Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

Size: px
Start display at page:

Download "Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology"

Transcription

1 UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an increasingly complex regulatory environment demand a new approach to the University s core business processes and structure. In order to support this significant projected growth, UC must begin to put into place a New Business Architecture that will scale to meet the challenges driven by enrollment growth, technological advances, and the rising expectations of our constituents. As the New Business Architecture evolves to better support basic administrative operations, it will offer similar opportunities in the administration of such mission critical activities as sponsored research and student services. 1 In response to the UC 2010: A New Business Architecture report, UC Davis has established a New Business Architecture (NBA) Initiative, with a local steering committee co-chaired by Vice Chancellor, Janet Hamilton, and Vice Provost, John Bruno. The central component of the NBA Initiative is a Business Portal designed to implement integrated and streamlined user-centric services for students, faculty, and staff. Access to services must be provided through a common, Web enabled, enterprise portal. Legacy system services and new applications, implemented over top of our legacy systems, must be accessible via this common enterprise portal. A comprehensive middleware infrastructure is a centralized way to provide portal authentication, authorization, and personalization. The UC Davis information assets are distributed among a large number of administrative and academic computing systems making it difficult to achieve coordinated access to institutional data. It also complicates the delivery of effective decision support systems, since there is no single centralized representation of this information. As the UC Davis campus makes deeper commitments to the development and implementation a business portal, middleware, and Enterprise Directory Services (EDS) in particular, has emerged as a fundamental technological foundation. Current Situation We have made important strides at UC Davis with the development of MyUCDavis, an enterprise portal. MyUCDavis delivers functionality for students and faculty and is just beginning to provide for new business functionality. The development of new portal 1 UC 2010: A New Business Architecture, UNIVERSITY OF CALIFORNIA (Letterhead for interdepartmental use)

2 functionality will depend heavily on our ability to access and share information from our legacy administrative computing systems. Today at UC Davis, there are islands of information providing overlapping sources of person identity and attributes with varying levels of data currency, validity, integrity, and security. Some of the principle sources of identity and person information come from: The Account Management System, The Payroll Personnel System, The Student Information System, The Library Information System, The Advancement Information System, University Extension, HR systems, The Financial Information System, Campus billing systems, and The Telephone Directory. As a result of the independence of our legacy systems, each one tends to develop its own middleware infrastructure to support authentication, authorization, and workflow. This is insecure since we have to remember multiple account information (login IDs and passwords), various authorization schemes (each one different), and the separate workflow infrastructures. Information in the legacy systems is not shared and therefore suffers from inconsistencies (an address update in one system is not propagated to the others!). Ultimately, this becomes an increasing and unnecessary burden on students, faculty, and staff who must navigate among these legacy systems. Additionally, each of our legacy systems presents a different client-side access method. Some of our more recent systems are Web enabled, but many require downloading fat client-side software that varies from system-to-system and without a consistent user interface. The existence of Citrix servers is witness to the current state of affairs with fat clients and clients that fail to run on common desktop platforms. UC Davis has a directory lookup service for finding people. This directory service is built algorithmically by extracting person information from legacy systems and correlating this information. During this process, inconsistencies are found and business rules are used to resolve conflicts (not always correctly). While this process has been useful for providing a basic directory lookup, it is not used by any of the legacy systems to create unique person identification it is not an integral part of our legacy systems. Proposal Typically, administrative and academic services are organized in a function-centric manner the student information system, the financial information system, etc. As was indicated above, each system tends to have its own independent view of people, 2

3 authentication, authorization, and workflow and this creates barriers for accessing and sharing information. The key to creating a user-centric view of services is to provide an infrastructure that will facilitate the sharing of information among our functionally organized administrative computing systems. Enterprise Directory Services (EDS) are the most fundamental services of the middleware infrastructure and are designed to promote convenient and accurate access to legacy data. We are proposing to design and implement Enterprise Directory Services. Initially, this service will consist of two components: 1) a centralized Person Registry designed to maintain unique identification for all persons associated with UC Davis, and 2) a Directory containing additional person attributes suitable for implementing authentication, authorization, and workflow services. Additionally, an Identity Management Office will have to be established. The purpose of the office is to maintain the uniqueness of the entries in the Person Registry. Statement of Work Enterprise Directory Services are comprised of two components, the Person Registry and the Directory. The Person Registry will be based on a small collection identity attributes to verify identity and resolve any inconsistencies with existing historical Person Registry records. Work associated with the Person Registry includes the following: Work with campus constituencies to define the community to be included in the campus Person Registry. Identify the Registry data elements and business rules associated with these data. Identify sources of Registry information and work with system owners to integrate these data into the Registry. Work with system owners to develop plans for the adoption and integration of the Registry s unique person identifier into each administrative system. Design, implement, and develop processes to ensure that Registry entries are unique and unambiguous, and can be managed to ensure their integrity over time. The Person Registry is the key to creating and maintaining unique identification for all UC Davis constituents. As such, on-going project costs include an Identity Management Office that will be responsible for the campus identity management process. The campus Directory, the second component of our proposed Enterprise Directory Services, will maintain person and other management information on active campus constituents. It will receive cleansed or verified data from the Registry and obtain and provide consistent, centralized directory information to campus administrative systems. 3

