algorithmically by extracting person information from legacy systems and correlating this information. During this process, inconsistencies are found and business rules are used to resolve conflicts (not always correctly). While this process has been useful for providing a basic directory lookup, it is not used by any of the legacy systems to create unique person identification it is not an integral part of our legacy systems. Proposal Typically, administrative and academic services are organized in a function-centric manner the student information system, the financial information system, etc. As was indicated above, each system tends to have its own independent view of people, 2
3 authentication, authorization, and workflow and this creates barriers for accessing and sharing information. The key to creating a user-centric view of services is to provide an infrastructure that will facilitate the sharing of information among our functionally organized administrative computing systems. Enterprise Directory Services (EDS) are the most fundamental services of the middleware infrastructure and are designed to promote convenient and accurate access to legacy data. We are proposing to design and implement Enterprise Directory Services. Initially, this service will consist of two components: 1) a centralized Person Registry designed to maintain unique identification for all persons associated with UC Davis, and 2) a Directory containing additional person attributes suitable for implementing authentication, authorization, and workflow services. Additionally, an Identity Management Office will have to be established. The purpose of the office is to maintain the uniqueness of the entries in the Person Registry. Statement of Work Enterprise Directory Services are comprised of two components, the Person Registry and the Directory. The Person Registry will be based on a small collection identity attributes to verify identity and resolve any inconsistencies with existing historical Person Registry records. Work associated with the Person Registry includes the following: Work with campus constituencies to define the community to be included in the campus Person Registry. Identify the Registry data elements and business rules associated with these data. Identify sources of Registry information and work with system owners to integrate these data into the Registry. Work with system owners to develop plans for the adoption and integration of the Registry s unique person identifier into each administrative system. Design, implement, and develop processes to ensure that Registry entries are unique and unambiguous, and can be managed to ensure their integrity over time. The Person Registry is the key to creating and maintaining unique identification for all UC Davis constituents. As such, on-going project costs include an Identity Management Office that will be responsible for the campus identity management process. The campus Directory, the second component of our proposed Enterprise Directory Services, will maintain person and other management information on active campus constituents. It will receive cleansed or verified data from the Registry and obtain and provide consistent, centralized directory information to campus administrative systems. 3
4 Work associated with the Directory includes the following: Work with campus constituencies to define the Directory data elements and business rules associated with storing these data, necessary to support campus computing systems. Implement the protocols that will permit campus systems to use the Directory. The Directory must utilize standard protocols that ensure the broadest possible integration of campus business and academic applications. Work with campus system owners to adapt their systems to read and write directory records to the extent permitted by their applications and the campus security architecture. A summary of the project work plan is in Attachment 1. There are significant challenges. A centralized and authoritative Person Registry and Directory requires the commitment and engagement of all current administrative system owners. It also requires the adoption of these standards for future systems. In order to simplify the project we envision it in two phases where the first phase concentrates on integrating the Registry and Directory in one of the legacy administrative systems rather than all of them at once. It is conceivable that we would be able to handle more that one administrative system during the first phase, but this would depend on our ability to leverage the necessary resources. Critical Success Factors The following factors must occur for this project to succeed: 1. Creation and support of a middleware infrastructure that provides a common, highly available, redundant, and trusted Person Registry and Directory. 2. Development of an Identity Management process that assures an unambiguous identity for individuals. 3. Campus agreement on a common method to establish a trusted identity for individuals. 4. Full participation by the current and future major administrative systems in the development and use of the Person Registry and Directory. Project Risks 1. The most significant risk to the success of this project is the inability of the campus to adopt a common approach for identity management. If new and existing system providers are unwilling or unable to use the centralized Person Registry and Directory, the ability of the campus to successfully implement the New Business Architecture will be compromised. 4
