Identity Management to support Hybrid Cloud environments at higher education institutions

Size: px
Start display at page:

Download "Identity Management to support Hybrid Cloud environments at higher education institutions"

Transcription

1 Identity Management to support Hybrid Cloud environments at higher education institutions Lessons learnt at the Technische Universität München and the Leibniz Supercomputing Centre EUNIS 2011 Silvia Knittl, Technische Universität München, Germany Wolfgang Hommel, Leibniz Supercomputing Centre, Germany

2 Key issue We spent several years integrating our campus IT services. Then suddenly our users fell for cloud services. What does that mean for our identity management? EUNIS 2011 Identity Management for Hybrid Clouds in Higher Education 2

3 Our cloud-minded customer: TUM 26,300 students 141 degree courses 400 professors 4,200 academic staff 166 cooperations with other universities 548 Mio. budget Image source: EUNIS 2011 Identity Management for Hybrid Clouds in Higher Education 3

4 Image source: Ernst A. Graf The IT service provider: LRZ Services for all Munich HEIs 120,000+ users 2,500+ servers Network covers 500+ buildings Supercomputing center One of the three German national HPC centers You wouldn t want to pay our electricity bills ;-) EUNIS 2011 Identity Management for Hybrid Clouds in Higher Education 4

5 TUM s cloud service use IT services used by TUM are either TUM-internally provided (by faculties or central service institutions), LRZ services (usually not TUM-exclusive), or external commercial cloud (dynamic, pay-per-use) services, e.g. Wikispaces, Amiando event management Hybrid Cloud environment: Uses multiple *AAS Uses both physical and virtual machines Uses services by internal as well as external cloud providers EUNIS 2011 Identity Management for Hybrid Clouds in Higher Education 5

6 Seeing services through cloud glasses Challenge: TUM s identity management must cover all services EUNIS 2011 Identity Management for Hybrid Clouds in Higher Education 6

7 IDM architecture TUM/LRZ EUNIS 2011 Identity Management for Hybrid Clouds in Higher Education 7

8 Our four IAM building blocks LDAP-based AuthNZ and directory Scope: Many LRZ and TUM-internal services, e.g., VPN, PC pools Advantages: High performance Minimalist data schema Supported out-of-the-box by many applications Implemented using Novell edirectory and OpenLDAP Image source: mzacha/sxc.hu Provisioning system / meta-directory Scope: Various TUM-internal services, e.g., library Advantages: Data format conversion on-the-fly Integrates legacy systems Synchronizes locally stored user data Implemented using Novell Identity Manager Image source: topfer/sxc.hu EUNIS 2011 Identity Management for Hybrid Clouds in Higher Education 8

9 Our four IAM building blocks (cont.) Microsoft Active Directory Scope: LRZ cloud services (VMware, NetApp, Groupware), TUM Windows PC management Advantages: Single sign-on for non-web applications Standard for many 3 rd party software products Shibboleth Identity Provider (DFN-AAI federation) Scope: External services (regular and cloud services) Advantages: Standard data schema across German HEIs User consent to data sharing enhances privacy Single sign-on for web applications Efficient configuration for additional services EUNIS 2011 Identity Management for Hybrid Clouds in Higher Education 9

10 Prognosis, or: Would we do this again? Provisioning is complex, error-prone and cost-intensive Avoid unless you really need to integrate legacy services Active Directory is no substitute for real LDAP servers Its proprietary schema is no match for HEI-specific requirements OpenLDAP s performance suits heavy-duty applications much better (e.g., relays) But it is a must-have for many commercial services (e.g., VMware) Shibboleth is the de-facto web single sign-on standard Popular for both campus-internal and federation services Technological advancements must be kept in mind (e.g., OAuth for access delegation) EUNIS 2011 Identity Management for Hybrid Clouds in Higher Education 10

11 Conclusion Combining four different IDM components causes significant capital and operational expenditure but provides the flexibility required for both conventional and cloud services IDM workflows cover cloud requirements quite well e.g., privileged account management for dynamically instantiated virtual machines but additional frontends are required (e.g., VM webshop and API) The only constant is change EUNIS 2011 Identity Management for Hybrid Clouds in Higher Education 11

EUNIS 2009: AVAILABILITY AND CONTINUITY MANAGEMENT AT TECHNISCHE UNIVERSITÄT MÜNCHEN AND THE LEIBNIZ SUPERCOMPUTING CENTRE