4 Work associated with the Directory includes the following: Work with campus constituencies to define the Directory data elements and business rules associated with storing these data, necessary to support campus computing systems. Implement the protocols that will permit campus systems to use the Directory. The Directory must utilize standard protocols that ensure the broadest possible integration of campus business and academic applications. Work with campus system owners to adapt their systems to read and write directory records to the extent permitted by their applications and the campus security architecture. A summary of the project work plan is in Attachment 1. There are significant challenges. A centralized and authoritative Person Registry and Directory requires the commitment and engagement of all current administrative system owners. It also requires the adoption of these standards for future systems. In order to simplify the project we envision it in two phases where the first phase concentrates on integrating the Registry and Directory in one of the legacy administrative systems rather than all of them at once. It is conceivable that we would be able to handle more that one administrative system during the first phase, but this would depend on our ability to leverage the necessary resources. Critical Success Factors The following factors must occur for this project to succeed: 1. Creation and support of a middleware infrastructure that provides a common, highly available, redundant, and trusted Person Registry and Directory. 2. Development of an Identity Management process that assures an unambiguous identity for individuals. 3. Campus agreement on a common method to establish a trusted identity for individuals. 4. Full participation by the current and future major administrative systems in the development and use of the Person Registry and Directory. Project Risks 1. The most significant risk to the success of this project is the inability of the campus to adopt a common approach for identity management. If new and existing system providers are unwilling or unable to use the centralized Person Registry and Directory, the ability of the campus to successfully implement the New Business Architecture will be compromised. 4

5 The proposed project plan includes adequate analysis and design stages to fully explore the best practices associated with integrating existing administrative systems into the Registry and Directory. 2. Another significant risk is the availability of resources to assist with the construction of the Registry and Directory. Resources required for this project include management, technical development, and subject matter experts from many administrative computing systems. 3. A risk is inherent in our project schedule. It is paced to plan for input from each administrative system owner, allowing time to build consensus on the architecture for the exchange of directory data. The project team is aware that at least one system the Library has already purchased a system that expects a centralized directory service. Another system Banner s Student Information System plans to ship a new version in the next year, which also expects a centralized directory service. Other campuses have already encountered this misalignment of schedules for deploying a directory service and have resolved this problem with various temporary solutions. UC Davis may well face a similar situation in which a temporary solution can be employed prior to the full-scale rollout of the Person Registry and Directory. 5

6 Financial Analysis Project Totals One Time Costs Labor $36, $303, $153, $493, Hardware $36, $92, $129, Software $0.00 $125, $125, Training $6, $6, $12, Total per year $78, $527, $153, $759, On-Going Costs beginning in Hardware Replacement $34,000 Software Maintenance $50,000 Labor (3FTE) $241,500 Indirect costs, Identity Management Office $50,000 Total Annual Costs $375,500 Budget Assumptions Labor One-time labor costs are based on 2-fulltime programmer analysts, one project manager and one technical lead. On-going labor costs are based on 3 FTE for the management of an Identity Management Office: 1 manager and 2 fulltime programmers. Hardware One-time hardware costs include one development server and two desktop computers for development. On-going hardware costs assume 1 database and 1 LDAP server and 2 additional servers for redundancy. Software Software costs are based on estimates from the leading LDAP suppliers, namely SUN and Oracle. Training We expect to secure training for members of the core project team. Budget assumptions here are based on comparable training currently offered. 6

7 Attachment 1 PROJECT PLAN, Phase I Summary Project Initiation Stage Begin Date Estimates March 2002 Key Issues Identify the project charge, including The scope of the project, The costs and benefits, The core project team, Identify a cost benefit formula for infrastructure projects. Participants (participants remain constant over the duration of the project) John Bruno and Dave Shelby, project sponsors The NBA Technology Development Team (TDT), considered as part of the extended project team and the traditional Project Customer Advisory Committee. The IET component of the core project team: Randy Moory (technical lead), Sandra Stewart (project manager), 2 programmer analysts, Patrick Kelly (Database administrator and hardware specialist), and Jatinder Singh (technical architect). Deliverables 1. Pre-feasibility document completed. 2. Project Oversight Committee identified. 3. NBA Technology Development Team identified as the Customer Advisory Committee. 4. The Project Team identified, including (a) core EDS technical staff who will build the EDS and (b) technical people who will change their administrative systems to use the EDS. 5. Hardware and software environment identified for prototyping. 7