5 The proposed project plan includes adequate analysis and design stages to fully explore the best practices associated with integrating existing administrative systems into the Registry and Directory. 2. Another significant risk is the availability of resources to assist with the construction of the Registry and Directory. Resources required for this project include management, technical development, and subject matter experts from many administrative computing systems. 3. A risk is inherent in our project schedule. It is paced to plan for input from each administrative system owner, allowing time to build consensus on the architecture for the exchange of directory data. The project team is aware that at least one system the Library has already purchased a system that expects a centralized directory service. Another system Banner s Student Information System plans to ship a new version in the next year, which also expects a centralized directory service. Other campuses have already encountered this misalignment of schedules for deploying a directory service and have resolved this problem with various temporary solutions. UC Davis may well face a similar situation in which a temporary solution can be employed prior to the full-scale rollout of the Person Registry and Directory. 5
6 Financial Analysis Project Totals One Time Costs Labor $36, $303, $153, $493, Hardware $36, $92, $129, Software $0.00 $125, $125, Training $6, $6, $12, Total per year $78, $527, $153, $759, On-Going Costs beginning in Hardware Replacement $34,000 Software Maintenance $50,000 Labor (3FTE) $241,500 Indirect costs, Identity Management Office $50,000 Total Annual Costs $375,500 Budget Assumptions Labor One-time labor costs are based on 2-fulltime programmer analysts, one project manager and one technical lead. On-going labor costs are based on 3 FTE for the management of an Identity Management Office: 1 manager and 2 fulltime programmers. Hardware One-time hardware costs include one development server and two desktop computers for development. On-going hardware costs assume 1 database and 1 LDAP server and 2 additional servers for redundancy. Software Software costs are based on estimates from the leading LDAP suppliers, namely SUN and Oracle. Training We expect to secure training for members of the core project team. Budget assumptions here are based on comparable training currently offered. 6
7 Attachment 1 PROJECT PLAN, Phase I Summary Project Initiation Stage Begin Date Estimates March 2002 Key Issues Identify the project charge, including The scope of the project, The costs and benefits, The core project team, Identify a cost benefit formula for infrastructure projects. Participants (participants remain constant over the duration of the project) John Bruno and Dave Shelby, project sponsors The NBA Technology Development Team (TDT), considered as part of the extended project team and the traditional Project Customer Advisory Committee. The IET component of the core project team: Randy Moory (technical lead), Sandra Stewart (project manager), 2 programmer analysts, Patrick Kelly (Database administrator and hardware specialist), and Jatinder Singh (technical architect). Deliverables 1. Pre-feasibility document completed. 2. Project Oversight Committee identified. 3. NBA Technology Development Team identified as the Customer Advisory Committee. 4. The Project Team identified, including (a) core EDS technical staff who will build the EDS and (b) technical people who will change their administrative systems to use the EDS. 5. Hardware and software environment identified for prototyping. 7
8 Analysis Stage Begin Date Estimates June, 2002 Key issues Review the Advanced Technology Workgroup report regarding the build of Registries and Directories. Organize and undergo training for the technical team. Review hardware and software solutions identified by the Advanced Technology Workgroup for long term (3 year) production-level support. Deliverables 1. Updated business requirements, including an analysis of feasible technical architectures. 2. Updated budget. 3. Draft schemas for the Registry and Directory. 4. Trial construction and loads of the Registry and the Directory for learning purposes. 8
9 Design Stage Begin Date Estimates November 2002 Key Issues Select the architecture and other configuration designs for long-term (3 years) production-level support. Select the development software for the construction of Enterprise Directory Services. This development software assumes long-term (3 years) production-level support. Select a best-fit integration with existing administrative systems, including the campus portal. Make design decisions for loading the Registry and Directory. Develop plans for one administrative system to integrate with the Registry and Directory. Develop resource plans for a Registry interface that allows administrative offices to access the centrally maintained Registry and Directory. This is particularly crucial for individual updates and data cleansing. Deliverables 1. Feasibility Study Report, including a cost benefit analysis 2. Finalized schemas and namespace for the Registry and Directory 3. Finalized architecture and topology of the Registry and Directory 4. Loaded Registry and Directory per the project team s decisions to date 5. Plans for the conversion of one mission critical system into the Registry and Directory. 6. Plans for the campus-wide coordination of data cleansing associated with multiple feeds into the Registry and the Directory. 9
10 Final Construction Stage Begin Date Estimates May 2003 Key Issues Identify a pilot administrative system to begin exchanging person data with the Directory, replacing its dependence on other disparate systems. Write functional and technical specifications for the load processes. Complete the programming that provides the exchange of person data between the Registry and the targeted administrative system. Complete the programming that provides the exchange of person data between the Registry and the Directory Complete the programming that provides the exchange of person data between the Directory and the targeted administrative system Determine the scope of subsequent administrative systems involvement. Develop a schedule for subsequent administrative systems to begin exchanging person data with the Registry and the Directory. Deliverables 1. Person Registry 2. Directory Service 3. The conversion of one mission critical administrative system, integrating it with the Registry and the Directory. 4. A plan for each additional administrative system to convert to the directory services 10