EUNIS 2009: AVAILABILITY AND CONTINUITY MANAGEMENT AT TECHNISCHE UNIVERSITÄT MÜNCHEN AND THE LEIBNIZ SUPERCOMPUTING CENTRE EUNIS 2009: AVAILABILITY AND CONTINUITY MANAGEMENT AT TECHNISCHE UNIVERSITÄT MÜNCHEN AND THE LEIBNIZ SUPERCOMPUTING CENTRE Wolfgang Hommel 1, Silvia Knittl 2, and Daniel Pluta 3 1 Leibniz Supercomputing

More information

Strategy and Tools for Identity Management and its Process Integration in the Munich Scientific Network

Strategy and Tools for Identity Management and its Process Integration in the Munich Scientific Network Strategy and Tools for Identity Management and its Process Integration in the Munich Scientific Network Wolfgang Hommel 1, Silvia Knittl 2, Daniel Pluta 3 1 Leibniz Supercomputing Centre, Boltzmannstr.

More information

IT security concept documentation in higher education data centers: A template-based approach

IT security concept documentation in higher education data centers: A template-based approach IT security concept documentation in higher education data centers: A template-based approach Wolfgang Hommel Leibniz Supercomputing Centre, Munich, Germany EUNIS 2013 June 12th, 2013 Leibniz Supercomputing

More information

Information Security Risk Management in HEIs: From Processes to Operationalization Wolfgang Hommel, Stefan Metzger, Michael Steinke

Information Security Risk Management in HEIs: From Processes to Operationalization Wolfgang Hommel, Stefan Metzger, Michael Steinke Information Security Risk Management in HEIs: From Processes to Operationalization Wolfgang Hommel, Stefan Metzger, Michael Steinke EUNIS 2015 Dundee, Leibniz Supercomputing Centre (LRZ) Photo: Ernst A.

More information

midpoint Overview Radovan Semančík December 2015

midpoint Overview Radovan Semančík December 2015 midpoint Overview Radovan Semančík December 2015 Agenda Identity Management Introduction midpoint Introduction midpoint Architecture Conclusion Identity Management Introduction Identity Management System

More information

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014 Introduction to Identity and Access Management for the engineers Radovan Semančík April 2014 How it works now? Manager Admin Login Users Login Admin Login Login Login Theory Manager Admin Forgot password

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions Course M20533 5 Day(s) 30:00 Hours Introduction This course is aimed at experienced IT Professionals who currently administer their on -premise infrastructure.

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure About this Course This course is aimed at experienced IT Professionals who currently administer their on-premise infrastructure. The course introduces the student

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course 20533A: Implementing Microsoft Azure Infrastructure Solutions Page 1 of 7 Implementing Microsoft Azure Infrastructure Solutions Course 20533A: 4 days; Instructor-Led Introduction This course is

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

Federated Identity Management in Business-to-Business Outsourcing

Federated Identity Management in Business-to-Business Outsourcing B.F. Marques, T. Nebe, R.F. Oliveira (Eds.): Proceedings of the 12th Annual Workshop of HP OpenView University Association (HPOVUA 2005); pp. 81 93, iportalmais, Porto, Juli 2005 Federated Identity Management

More information

EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.

EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole. KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings pc@kuppingercole.com October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single

More information

Microsoft Azure for IT Professionals 55065A; 3 days

Microsoft Azure for IT Professionals 55065A; 3 days Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Microsoft Azure for IT Professionals 55065A; 3 days Course Description This

More information

Session 5. Mixing and matching Public, Private and Hybrid Clouds for maximum benefits

Session 5. Mixing and matching Public, Private and Hybrid Clouds for maximum benefits Session 5. Mixing and matching Public, Private and Hybrid Clouds for maximum benefits Best of both/ Best of all regarding specific needs, based on the use of resources Hybrid cloud is simply a mix of private

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

Cross-domain Identity Management System for Cloud Environment

Cross-domain Identity Management System for Cloud Environment Cross-domain Identity Management System for Cloud Environment P R E S E N T E D B Y: N A Z I A A K H TA R A I S H A S A J I D M. S O H A I B FA R O O Q I T E A M L E A D : U M M E - H A B I B A T H E S

More information

University of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01

University of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01 QUESTIONS 1. On page 12 of the RFP, it mentions the use of a Custom Identity Management (IdM) solution. Could you please share with us the platform and nature of the IdM System or any other relevant details,

More information

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Oracle Identity Manager, Oracle Internet Directory

Oracle Identity Manager, Oracle Internet Directory Oracle Identity Manager (OIM) is a user provisioning system. It defines properties for how users and groups get authorized to access compute and content resources across the enterprise. Identity Management

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions 20533B - Version: 1 02 July 2016 Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions 20533B - Version: 1 5 days Course Description: This course is

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager pchadwick@suse.com. Product Marketing Manager djarvis@suse.