8 Analysis Stage Begin Date Estimates June, 2002 Key issues Review the Advanced Technology Workgroup report regarding the build of Registries and Directories. Organize and undergo training for the technical team. Review hardware and software solutions identified by the Advanced Technology Workgroup for long term (3 year) production-level support. Deliverables 1. Updated business requirements, including an analysis of feasible technical architectures. 2. Updated budget. 3. Draft schemas for the Registry and Directory. 4. Trial construction and loads of the Registry and the Directory for learning purposes. 8

9 Design Stage Begin Date Estimates November 2002 Key Issues Select the architecture and other configuration designs for long-term (3 years) production-level support. Select the development software for the construction of Enterprise Directory Services. This development software assumes long-term (3 years) production-level support. Select a best-fit integration with existing administrative systems, including the campus portal. Make design decisions for loading the Registry and Directory. Develop plans for one administrative system to integrate with the Registry and Directory. Develop resource plans for a Registry interface that allows administrative offices to access the centrally maintained Registry and Directory. This is particularly crucial for individual updates and data cleansing. Deliverables 1. Feasibility Study Report, including a cost benefit analysis 2. Finalized schemas and namespace for the Registry and Directory 3. Finalized architecture and topology of the Registry and Directory 4. Loaded Registry and Directory per the project team s decisions to date 5. Plans for the conversion of one mission critical system into the Registry and Directory. 6. Plans for the campus-wide coordination of data cleansing associated with multiple feeds into the Registry and the Directory. 9

10 Final Construction Stage Begin Date Estimates May 2003 Key Issues Identify a pilot administrative system to begin exchanging person data with the Directory, replacing its dependence on other disparate systems. Write functional and technical specifications for the load processes. Complete the programming that provides the exchange of person data between the Registry and the targeted administrative system. Complete the programming that provides the exchange of person data between the Registry and the Directory Complete the programming that provides the exchange of person data between the Directory and the targeted administrative system Determine the scope of subsequent administrative systems involvement. Develop a schedule for subsequent administrative systems to begin exchanging person data with the Registry and the Directory. Deliverables 1. Person Registry 2. Directory Service 3. The conversion of one mission critical administrative system, integrating it with the Registry and the Directory. 4. A plan for each additional administrative system to convert to the directory services 10

11 Deployment Stage Begin Date Estimates November 2003 Key Issues Develop a schedule for each system to integrate into the Registry and Directory. Develop a schedule for the de-commissioning of the existing account management system. Develop a Project Plan for Phase II implementation of Enterprise Directory Services as the central person repository for mission critical administrative systems. Develop a plan and budget to establish an Identity Management Office. Deliverables 1. The installation of the Directory as the campus computing accounts management system. 2. Plans and a proposed schedule for the de-commissioning of the legacy computing account management system. 3. Completion of a project plan for the implementation of Phase II for Enterprise Directory Services. 4. Completion of plans to establish the Identity Management Office. 11

12 Project Timeline, Phase I March Project initiation Key Deliverable Pre Feasibility Study Report June 2002 Key Deliverable November 2002 Key Deliverable May 2003 Key Deliverable November 2003 Key Deliverable -- Analysis Stage Draft schemas for the Registry and the Directory -- Design Stage Feasibility Study Report -- Final Construction The conversion of one administrative system to interface with UC Davis Registry and Directory -- Deployment Stage, End of Phase I Schedule for the replacement of additional disparate directory services currently embedded in existing administrative systems. 12

13 Attachment 2 Enterprise Directory Project Return on Investment Analysis Return on investment from implementing Enterprise Directory Services and the management of identities is significant. The EDS project team will adopt a similar approach and will seek assistance from the Graduate School of Management and one administrative unit that represents an average investment of time managing identity and directory information. Factors included in calculating a return on investment for Enterprise Directory Services include the following: o o o o Reduced Administrative Costs: Common attributes stored and resolved in most of our internal applications become available from centralized trusted sources. Attributes such as name, telephone, , address, office, department, etc become current and accurate for all the campus applications are available from one system. Processes to provision or transfer members of the community become simplified. Enhanced Productivity: Enterprise Directory Services and identity management make single sign on possible. Multiple user names and passwords for a single individual can be eliminated. Enterprise Directory Services also provide centralized policy-based controls enabling access to information and services, regardless of location or the device being used. Reduced help desk and technical support costs: User access to information and services is streamlined with Enterprise Directory Services. Dozens of separate access procedures are reduced to single sign-on. Application development for the New Business Architecture can rely on a trusted centralized source of information, rather than maintaining the directory and identity resolution internally. Enhance security: Tighter security for identity management is affordable in one location and minimizes the chance of intrusion by eliminating the multiple application-based registries. Centralized identity management and policy-based controls reduce the number of access points and ensure consistency in grants to this service. Osterman Research surveyed 40 organizations that adopted centralized identity management. With a median user base of 2500, these organizations reported and average cost saving and productivity gains of $2.49 million over 3 years. Gartner Group observed and reported significant savings in other organizations. An insurance company reported 40 percent ROI in a single year. 1