11 Deployment Stage Begin Date Estimates November 2003 Key Issues Develop a schedule for each system to integrate into the Registry and Directory. Develop a schedule for the de-commissioning of the existing account management system. Develop a Project Plan for Phase II implementation of Enterprise Directory Services as the central person repository for mission critical administrative systems. Develop a plan and budget to establish an Identity Management Office. Deliverables 1. The installation of the Directory as the campus computing accounts management system. 2. Plans and a proposed schedule for the de-commissioning of the legacy computing account management system. 3. Completion of a project plan for the implementation of Phase II for Enterprise Directory Services. 4. Completion of plans to establish the Identity Management Office. 11
12 Project Timeline, Phase I March Project initiation Key Deliverable Pre Feasibility Study Report June 2002 Key Deliverable November 2002 Key Deliverable May 2003 Key Deliverable November 2003 Key Deliverable -- Analysis Stage Draft schemas for the Registry and the Directory -- Design Stage Feasibility Study Report -- Final Construction The conversion of one administrative system to interface with UC Davis Registry and Directory -- Deployment Stage, End of Phase I Schedule for the replacement of additional disparate directory services currently embedded in existing administrative systems. 12
13 Attachment 2 Enterprise Directory Project Return on Investment Analysis Return on investment from implementing Enterprise Directory Services and the management of identities is significant. The EDS project team will adopt a similar approach and will seek assistance from the Graduate School of Management and one administrative unit that represents an average investment of time managing identity and directory information. Factors included in calculating a return on investment for Enterprise Directory Services include the following: o o o o Reduced Administrative Costs: Common attributes stored and resolved in most of our internal applications become available from centralized trusted sources. Attributes such as name, telephone, , address, office, department, etc become current and accurate for all the campus applications are available from one system. Processes to provision or transfer members of the community become simplified. Enhanced Productivity: Enterprise Directory Services and identity management make single sign on possible. Multiple user names and passwords for a single individual can be eliminated. Enterprise Directory Services also provide centralized policy-based controls enabling access to information and services, regardless of location or the device being used. Reduced help desk and technical support costs: User access to information and services is streamlined with Enterprise Directory Services. Dozens of separate access procedures are reduced to single sign-on. Application development for the New Business Architecture can rely on a trusted centralized source of information, rather than maintaining the directory and identity resolution internally. Enhance security: Tighter security for identity management is affordable in one location and minimizes the chance of intrusion by eliminating the multiple application-based registries. Centralized identity management and policy-based controls reduce the number of access points and ensure consistency in grants to this service. Osterman Research surveyed 40 organizations that adopted centralized identity management. With a median user base of 2500, these organizations reported and average cost saving and productivity gains of $2.49 million over 3 years. Gartner Group observed and reported significant savings in other organizations. An insurance company reported 40 percent ROI in a single year. 1
IET Application Infrastructure and Systems Development Powered by Specialized Project Management
IET Application Infrastructure and Systems Development Powered by Specialized Project Management Application Infrastructure and Systems Development (AISD) To realize the UC Davis vision for excellence,
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationCurrent Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support
Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version
More informationStephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15
Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an
More informationThe Identity Management Collaborative: Remote Middleware Support
NMI-EDIT Identity and Access Management Case Study Series The Identity Management Collaborative: Remote Middleware Support January 2006 NMI-EDIT Case Study Series In response to calls from the higher-education
More informationWeb Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
More informationIT Commons Enterprise Directory Services Project
Business Case and Funding Proposal IT Commons Enterprise Directory Services Project Table of Contents Executive Summary...3 Introduction...4 Statement of Opportunity...4 Current State of Directories...5
More informationHow To Build A New System For A College
Application Development Methodology The main objective of Enterprise Applications is to design, develop, and maintain quality software. This document out lines the requirements for requesting new systems,
More informationIDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator
IDENTITY MANAGEMENT ROLLOUT: IN A HURRY Jason Blackader, UNIX Systems Administrator Undergraduate, Graduate, Continuing Ed Industrial Design, Communication Design, Design Sciences, Arts & Media Two Campuses
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationHow To Create A Single Sign On For Blackboard
1 Overview Single Sign-On Authentication Appendix Blackboard s authentication technology has been identified as a dynamic, adaptable factor to supporting elearning Systems Integration strategy and implementation.