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager pchadwick@suse.com. Product Marketing Manager djarvis@suse. SUSE Cloud 2.0 Pete Chadwick Douglas Jarvis Senior Product Manager pchadwick@suse.com Product Marketing Manager djarvis@suse.com SUSE Cloud SUSE Cloud is an open source software solution based on OpenStack

More information

Open Source Identity Management

Open Source Identity Management Open Source Management OpenAlt 2015 Radovan Semančík November 2015 Ing. Radovan Semančík, PhD. Software architect Co-owner of Evolveum (open source company) Architect of midpoint project Apache committer

More information

Audience Profile This course is intended for any developer that is tasked with creating applications that interface with O365.

Audience Profile This course is intended for any developer that is tasked with creating applications that interface with O365. 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Course MS55083A Developing for Office 365 Length: 5 Days

More information

LinuxCon North America

LinuxCon North America LinuxCon North America Enterprise Identity Management with Open Source Tools Dmitri Pal Sr. Engineering Manager Red Hat, Inc. 09.16.2013 Context What is identity management? 2 LinuxCon North America Context

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

Identity management for the TUB Cloud. T. Hildmann, O. Kao, C. Ritter tubit, CIT EUNIS 2013

Identity management for the TUB Cloud. T. Hildmann, O. Kao, C. Ritter tubit, CIT EUNIS 2013 Identity management for the TUB Cloud T. Hildmann, O. Kao, C. Ritter tubit, CIT EUNIS 2013 Agenda The path of the TU Berlin towards integrated service provisioning: Provisioning: Entering the Cloud Role-Management:

More information

The Unique Alternative to the Big Four. Identity and Access Management

The Unique Alternative to the Big Four. Identity and Access Management The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing

More information

Transition Your Windows Server 2003 Infrastructure to a Modern Cisco and Microsoft Solution

Transition Your Windows Server 2003 Infrastructure to a Modern Cisco and Microsoft Solution Solution Overview Transition Your Windows Server 2003 Infrastructure to a Modern Cisco and Microsoft Solution Microsoft support for all versions of Windows Server 2003 and Windows Server 2003 R2 ends on

More information

Secure service for comfortable cross-enterprise collaboration & data exchange

Secure service for comfortable cross-enterprise collaboration & data exchange Secure service for comfortable cross-enterprise collaboration & data exchange Dr. Ralf Rieken CEO, Uniscon GmbH selected by für die all4cloud Lösung Uniscon at a Glance Founded 2009 (Munich Technology

More information

THE ICT STRATEGY OF THE TECHNISCHE UNIVERSITÄT MÜNCHEN

THE ICT STRATEGY OF THE TECHNISCHE UNIVERSITÄT MÜNCHEN THE ICT STRATEGY OF THE TECHNISCHE UNIVERSITÄT MÜNCHEN Arndt Bode, Rolf Borgeest and Hans Pongratz Technische Universität München, Boltzmannstr.3, 85748 Garching b. München, Germany bode@in.tum.de, rolf.borgeest@tum.de,

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

IT security concept documentation in higher education data centers: A template-based approach

IT security concept documentation in higher education data centers: A template-based approach IT security concept documentation in higher education data centers: A template-based approach Wolfgang Hommel 1, Stefan Metzger 2, Helmut Reiser 3, Felix von Eye 4 1-4 Leibniz Supercomputing Centre, 85748

More information

Replace or Integrate? Decision Support for Building a Federated Configuration Management Database

Replace or Integrate? Decision Support for Building a Federated Configuration Management Database Leibniz Supercomputing Centre of the Bavarian Academy of Sciences and Humanities Replace or Integrate? Decision Support for Building a Federated Configuration Management Database Authors: Michael Brenner,

More information

LiteScape Unified Communications Applications:

LiteScape Unified Communications Applications: LiteScape Unified Communications Applications: LiteScape OnCast: Unified Communication Synchronization Service LiteScape Technologies, Inc. All rights reserved OnCast Synchronization Problem Organizations

More information

Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led)

Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led) Citrix Training Course: Citrix Training Duration: 40 hours Mode of Training: Classroom (Instructor-Led) Virtualization has redefined the way IT resources are consumed and services are delivered. It offers

More information

Identity Management. (Re)discovering authorization APIs and LDAP model binding. Clément OUDOT

Identity Management. (Re)discovering authorization APIs and LDAP model binding. Clément OUDOT Identity Management (Re)discovering authorization APIs and LDAP model binding Clément OUDOT OpenWorldForum - 01/12/2008 Speaker Clément OUDOT Work for LINAGORA Group since 2003 Take part in important LDAP

More information

Qstack. Make IT work for you

Qstack. Make IT work for you Qstack Make IT work for you Qstack is a cloud software solution, a turnkey and easy-to-use package to help you capitalize on an enterprise-ready, brandable and fully customizable cloud. Qstack includes

More information

SAP Identity Management Overview

SAP Identity Management Overview Identity Management Overview October 2014 Public Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password

More information

Quick Start - Virtual Private Cloud in Germany and Australia

Quick Start - Virtual Private Cloud in Germany and Australia Quick Start - Virtual Private Cloud in Germany and Australia vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory

More information

VMware vcloud Service Definition for a Private Cloud

VMware vcloud Service Definition for a Private Cloud Service Definition for a Private Cloud Version 1.6 TECHNICAL WHITE PAPER Service Definition for a Private Cloud 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international

More information

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-

More information

Configuring and Deploying a Private Cloud

Configuring and Deploying a Private Cloud 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Configuring and Deploying a Private Cloud Course: MS20247D

More information

White Paper. Using Universal Platform TM to Facilitate Disaster Recovery Projects

White Paper. Using Universal Platform TM to Facilitate Disaster Recovery Projects White Paper Using Universal Platform TM to Facilitate Disaster Recovery Projects Page 2 of 9 Common challenges faced by companies during a Disaster Recovery project Controlling and brokering access to

More information

IT Service Management System at the Leibniz Supercomputing Centre

IT Service Management System at the Leibniz Supercomputing Centre IT Service Management System at the Leibniz Supercomputing Centre People, Process, Technology Dr. Michael Brenner brenner@lrz.de Leibniz Supercomputing Centre of the Bavarian Academy of Sciences and Humanities

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

Identity and Access Management

Identity and Access Management Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements

More information

Backup Exec 2012 Agents and Options

Backup Exec 2012 Agents and Options Backup Exec 2012 Agents and Options Markku A Suistola Principal Presales Consultant Backup Exec 2012 Backup Exec 2012 Architecture Overview Understanding the technology workflow 2 Backup Exec 2012 Core

More information

Solution White Paper Build the Right Cloud, Quickly

Solution White Paper Build the Right Cloud, Quickly Solution White Paper Build the Right Cloud, Quickly BMC Express Cloud Table of Contents 1 THE PROMISE OF CLOUD COMPUTING Getting Started 2 SUCCEEDING WITH CLOUD COMPUTING 3 INTRODUCING BMC EXPRESS CLOUD

More information

Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS

Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS Transitioning from today s highly virtualized data center environments to a true cloud environment requires solutions that let companies

More information

Oracle Mobile Security Suite. René Klomp 6 mei 2014

Oracle Mobile Security Suite. René Klomp 6 mei 2014 Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be

More information

Driver for NetIQ Privileged User Manager Implementation Guide. Identity Manager 4.0.2

Driver for NetIQ Privileged User Manager Implementation Guide. Identity Manager 4.0.2 Driver for NetIQ Privileged User Manager Implementation Guide Identity Manager 4.0.2 May 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT

More information

Framework 8.1. External Authentication. Reference Manual

Framework 8.1. External Authentication. Reference Manual Framework 8.1 External Authentication Reference Manual The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys

More information

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

Service Definition for Private Cloud TECHNICAL WHITE PAPER

Service Definition for Private Cloud TECHNICAL WHITE PAPER Service Definition for Private Cloud TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Phase I.... 3 Phase II.... 3 Workload Categories.... 4 Transient... 4 Highly Elastic.... 4 Infrastructure....