IET Application Infrastructure and Systems Development Powered by Specialized Project Management

IET Application Infrastructure and Systems Development Powered by Specialized Project Management IET Application Infrastructure and Systems Development Powered by Specialized Project Management Application Infrastructure and Systems Development (AISD) To realize the UC Davis vision for excellence,

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support

Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version

More information

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15 Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an

More information

The Identity Management Collaborative: Remote Middleware Support

The Identity Management Collaborative: Remote Middleware Support NMI-EDIT Identity and Access Management Case Study Series The Identity Management Collaborative: Remote Middleware Support January 2006 NMI-EDIT Case Study Series In response to calls from the higher-education

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

IT Commons Enterprise Directory Services Project

IT Commons Enterprise Directory Services Project Business Case and Funding Proposal IT Commons Enterprise Directory Services Project Table of Contents Executive Summary...3 Introduction...4 Statement of Opportunity...4 Current State of Directories...5

More information

How To Build A New System For A College

How To Build A New System For A College Application Development Methodology The main objective of Enterprise Applications is to design, develop, and maintain quality software. This document out lines the requirements for requesting new systems,

More information

IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator

IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator IDENTITY MANAGEMENT ROLLOUT: IN A HURRY Jason Blackader, UNIX Systems Administrator Undergraduate, Graduate, Continuing Ed Industrial Design, Communication Design, Design Sciences, Arts & Media Two Campuses

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

How To Create A Single Sign On For Blackboard

How To Create A Single Sign On For Blackboard 1 Overview Single Sign-On Authentication Appendix Blackboard s authentication technology has been identified as a dynamic, adaptable factor to supporting elearning Systems Integration strategy and implementation.

More information

OE RESOURCE REQUEST APPLICATION

OE RESOURCE REQUEST APPLICATION OE RESOURCE REQUEST APPLICATION University of California, Berkeley I. SPONSORSHIP A. Initiative Initiative IT Infrastructure Initiative Manager Michael Mundrane Phone -6365 E-Mail mundrane@berkeley.edu

More information

Server-based Password Synchronization: Managing Multiple Passwords

Server-based Password Synchronization: Managing Multiple Passwords Server-based Password Synchronization: Managing Multiple Passwords Self-service Password Reset Layer v.3.2-004 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax:

More information

LDAP Authentication Configuration Appendix

LDAP Authentication Configuration Appendix 1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard

More information

Effective Practice: Integrating Vulnerability Scanning with Web Authentication

Effective Practice: Integrating Vulnerability Scanning with Web Authentication Effective Practice: Integrating Vulnerability Scanning with Web Authentication Submitting Institution: University of California, Davis Date Submitted: 8/2/2004 Category: Vulnerability Assessment Subject

More information

ITX HELP DESK CONSULTANT PROGRAMMER I UCD / PROGRAMMER II UCD. This position is not represented by a collective bargaining unit

ITX HELP DESK CONSULTANT PROGRAMMER I UCD / PROGRAMMER II UCD. This position is not represented by a collective bargaining unit Position: (Working Title) Payroll Title: Number of Positions: Salary Advertised ITX HELP DESK CONSULTANT PROGRAMMER I UCD / PROGRAMMER II UCD Multiple I-$17.29-$31.13/Hr. II-$19.06-$34.30/Hr. Appointment

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully

How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully Table of Contents Introduction 1 The Methodology 1 Project Management 2 Project Phases 2 Certification Training

More information

Guide to Getting Started with the CommIT Pilot

Guide to Getting Started with the CommIT Pilot Guide to Getting Started with the CommIT Pilot Fall 2013 2 Table of Contents What is the CommIT Pilot?... 3 What is the scope for the Pilot?... 3 What is the timeframe for the Pilot?... 5 What are the