More informationOE RESOURCE REQUEST APPLICATION
OE RESOURCE REQUEST APPLICATION University of California, Berkeley I. SPONSORSHIP A. Initiative Initiative IT Infrastructure Initiative Manager Michael Mundrane Phone -6365 E-Mail mundrane@berkeley.edu
More informationServer-based Password Synchronization: Managing Multiple Passwords
Server-based Password Synchronization: Managing Multiple Passwords Self-service Password Reset Layer v.3.2-004 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax:
More informationLDAP Authentication Configuration Appendix
1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard
More informationEffective Practice: Integrating Vulnerability Scanning with Web Authentication
Effective Practice: Integrating Vulnerability Scanning with Web Authentication Submitting Institution: University of California, Davis Date Submitted: 8/2/2004 Category: Vulnerability Assessment Subject
More informationITX HELP DESK CONSULTANT PROGRAMMER I UCD / PROGRAMMER II UCD. This position is not represented by a collective bargaining unit
Position: (Working Title) Payroll Title: Number of Positions: Salary Advertised ITX HELP DESK CONSULTANT PROGRAMMER I UCD / PROGRAMMER II UCD Multiple I-$17.29-$31.13/Hr. II-$19.06-$34.30/Hr. Appointment
More informationAllidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
More informationHow to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully
How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully Table of Contents Introduction 1 The Methodology 1 Project Management 2 Project Phases 2 Certification Training
More informationGuide to Getting Started with the CommIT Pilot
Guide to Getting Started with the CommIT Pilot Fall 2013 2 Table of Contents What is the CommIT Pilot?... 3 What is the scope for the Pilot?... 3 What is the timeframe for the Pilot?... 5 What are the
More informationNovell to Microsoft Conversion: Identity Management Design & Plan
Novell to Microsoft Conversion: Identity Management Design & Plan Presented To: 3/2/2011 1215 Hamilton Lane, Suite 200 Naperville, IL 60540 www.morantechnology.com Voice & Fax: 877-212-6379 Version History
More informationManaging Workstations In an Active Directory Environment at PCC
Managing Workstations In an Active Directory Environment at PCC This document provides information about the implications of implementing Active Directory (AD) on the workstation management functions within
More informationInformation Technology Services. Roadmap 2014-2016
Information Technology Services Roadmap 2014-2016 Introduction This document charts the direction for Humboldt State University s Information Technology Services department over the next three years. It
More informationIdentity Management: Securing Information in the HIPAA Environment
Identity Management: Securing Information in the HIPAA Environment Mark Dixon Chief Identity Officer North American Software Line of Business Sun Microsystems 1 Agenda Challenges we Face Identity and Access
More informationCSG UCLA Enterprise Service Bus (ESB)
CSG UCLA Enterprise Service Bus (ESB) May 28, 2013 Draft Information Technology Services Enterprise Service Bus (ESB) The UCLA Enterprise Service Bus (ESB) is an application middleware solution designed
More informationHow Cisco IT Migrated to Microsoft Active Directory
How Cisco IT Migrated to Microsoft Active Directory Automated migration and provisioning tools reduce cost of migrating to Active Directory and simplify training and troubleshooting. Cisco IT Case Study
More informationAccess What are the HIT requirements to support recommendations of the Equity & Access Council to guard against under-service or patient selection?