More information

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services

More information

An Access Control Solution For The Inter-Organizational Use Of ITIL Federated Configuration Management Databases

An Access Control Solution For The Inter-Organizational Use Of ITIL Federated Configuration Management Databases Published in Proceedings of the 15 Annual Workshop of HP Software University Association (HP-SUA), 2008 An Access Control Solution For The Inter-Organizational Use Of ITIL Federated Configuration Management

More information

Project Géant-TrustBroker dynamic identity management across federation borders

Project Géant-TrustBroker dynamic identity management across federation borders Page 1/14 Project Géant-TrustBroker dynamic identity management across federation borders Daniela Pöhn, Stefan Metzger, Wolfgang Hommel Leibniz Supercomputing Centre, Bavarian Academy of Sciences and Humanities

More information

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics

More information

VMware vcloud Director for Service Providers

VMware vcloud Director for Service Providers Architecture Overview TECHNICAL WHITE PAPER Table of Contents Scope of Document....3 About VMware vcloud Director....3 Platform for Infrastructure Cloud...3 Architecture Overview....3 Constructs of vcloud

More information

MS 20532B - Developing Microsoft Azure Solutions

MS 20532B - Developing Microsoft Azure Solutions MS 20532B - Developing Microsoft Azure Solutions COURSE OVERVIEW: This course is designed for IT professionals looking to understand the Microsoft Azure Infrastructure components, including virtual machines,

More information

Total Cost of Ownership Overview ADFS vs OneLogin WHITEPAPER

Total Cost of Ownership Overview ADFS vs OneLogin WHITEPAPER Total Cost of Ownership Overview vs OneLogin WHITEPAPER Are you really going to double down on machines, software and professional services to extend Active Directory (AD)? Executive Summary Are you planning

More information

Access Management Analysis of some available solutions

Access Management Analysis of some available solutions Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available

More information

IAMUCLA 2.0 SSO Updates

IAMUCLA 2.0 SSO Updates IAMUCLA 2.0 SSO Updates Common Systems Group Meeting July 27, 2015 IAMUCLA 2.0 Projects Password Security Concerns Technology Evolution Health Systems SSO Support Departmental/Service Accounts Testing

More information

Benefits and Uses of Private Cloud based on Next-generation Technology that Supersedes Virtualization

Benefits and Uses of Private Cloud based on Next-generation Technology that Supersedes Virtualization Hitachi Review Vol. 65 (2016), No. 1 775 Featured Articles Benefits and Uses of Private Cloud based on Next-generation Technology that Supersedes Virtualization Norihiro Hayakawa Yasufumi Sato Hiroyuki

More information

white paper Introduction to Cloud Computing The Future of Service Provider Networks

white paper Introduction to Cloud Computing The Future of Service Provider Networks white paper Introduction to Cloud Computing The service provider industry is in the midst of a major inflection point as networks move away from vertically integrated architectures that bundle proprietary

More information

Information Technology Services. Roadmap 2014-2016

Information Technology Services. Roadmap 2014-2016 Information Technology Services Roadmap 2014-2016 Introduction This document charts the direction for Humboldt State University s Information Technology Services department over the next three years. It

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

Course 20247: Configuring and Deploying a Private Cloud

Course 20247: Configuring and Deploying a Private Cloud Course 20247: Configuring and Deploying a Private Cloud Type:Course Audience(s):IT Professionals Technology:Microsoft System Center Level:300 This Revision:D Delivery method: Instructor-led (classroom)

More information

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013 Government of Canada Directory Services Architecture Presentation to the Architecture Framework Advisory Committee November 4, 2013 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks Objective for

More information

Carleton College: Identity Management and Enterprise Directories at a Smaller Institution

Carleton College: Identity Management and Enterprise Directories at a Smaller Institution NMI-EDIT Identity and Access Management Case Study Series Carleton College: Identity Management and Enterprise Directories at a Smaller Institution September 2004 NMI-EDIT Case Study Series In response

More information

Sistemi Operativi e Reti. Cloud Computing

Sistemi Operativi e Reti. Cloud Computing 1 Sistemi Operativi e Reti Cloud Computing Facoltà di Scienze Matematiche Fisiche e Naturali Corso di Laurea Magistrale in Informatica Osvaldo Gervasi ogervasi@computer.org 2 Introduction Technologies

More information

How To Deploy Cisco Jabber For Windows 2.5.1 On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or

How To Deploy Cisco Jabber For Windows 2.5.1 On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or Deployment Models Cisco Jabber for Windows provides two deployment models, on-premises or cloud-based. Learn about each deployment model and review the available options for on-premises and cloud-based

More information

The Dangers of Consumer Grade File Sharing in a Compliance Driven World

The Dangers of Consumer Grade File Sharing in a Compliance Driven World The Dangers of Consumer Grade File Sharing in a Compliance Driven World Enterprise data access is spiraling out of control owncloud, Inc. 57 Bedford Street Suite 102 Lexington, MA 02420 United States www.owncloud.com/contact

More information

20247D: Configuring and Deploying a Private Cloud

20247D: Configuring and Deploying a Private Cloud 20247D: Configuring and Deploying a Private Course Details Course Code: Duration: Notes: 20247D 5 days This course syllabus should be used to determine whether the course is appropriate for the students,

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc. 06.27.