More information

Novell to Microsoft Conversion: Identity Management Design & Plan

Novell to Microsoft Conversion: Identity Management Design & Plan Novell to Microsoft Conversion: Identity Management Design & Plan Presented To: 3/2/2011 1215 Hamilton Lane, Suite 200 Naperville, IL 60540 www.morantechnology.com Voice & Fax: 877-212-6379 Version History

More information

Managing Workstations In an Active Directory Environment at PCC

Managing Workstations In an Active Directory Environment at PCC Managing Workstations In an Active Directory Environment at PCC This document provides information about the implications of implementing Active Directory (AD) on the workstation management functions within

More information

Information Technology Services. Roadmap 2014-2016

Information Technology Services. Roadmap 2014-2016 Information Technology Services Roadmap 2014-2016 Introduction This document charts the direction for Humboldt State University s Information Technology Services department over the next three years. It

More information

Identity Management: Securing Information in the HIPAA Environment

Identity Management: Securing Information in the HIPAA Environment Identity Management: Securing Information in the HIPAA Environment Mark Dixon Chief Identity Officer North American Software Line of Business Sun Microsystems 1 Agenda Challenges we Face Identity and Access

More information

CSG UCLA Enterprise Service Bus (ESB)

CSG UCLA Enterprise Service Bus (ESB) CSG UCLA Enterprise Service Bus (ESB) May 28, 2013 Draft Information Technology Services Enterprise Service Bus (ESB) The UCLA Enterprise Service Bus (ESB) is an application middleware solution designed

More information

How Cisco IT Migrated to Microsoft Active Directory

How Cisco IT Migrated to Microsoft Active Directory How Cisco IT Migrated to Microsoft Active Directory Automated migration and provisioning tools reduce cost of migrating to Active Directory and simplify training and troubleshooting. Cisco IT Case Study

More information

Access What are the HIT requirements to support recommendations of the Equity & Access Council to guard against under-service or patient selection?

Access What are the HIT requirements to support recommendations of the Equity & Access Council to guard against under-service or patient selection? HEALTH INFORMATION TECHNOLOGY (HIT) COUNCIL Charter This work group will develop for recommendation to the Healthcare Innovation Steering Committee, a proposal for HIT requirements 1 and technology components

More information

Passlogix Sign-On Platform

Passlogix Sign-On Platform Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure

More information

POSTX SECURE BUSINESS COMMUNICATION

POSTX SECURE BUSINESS COMMUNICATION POSTX SECURE BUSINESS COMMUNICATION Businesses must provide a secure and private environment for electronic communication INTRODUCTION As customers increasingly select the Internet as their preferred communication

More information

Unit Specific Questions Administrative

Unit Specific Questions Administrative Unit Specific Questions Administrative Name of individual completing this report: Charles D. Warner E-mail address of individual completing this report: cwarner@shawnee.edu Goals and Mission 1. How are

More information

PROJECT CONTROL DOCUMENT

PROJECT CONTROL DOCUMENT PROJECT CONTROL DOCUMENT PERSISTENT EMAIL (AKA EMAIL MODEL) EM-PCD-001 Draft 06/09/2004 Prepared by Don D Worth UCLA PERSISTENT EMAIL Copyright 2002-2004, The Regents of the University of California All

More information

2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative. Improving State Operations: Kentucky

2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative. Improving State Operations: Kentucky 2011 NASCIO Nomination Business Improvement and Paperless Architecture Initiative Improving State Operations: Kentucky Kevin Moore 6/1/2011 Executive Summary: Accounts Payable was a time consuming, inefficient

More information

Background (2013) Business Case. March 1 March 15 May 1 June 30 August 1-31

Background (2013) Business Case. March 1 March 15 May 1 June 30 August 1-31 Project Overview Introduction This presentation outlines the University of Chicago s implementation of Workday Human Capital Management (HCM). Workday@UChicago, the University s first Human Resource Information

More information

ERP Survey Questionnaire

ERP Survey Questionnaire 0 ERP Survey Questionnaire Thank you for your participation in the EDUCAUSE study of Enterprise Resource Planning (ERP) systems. The survey is a key part of a major study on ERP in higher education in

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

Instructional Technology Course Materials and Service Fee

Instructional Technology Course Materials and Service Fee Instructional Technology Course Materials and Service Fee University of California, Irvine October 14, 2011 PROBLEM STATEMENT Technology plays a critical role in university education, and students benefit

More information

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008 Oracle Business Intelligence Enterprise Edition LDAP-Security Administration White Paper by Shivaji Sekaramantri November 2008 OBIEE LDAP-Security Administration Before You Start... 3 Executive Overview...

More information

How can Identity and Access Management help me to improve compliance and drive business performance?