HEALTH INFORMATION TECHNOLOGY (HIT) COUNCIL Charter This work group will develop for recommendation to the Healthcare Innovation Steering Committee, a proposal for HIT requirements 1 and technology components
More informationPasslogix Sign-On Platform
Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure
More informationPOSTX SECURE BUSINESS COMMUNICATION
POSTX SECURE BUSINESS COMMUNICATION Businesses must provide a secure and private environment for electronic communication INTRODUCTION As customers increasingly select the Internet as their preferred communication
More informationUnit Specific Questions Administrative
Unit Specific Questions Administrative Name of individual completing this report: Charles D. Warner E-mail address of individual completing this report: cwarner@shawnee.edu Goals and Mission 1. How are
More informationPROJECT CONTROL DOCUMENT
PROJECT CONTROL DOCUMENT PERSISTENT EMAIL (AKA EMAIL MODEL) EM-PCD-001 Draft 06/09/2004 Prepared by Don D Worth UCLA PERSISTENT EMAIL Copyright 2002-2004, The Regents of the University of California All
More information2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative. Improving State Operations: Kentucky
2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative Improving State Operations: Kentucky Kevin Moore 6/1/2011 Executive Summary: Accounts Payable was a time consuming, inefficient
More informationBackground (2013) Business Case. March 1 March 15 May 1 June 30 August 1-31
Project Overview Introduction This presentation outlines the University of Chicago s implementation of Workday Human Capital Management (HCM). Workday@UChicago, the University s first Human Resource Information
More informationERP Survey Questionnaire
0 ERP Survey Questionnaire Thank you for your participation in the EDUCAUSE study of Enterprise Resource Planning (ERP) systems. The survey is a key part of a major study on ERP in higher education in
More informationEasy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
More informationInstructional Technology Course Materials and Service Fee
Instructional Technology Course Materials and Service Fee University of California, Irvine October 14, 2011 PROBLEM STATEMENT Technology plays a critical role in university education, and students benefit
More informationWhite Pages Managed Service Solution Rapid Global Directory Implementation. White Paper
White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationOracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008
Oracle Business Intelligence Enterprise Edition LDAP-Security Administration White Paper by Shivaji Sekaramantri November 2008 OBIEE LDAP-Security Administration Before You Start... 3 Executive Overview...
More informationHow can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
More informationmanaging SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationState of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope
State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope State of Alaska Document ID: Title: Supersedes: Status: 1010 Enterprise Messaging and Directory Services Strategy Vision
More informationA Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12 and Oracle Fusion Applications
A Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12 and Oracle Fusion Applications John Stouffer Oracle E-Business ACE Independent Consultant 214 535 6847 john.w.stouffer@gmail.com
More informationProgram Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission
Program Summary DoIT provides and supports the infrastructure and custom development for NIU s core human resources system: The PeopleSoft Human Resources Management System (PS- HR) provides core functionality
More informationLeverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com
More informationData Management Standards
Overview The Provost s Office and the Office of Financial Affairs recognize the campus-wide need for broader and more robust access to institutional data to facilitate operations and inform strategic decision-making.
More informationWhy Data Governance - 1 -
Data Governance Why Data Governance - 1 - Industry: Lack of Data Governance is a Key Issue Faced During Projects As projects address process improvements, they encounter unidentified data processes that
More informationUNIVERSITY FLU PANDEMIC PLAN Preparation, Management and Recovery
UNIVERSITY FLU PANDEMIC PLAN Preparation, Management and Recovery Objectives The objectives of establishing and implementing a University Flu Pandemic Plan are: 1. to protect the physical, mental and overall
More informationEllucian CRM: platform overview
Ellucian CRM: platform overview Enterprise-class, higher education-specific Built for higher education Ellucian CRM is designed for colleges and universities and provides higher education-specific business
More informationBusiness-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
More informationChapter 6 Implementation Planning
Chapter 6 Planning Planning- Division into Work Packages The following are the recommended Work Packages Overall Change Programme Work Package 1 E-Cabinet Model Work Package 2 Security Policy Design Work
More informationBest Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital
Best Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital IDC Health Insights: Healthcare Provider IT Strategies BEST PRACTICES #HI238582
More informationUC Berkeley Campus Data Warehouse Governance and Delivery Organization Proposal Campus Data Warehouse / Business Intelligence Competency Center
Patrick McGrath, David A. Greenbaum IST Data Services In 2005, the UC Berkeley Data Stewardship Council sponsored a project to assess the feasibility, challenges and potential benefits of developing a
More informationAppendix B. California State University, Chico Office of the Vice Provost for Information Resources. Enterprise System - CMS 2006/2007 Annual Report
Appendix B Office of the Vice Provost for Information Resources Enterprise System - CMS 2006/2007 Annual Report August 2007 Introduction CSU, Chico completed the first phase of CMS administrative systems
More informationKMS Implementation Roadmap
KMS Implementation Roadmap Sample Excerpt Prepared by: The Knowledge Compass, Inc. TABLE OF CONTENTS 1. EXECUTIVE SUMMARY 5 1.1 Overview 5 1.2 Project Goals & Objectives 5 1.3 Implementation Approach 5
More informationOATH FAQ February 20, 2004
February 20, 2004 1. What is OATH? Due to identify theft, proliferation of IP devices and myriad of other trends in digital identity management the need for ubiquitous strong authentication is clear. Open
More informationUC Davis Web Content Management System (Web CMS) Terms of Use
UC Davis Web Content Management System (Web CMS) Terms of Use 1. Definitions of roles a. Clients: Schools, colleges, academic departments and programs, and administrative units and programs that use the
More informationWhitepaper: PeopleAdmin and Oracle PeopleSoft
Whitepaper: PeopleAdmin and Oracle PeopleSoft Executive Summary Organizations of higher education strive to acquire top talent, while facing a wide array of budgetary and technological challenges. The
More informationUC Irvine Information Technology Consolidation. Dana Roode UCI Office of Information Technology July 8, 2010 (updated 7/2012)
UC Irvine Information Technology Consolidation Dana Roode UCI Office of Information Technology July 8, 2010 (updated 7/2012) 1 UCI Big Ideas Workgroups (Early 2009) Established to look at key areas where
More informationArchitecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
More informationStandards for Developing and Implementing Administrative Systems at UC Davis
Page 1 of 7 Standards for Developing and Implementing Administrative Systems at UC Davis Introduction The purpose of this document is to describe Standards for Developing and Implementing Administrative
More informationThe Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
More informationProject Management RFQ 90058. Common Financial System: Security Consultant. Introduction. Environment Overview. The Common Financial System (CFS)
www.calstate.edu Common Financial System: Security Consultant Introduction The California State University (CSU), Office of the Chancellor seeks to identify a consulting partner for its Oracle Enterprise
More informationImmunization Information System (IIS) Help Desk Technician, Tier 2 Sample Role Description
Immunization Information System (IIS) Help Desk Technician, Tier 2 Sample Role Description March 2016 0 Note: This role description is meant to offer sample language and a comprehensive list of potential
More informationEndpoint Virtualization for Healthcare Providers
WHITE PAPER: xxxxxx BEST PRACTICES [00-Cover_Bar] FOR HEALTHCARE Endpoint Virtualization for Healthcare Providers Confidence in a connected world. White Paper: Best Practices for Healthcare Endpoint Virtualization
More informationWHITE PAPER Using SAP Solution Manager to Improve IT Staff Efficiency While Reducing IT Costs and Improving Availability
WHITE PAPER Using SAP Solution Manager to Improve IT Staff Efficiency While Reducing IT Costs and Improving Availability Sponsored by: SAP Elaina Stergiades November 2009 Eric Hatcher EXECUTIVE SUMMARY
More informationBUSINESS INTELLIGENCE
BUSINESS INTELLIGENCE Enabling Insights Across the Enterprise Patrick Callahan AST Corporation Practice Director Business Intelligence Naperville, Illinois USA 2011 Southern California Public Sector EBS
More informationHR Service Delivery: Campus Initiatives
HR Service Delivery: Campus Initiatives David Odato, UCSF Jeannine Raymond, UCB Ramona Agrela, UCI Karen Hull, UCD Facilitated by: Scott Bolman, Mercer University of California Human Resources December
More informationPPS Initiative Changing the Way We Work*
PPS Initiative Changing the Way We Work* Anthony Tony Lo Project Director Personnel Payroll Initiative Office of the President November 2011 * Includes Information developed by Aon Hewitt Project Consultant
More information1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
More informationA Unified Digital Campus:
A Unified Digital Campus: Marshall University s Solution Written By Terri L. Tomblin-Byrd Contributions by: Bradley Morgan Gary Weis Copyright Terri L. Tomblin-Byrd 2003. This work is the intellectual
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationIdentity Management Project Roadmap
2016 Hitachi ID Systems, Inc. All rights reserved. This document will guide you through the entire life of a successful Identity Management project, including: A needs analysis. Who to involve in the project.
More informationMassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management
MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management A Technical Best Practices White Paper About This Document This whitepaper explores the challenges
More informationHow To Improve Your Business
IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends
More informationProject Charter for ITPC-0375
9-16-2011 Page 1 of 12 Project Charter for ITPC-0375 Prepared by: Daryl Fritchey Project Name ITPC-0375 Identity and Access Management (IAM) Implementation IAM Executive Sponsors Chair Michael Hites, Executive
More informationTECHNICAL HIGHLIGHTS. September 16 th,2015 Oglethorpe D. oneusg
TECHNICAL HIGHLIGHTS September 16 th,2015 Oglethorpe D oneusg Constitution one set of uniform business procedures, policies and practices one technical platform / software solution one support team and
More informationUniversity of Houston-Downtown Information Technology
University of Houston-Downtown Information Technology Technology Road Map A Long-Term Technology Plan Hossein Shahrokhi Associate Vice President for Information Technology University of Houston-Downtown
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive
More informationFund 60030 Technology Infrastructure Services
Mission To provide a reliable and secure technology infrastructure foundation required to support County business processes and systems that strengthen the public service commitment of Fairfax County.
More informationCarleton College: Identity Management and Enterprise Directories at a Smaller Institution
NMI-EDIT Identity and Access Management Case Study Series Carleton College: Identity Management and Enterprise Directories at a Smaller Institution September 2004 NMI-EDIT Case Study Series In response
More informationNOMINATION FORM. Category for judging: 5 - Digital Government: Government to Government (G to G)
NOMINATION FORM Title of Nomination: Project/System Manager: Job Title: Agency: Enterprise Technology Service Desk Elizabeth Dignan Program Manager State Technology Office Department: Address: 4030 Esplanade
More informationEnterprise Security Administrative Computing and Telecommunications Audit & Management Advisory Services Project 2014-05
SAN DIEGO: AUDIT & MANAGEMENT ADVISORY SERVICES 0919 Min Yao Assistant Vice Chancellor Administrative Computing and Telecommunications 0928 August 27, 2014 Subject: Enterprise Security Administrative Computing
More informationBusiness and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis
Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that
More informationStrategic Plan FY 2014-2016
Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION
More informationA Provance White Paper
The Benefits of Combined IT Service Management and IT Asset Management A Provance White Paper Contents Introduction... 3 IT Service Management... 3 IT Asset Management... 4 People... 4 Processes... 5 Shared
More informationHow To Create A Help Desk For A System Center System Manager
System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Optimizing Infrastructure: The Relationship Between IT Labor Costs and Best Practices for Identity and Access Management with Active Directory Sponsored by: Microsoft Al Gillen Randy Perry
More informationUCD IT ARCHITECTURE. Executive Summary (2004-2008)
UCD IT ARCHITECTURE Executive Summary (2004-2008) Prepared by: On behalf of: UCD Computing Services Date: January 2004 Unit 2054 Citywest Business Campus Dublin 24, Ireland. Tel: +353-1-642 0100 Fax: +353-1-642
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive
More informationScope of Work Microsoft Infrastructure Upgrade
Introduction Scope of Work Microsoft Infrastructure Upgrade The University of Texas M. D. Anderson Cancer Center (M. D. Anderson) in Houston, Texas, celebrating six decades of Making Cancer History, is
More informationMaster Data Governance Hub
January 2013 Master Data Governance The Role of a Master Data Governance (415) 449-0565 www.gainesolutions.com TABLE OF CONTENTS Introduction Evolution of MDM Architecture Initial Deployment Evolution
More informationAppendix B: Statewide TCO Technical Support Guideline Comparison
Appendix B: Statewide TCO Technical Support Guideline Comparison Overview: The California Community College Chancellor s Office (CCCCO) has developed a Statewide Technology Plan commonly referred to as
More informationMITEL. Enterprise Management Solutions
MITEL Enterprise Management Solutions Results-driven Enterprise Wide Management Solutions As business requirements evolve, today s intelligent IP-voice networks are responding by delivering more targeted
More informationWHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION
WHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION Executive Overview The explosion of devices laptops, desktops and now the plethora of mobile devices has left enterprises
More informationLeveraging MassTransit and Active Directory for Easier Account Provisioning and Management
Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management A Technical Best Practices White Paper Group Logic White Paper November 2008 About This Document This whitepaper
More informationApplication for the 2005 Larry L. Sautter Award For Innovation in Information Technology
Application for the 2005 Larry L. Sautter Award For Innovation in Information Technology SUMMARY Quick Temp https://apps.adcom.uci.edu/expresso5/apps/components/quicktemp/login.jsp is a web-based system
More informationSpeeding Office 365 Implementation Using Identity-as-a-Service
August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com
More information