Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support
|
|
- Florence Sharp
- 8 years ago
- Views:
Transcription
1 Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version /9/2005 Current Environment Assessment Specification 1
2 CURRENT ENVIRONMENT ASSESSMENT SPECIFICATION 1. Introduction Purpose Key Participants Scope Integration Technologies... 5 Single Sign On:... 5 Customer Relation Management:... 6 Workstation Support: Application and Data Sources Interfaces Integration Matrix Integration Diagram Security Conclusions and Commentary Appendix A: References Current Environment Assessment Specification
3 1. Introduction This document defines the current information technology environment as it pertains to the business integration strategy and architecture as of 10/09/2005 for Georgia State University. The focus of this document is on three initiatives: Single Sign on Customer Relation Management Workstation Support Single Sign On - This initiative will provide a strategy to create a single entry point for authentication for all electronic web enabled resources maintained at Georgia State that require authentication. It can then be expanded to include access to universities across the country that require generic authentication to their resources. Technologies being defined include Internet2 s Shibboleth and eduperson, PersonRegistry created via Oracle, and Novell s edirectory which is a LDAP service. The major constraint in the current environment is that every system that is implemented at Georgia State University needs to create its own method of authenticating users as well as track the identity of the authenticated users. This also creates security issues because there are multiple entry points into the University s systems which need to be monitored. If security standards change in the future every resource that has its own authentication schema needs to be updated and tested for compliance. The University is experiencing something similar to this as the Board of Regents has announced that it wants the Universities systems to meet a security mandate which states that Social Security Number may no longer be used as a primary means of authentication for non payroll based systems. Customer Relation Management Currently Georgia State University Help Center uses Remedy to log trouble tickets and how to resolve it. There are a number of issues identified with this current process: It is not streamlined - the customer information data has to be entered to Remedy when customer calls the Help Center; the other problem is that there is no guarantee of documentation and knowledge reuse in the current process. Technicians are still being contacted in person, and there is not enforcements of what problem will be routed to 2 nd level or 3 rd level support. This document looks into the current technical configuration of the existing Remedy setup, and the call routing process. This document will serve as a reference for integrated architecture and process which will be proposed later on. Workstation Support - As a part of IS&T, Planning and Strategic Initiatives (P&SI) is responsible for providing workstation support to the campus. To better manage the estimated 10,000 workstations around campus, in December of 2004, IS&T purchased 10,000 1 licenses for the Symantec icommand software. However, implementation was delayed due to remote access limitations of the purchased version of the software. Upon receipt of a softwareupgrade in summer 2005, IS&T has been conducting appropriate testing, and the first implementation is anticipated to begin soon. Use of icommand will be piloted at IS&T as the first step of the implementation. One of the foreseen challenges in the enterprise-wide implementation is the acceptance of the use of icommand by various organizational units. Concerns over workstation security have been expresses, specifically, some faculty members are concerned that grade and exam information, may be compromised. Current Environment Assessment Specification 3
4 2. Purpose The purpose of the Current Environment Assessment is to document and assess the current integration technologies that support the business functions of the enterprise. This assessment will be used when determining recommended technologies and vendors in the Integration Architecture Document. 3. Key Participants The creators and the maintainers of this document are CIS 8020 Team number 2 consisting of Igor Wolbers, Tony Yuan, and Saeed Nadjariun. The intended audience members include: Director of Planning and Strategic Initiatives will use this document to ensure it is inline with its strategic mission. Director of Library Services Support will use this document to ensure that the architecture to be implemented is scalable enough to be used in an initiative to use generic authentication schemas for accessing library resources. Director of Advanced Campus Services will use this document to ensure that it is inline with other strategies that would utilize the outcomes of this initiative. IS&T technical staff The Planning and Strategic Initiatives (PS&I) Will use this document for appropriate planning and implementation. 4. Scope The scope of the environmental assessment includes: Single Sign On - All web enabled electronic resources which are maintained by the University of Georgia State as well as the various colleges that are a part of it, specifically any web enabled resource that requires authentication such as GILL, GOSOLAR, WebCT, etc... Customer Relation Management - IS&T s Help Center support efforts only. However the enhanced Help Center and its process will serve all faculty and staff at Georgia State University. Workstation Support - The current environment assessment covers all the operating units within Georgia State University where workstations are being used. 4 Current Environment Assessment Specification