How can Identity and Access Management help me to improve compliance and drive business performance? SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope

State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope State of Alaska Document ID: Title: Supersedes: Status: 1010 Enterprise Messaging and Directory Services Strategy Vision

More information

A Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12 and Oracle Fusion Applications

A Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12 and Oracle Fusion Applications A Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12 and Oracle Fusion Applications John Stouffer Oracle E-Business ACE Independent Consultant 214 535 6847 john.w.stouffer@gmail.com

More information

Program Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission

Program Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission Program Summary DoIT provides and supports the infrastructure and custom development for NIU s core human resources system: The PeopleSoft Human Resources Management System (PS- HR) provides core functionality

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com

More information

Data Management Standards

Data Management Standards Overview The Provost s Office and the Office of Financial Affairs recognize the campus-wide need for broader and more robust access to institutional data to facilitate operations and inform strategic decision-making.

More information

Why Data Governance - 1 -

Why Data Governance - 1 - Data Governance Why Data Governance - 1 - Industry: Lack of Data Governance is a Key Issue Faced During Projects As projects address process improvements, they encounter unidentified data processes that

More information

UNIVERSITY FLU PANDEMIC PLAN Preparation, Management and Recovery

UNIVERSITY FLU PANDEMIC PLAN Preparation, Management and Recovery UNIVERSITY FLU PANDEMIC PLAN Preparation, Management and Recovery Objectives The objectives of establishing and implementing a University Flu Pandemic Plan are: 1. to protect the physical, mental and overall

More information

Ellucian CRM: platform overview

Ellucian CRM: platform overview Ellucian CRM: platform overview Enterprise-class, higher education-specific Built for higher education Ellucian CRM is designed for colleges and universities and provides higher education-specific business

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance

More information

Chapter 6 Implementation Planning

Chapter 6 Implementation Planning Chapter 6 Planning Planning- Division into Work Packages The following are the recommended Work Packages Overall Change Programme Work Package 1 E-Cabinet Model Work Package 2 Security Policy Design Work

More information

Best Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital

Best Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital Best Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital IDC Health Insights: Healthcare Provider IT Strategies BEST PRACTICES #HI238582

More information

UC Berkeley Campus Data Warehouse Governance and Delivery Organization Proposal Campus Data Warehouse / Business Intelligence Competency Center

UC Berkeley Campus Data Warehouse Governance and Delivery Organization Proposal Campus Data Warehouse / Business Intelligence Competency Center Patrick McGrath, David A. Greenbaum IST Data Services In 2005, the UC Berkeley Data Stewardship Council sponsored a project to assess the feasibility, challenges and potential benefits of developing a

More information

Appendix B. California State University, Chico Office of the Vice Provost for Information Resources. Enterprise System - CMS 2006/2007 Annual Report

Appendix B. California State University, Chico Office of the Vice Provost for Information Resources. Enterprise System - CMS 2006/2007 Annual Report Appendix B Office of the Vice Provost for Information Resources Enterprise System - CMS 2006/2007 Annual Report August 2007 Introduction CSU, Chico completed the first phase of CMS administrative systems

More information

KMS Implementation Roadmap

KMS Implementation Roadmap KMS Implementation Roadmap Sample Excerpt Prepared by: The Knowledge Compass, Inc. TABLE OF CONTENTS 1. EXECUTIVE SUMMARY 5 1.1 Overview 5 1.2 Project Goals & Objectives 5 1.3 Implementation Approach 5

More information

OATH FAQ February 20, 2004

OATH FAQ February 20, 2004 February 20, 2004 1. What is OATH? Due to identify theft, proliferation of IP devices and myriad of other trends in digital identity management the need for ubiquitous strong authentication is clear. Open

More information

UC Davis Web Content Management System (Web CMS) Terms of Use

UC Davis Web Content Management System (Web CMS) Terms of Use UC Davis Web Content Management System (Web CMS) Terms of Use 1. Definitions of roles a. Clients: Schools, colleges, academic departments and programs, and administrative units and programs that use the

More information

Whitepaper: PeopleAdmin and Oracle PeopleSoft

Whitepaper: PeopleAdmin and Oracle PeopleSoft Whitepaper: PeopleAdmin and Oracle PeopleSoft Executive Summary Organizations of higher education strive to acquire top talent, while facing a wide array of budgetary and technological challenges. The

More information

UC Irvine Information Technology Consolidation. Dana Roode UCI Office of Information Technology July 8, 2010 (updated 7/2012)

UC Irvine Information Technology Consolidation. Dana Roode UCI Office of Information Technology July 8, 2010 (updated 7/2012) UC Irvine Information Technology Consolidation Dana Roode UCI Office of Information Technology July 8, 2010 (updated 7/2012) 1 UCI Big Ideas Workgroups (Early 2009) Established to look at key areas where