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc. 06.27. Managing Identity & Access in On-premise and Cloud Environments Ellen Newlands Identity Management Product Manager Red Hat, Inc. 06.27.12 Agenda What is identity and access management Why should you care

More information

OracleAS Identity Management Solving Real World Problems

OracleAS Identity Management Solving Real World Problems OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability

More information

NE-20247D Configuring and Deploying a Private Cloud

NE-20247D Configuring and Deploying a Private Cloud NE-20247D Configuring and Deploying a Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 10 December 2014 300 Microsoft System Center 2012 Delivery Method Instructor-led

More information

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires

More information

LDAP connectivity to the REDDOXX-Appliance

LDAP connectivity to the REDDOXX-Appliance LDAP connectivity to the REDDOXX-Appliance 1. Basic facs The REDDOXX appliance supports a LDAP connectivity to a varity of user backend systems. Depending on the LDAP server type the LDAP connector supports

More information

Configuring and Deploying a Private Cloud

Configuring and Deploying a Private Cloud Course Code: M20247 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Configuring and Deploying a Private Cloud Overview This course equips students with the skills they require to configure and

More information

The Four "A's" of Information Security

The Four A's of Information Security Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also

More information

Cloud Computing: Elastic, Scalable, On-Demand IT Services for Everyone. Table of Contents. Cloud.com White Paper April 2010. 1 Executive Summary...

Cloud Computing: Elastic, Scalable, On-Demand IT Services for Everyone. Table of Contents. Cloud.com White Paper April 2010. 1 Executive Summary... Cloud Computing: Elastic, Scalable, On-Demand IT Services for Everyone Cloud.com White Paper April 2010 Table of Contents 1 Executive Summary... 2 2 Motivation Around Cloud Computing... 2 3 Comparing Cloud

More information

Apache Syncope OpenSource IdM

Apache Syncope OpenSource IdM Apache Syncope OpenSource IdM Managing Identities in Enterprise Environments Version 1.3 / 2012-07-26 Apache Syncope OpenSource IdM by http://syncope.tirasa.net/ is licensed under a Creative Commons Attribution

More information

VMware Building Many Bridges to the Cloud

VMware Building Many Bridges to the Cloud VMware Building Many Bridges to the Cloud Robin Ren, Cloud Applications and Services, VMware July 2010 2009 VMware Inc. All rights reserved Agenda Cloud Characteristics Benefits Challenges VMware and Cloud

More information

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure KEMP LoadMaster Enabling Hybrid Cloud Solutions in Microsoft Azure Introduction An increasing number of organizations are moving from traditional on-premises datacenter architecture to a public cloud platform

More information

Private Cloud 201 How to Build a Private Cloud

Private Cloud 201 How to Build a Private Cloud Private Cloud 201 How to Build a Private Cloud Chris E. Avis Sr. IT Pro Evangelist Microsoft Corp. http://chrisavis.com Presented at Seattle Windows Networking User Group January 4, 2012 al 1 The Cloudscape

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT

What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT What Factors Determine Cloud Computing Adoption by Colleges and Universities? Bill Klug Instructor, BCIT What Will Be Presented Today? My interest in cloud computing What is cloud computing? Who did I

More information

Cloud services in PL-Grid and EGI Infrastructures

Cloud services in PL-Grid and EGI Infrastructures 1 Cloud services in PL-Grid and EGI Infrastructures J. Meizner, M. Radecki, M. Pawlik, T. Szepieniec ACK Cyfronet AGH Cracow Grid Workshop 2012, Kraków, 22.10.2012 Overview 2 Different types of Compute

More information

Troux Hosting Options

Troux Hosting Options Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4

More information

Enhancing Collaboration by Extending the Groups Directory Infrastructure. James Cramton Brown University

Enhancing Collaboration by Extending the Groups Directory Infrastructure. James Cramton Brown University Enhancing Collaboration by Extending the s Directory Infrastructure James Cramton Brown University Why We are Here De-duplication without all the facts Software in central business system identifies individuals

More information