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

Standards for Developing and Implementing Administrative Systems at UC Davis

Standards for Developing and Implementing Administrative Systems at UC Davis Page 1 of 7 Standards for Developing and Implementing Administrative Systems at UC Davis Introduction The purpose of this document is to describe Standards for Developing and Implementing Administrative

More information

The Unique Alternative to the Big Four. Identity and Access Management

The Unique Alternative to the Big Four. Identity and Access Management The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing

More information

Project Management RFQ 90058. Common Financial System: Security Consultant. Introduction. Environment Overview. The Common Financial System (CFS)

Project Management RFQ 90058. Common Financial System: Security Consultant. Introduction. Environment Overview. The Common Financial System (CFS) www.calstate.edu Common Financial System: Security Consultant Introduction The California State University (CSU), Office of the Chancellor seeks to identify a consulting partner for its Oracle Enterprise

More information

Immunization Information System (IIS) Help Desk Technician, Tier 2 Sample Role Description

Immunization Information System (IIS) Help Desk Technician, Tier 2 Sample Role Description Immunization Information System (IIS) Help Desk Technician, Tier 2 Sample Role Description March 2016 0 Note: This role description is meant to offer sample language and a comprehensive list of potential

More information

Endpoint Virtualization for Healthcare Providers

Endpoint Virtualization for Healthcare Providers WHITE PAPER: xxxxxx BEST PRACTICES [00-Cover_Bar] FOR HEALTHCARE Endpoint Virtualization for Healthcare Providers Confidence in a connected world. White Paper: Best Practices for Healthcare Endpoint Virtualization

More information

WHITE PAPER Using SAP Solution Manager to Improve IT Staff Efficiency While Reducing IT Costs and Improving Availability

WHITE PAPER Using SAP Solution Manager to Improve IT Staff Efficiency While Reducing IT Costs and Improving Availability WHITE PAPER Using SAP Solution Manager to Improve IT Staff Efficiency While Reducing IT Costs and Improving Availability Sponsored by: SAP Elaina Stergiades November 2009 Eric Hatcher EXECUTIVE SUMMARY

More information

BUSINESS INTELLIGENCE

BUSINESS INTELLIGENCE BUSINESS INTELLIGENCE Enabling Insights Across the Enterprise Patrick Callahan AST Corporation Practice Director Business Intelligence Naperville, Illinois USA 2011 Southern California Public Sector EBS

More information

HR Service Delivery: Campus Initiatives

HR Service Delivery: Campus Initiatives HR Service Delivery: Campus Initiatives David Odato, UCSF Jeannine Raymond, UCB Ramona Agrela, UCI Karen Hull, UCD Facilitated by: Scott Bolman, Mercer University of California Human Resources December

More information

PPS Initiative Changing the Way We Work*

PPS Initiative Changing the Way We Work* PPS Initiative Changing the Way We Work* Anthony Tony Lo Project Director Personnel Payroll Initiative Office of the President November 2011 * Includes Information developed by Aon Hewitt Project Consultant

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

A Unified Digital Campus:

A Unified Digital Campus: A Unified Digital Campus: Marshall University s Solution Written By Terri L. Tomblin-Byrd Contributions by: Bradley Morgan Gary Weis Copyright Terri L. Tomblin-Byrd 2003. This work is the intellectual

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Identity Management Project Roadmap

Identity Management Project Roadmap 2016 Hitachi ID Systems, Inc. All rights reserved. This document will guide you through the entire life of a successful Identity Management project, including: A needs analysis. Who to involve in the project.

More information

MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management

MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management A Technical Best Practices White Paper About This Document This whitepaper explores the challenges

More information

How To Improve Your Business

How To Improve Your Business IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends

More information

Project Charter for ITPC-0375

Project Charter for ITPC-0375 9-16-2011 Page 1 of 12 Project Charter for ITPC-0375 Prepared by: Daryl Fritchey Project Name ITPC-0375 Identity and Access Management (IAM) Implementation IAM Executive Sponsors Chair Michael Hites, Executive

More information

TECHNICAL HIGHLIGHTS. September 16 th,2015 Oglethorpe D. oneusg

TECHNICAL HIGHLIGHTS. September 16 th,2015 Oglethorpe D. oneusg TECHNICAL HIGHLIGHTS September 16 th,2015 Oglethorpe D oneusg Constitution one set of uniform business procedures, policies and practices one technical platform / software solution one support team and

More information

University of Houston-Downtown Information Technology

University of Houston-Downtown Information Technology University of Houston-Downtown Information Technology Technology Road Map A Long-Term Technology Plan Hossein Shahrokhi Associate Vice President for Information Technology University of Houston-Downtown

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive

More information

Fund 60030 Technology Infrastructure Services

Fund 60030 Technology Infrastructure Services Mission To provide a reliable and secure technology infrastructure foundation required to support County business processes and systems that strengthen the public service commitment of Fairfax County.

More information

Carleton College: Identity Management and Enterprise Directories at a Smaller Institution

Carleton College: Identity Management and Enterprise Directories at a Smaller Institution NMI-EDIT Identity and Access Management Case Study Series Carleton College: Identity Management and Enterprise Directories at a Smaller Institution September 2004 NMI-EDIT Case Study Series In response

More information

NOMINATION FORM. Category for judging: 5 - Digital Government: Government to Government (G to G)

NOMINATION FORM. Category for judging: 5 - Digital Government: Government to Government (G to G) NOMINATION FORM Title of Nomination: Project/System Manager: Job Title: Agency: Enterprise Technology Service Desk Elizabeth Dignan Program Manager State Technology Office Department: Address: 4030 Esplanade

More information

Enterprise Security Administrative Computing and Telecommunications Audit & Management Advisory Services Project 2014-05

Enterprise Security Administrative Computing and Telecommunications Audit & Management Advisory Services Project 2014-05 SAN DIEGO: AUDIT & MANAGEMENT ADVISORY SERVICES 0919 Min Yao Assistant Vice Chancellor Administrative Computing and Telecommunications 0928 August 27, 2014 Subject: Enterprise Security Administrative Computing

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

Strategic Plan FY 2014-2016

Strategic Plan FY 2014-2016 Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION

More information

A Provance White Paper

A Provance White Paper The Benefits of Combined IT Service Management and IT Asset Management A Provance White Paper Contents Introduction... 3 IT Service Management... 3 IT Asset Management... 4 People... 4 Processes... 5 Shared

More information

How To Create A Help Desk For A System Center System Manager

How To Create A Help Desk For A System Center System Manager System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Optimizing Infrastructure: The Relationship Between IT Labor Costs and Best Practices for Identity and Access Management with Active Directory Sponsored by: Microsoft Al Gillen Randy Perry

More information

UCD IT ARCHITECTURE. Executive Summary (2004-2008)

UCD IT ARCHITECTURE. Executive Summary (2004-2008) UCD IT ARCHITECTURE Executive Summary (2004-2008) Prepared by: On behalf of: UCD Computing Services Date: January 2004 Unit 2054 Citywest Business Campus Dublin 24, Ireland. Tel: +353-1-642 0100 Fax: +353-1-642

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive

More information

Scope of Work Microsoft Infrastructure Upgrade

Scope of Work Microsoft Infrastructure Upgrade Introduction Scope of Work Microsoft Infrastructure Upgrade The University of Texas M. D. Anderson Cancer Center (M. D. Anderson) in Houston, Texas, celebrating six decades of Making Cancer History, is

More information

Master Data Governance Hub

Master Data Governance Hub January 2013 Master Data Governance The Role of a Master Data Governance (415) 449-0565 www.gainesolutions.com TABLE OF CONTENTS Introduction Evolution of MDM Architecture Initial Deployment Evolution

More information

Appendix B: Statewide TCO Technical Support Guideline Comparison

Appendix B: Statewide TCO Technical Support Guideline Comparison Appendix B: Statewide TCO Technical Support Guideline Comparison Overview: The California Community College Chancellor s Office (CCCCO) has developed a Statewide Technology Plan commonly referred to as

More information

MITEL. Enterprise Management Solutions

MITEL. Enterprise Management Solutions MITEL Enterprise Management Solutions Results-driven Enterprise Wide Management Solutions As business requirements evolve, today s intelligent IP-voice networks are responding by delivering more targeted

More information

WHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION

WHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION WHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION Executive Overview The explosion of devices laptops, desktops and now the plethora of mobile devices has left enterprises

More information

Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management

Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management A Technical Best Practices White Paper Group Logic White Paper November 2008 About This Document This whitepaper

More information

Application for the 2005 Larry L. Sautter Award For Innovation in Information Technology

Application for the 2005 Larry L. Sautter Award For Innovation in Information Technology Application for the 2005 Larry L. Sautter Award For Innovation in Information Technology SUMMARY Quick Temp https://apps.adcom.uci.edu/expresso5/apps/components/quicktemp/login.jsp is a web-based system

More information

Speeding Office 365 Implementation Using Identity-as-a-Service

Speeding Office 365 Implementation Using Identity-as-a-Service August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com

More information