5 5. Integration Technologies Single Sign On: Integration Technology Vendor Solutions Applications Messaging systems Integration brokers/servers Application servers with some integration Oracle RDBMS Packaged application integration PeopleSoft In progress Adapters and interfaces Enterprise service bus and Web services tools Data, information and content integration tools Portals B2B technology BPM technology WebCT Vista Current systems that use stored data will use Oracle to persist that data. Integrated security Novel s edirectory (LDAP solution) Currently just campus PC based authentication and eduperson by MACE None as of yet Other middleware technologies Point solution technology Custom integration solution Current Environment Assessment Specification 5
6 Customer Relation Management: Integration Technology Vendor Solutions Applications Messaging systems Integration brokers/servers Application servers with some integration Packaged application integration PeopleSoft Remedy system is currently not using Messaging to interface with other systems. Remedy currently pull information from PeopleSoft on nightly basis Adapters and interfaces Enterprise service bus and Web services tools Data, information and content integration tools Portals B2B technology BPM technology Integrated security Other middleware technologies Point solution technology Custom integration solution CRM is currently not in Portals Remedy Latest Release of Remedy has business process management capability Currently Remedy use its own build in Authentication / Authorization mechanism for security No Customized integration middle ware for CRM 6 Current Environment Assessment Specification
7 Workstation Support: Integration Technology Vendor Solutions Applications Messaging systems Integration brokers/servers Application servers with some integration Packaged application integration Symantec ON icommand Adapters and interfaces Enterprise service bus and Web services tools Data, information and content integration tools Portals B2B technology BPM technology Integrated security Other middleware technologies Point solution technology Custom integration solution 6. Application and Data Sources Interfaces Single Sign On: Application/Data Owner Platform Interface Reusable Source Name WebCT Vista UCCS Java 2 Platform (TBD) (TBD) GOSOLAR UCCS Unix (TBD) (TBD) GILL LSS Web enabled (TBD) (TBD) Groupwise UCCS MS Windows edirectory Yes Customer Relation Management: Application/Data Owner Platform Interface Reusable Source Name Remedy / People Soft data source Help Center Unix / Oracle API Yes Workstation Support: Application/Data Owner Platform Interface Reusable Source Name icommand Windows Through Windows Yes Support Group Active Directory or LDAP Current Environment Assessment Specification 7
8 7. Integration Matrix Single Sign On - Currently, the team is not aware that any of these applications are integrated in any way with the exception of a possible common data store where Student/Staff information is housed. Customer Relation Management Remedy PeopleSoft Help Center Oracle Database Remedy Manual Process JDBC / Read PeopleSoft Help Center Manual process Oracle Database Nightly feed job Nightly job update Workstation Support Not available Nightly job update 8. Integration Diagram Single Sign On This is the As Is diagram shows that although each service uses some of the data from staff and student repositories (shown in red) they are in charge keeping track of their own authentication schema as well as any security information that is used by that service. (Original diagram was taken from a Power Point presentation created by Art Vandenberg. The original diagram was altered to fit the needs of this document). 8 Current Environment Assessment Specification
9 This diagram shows that a user authenticates directly to any one particular service (WebCT, , etc.) and the service is in charge of authenticating the user by going to its own local data store or host data store to check the credentials. (Original diagram was taken from a Power Point presentation created by Art Vandenberg. The original diagram was altered to fit the needs of this document). Customer Relation Management: Remedy Enter New / Use Oracle / UNIX Nightly Update PeopleSoft Current Environment Assessment Specification 9
10 Workstation Support: This is an eschematic of the university backbone (2003) which is used here to depict the vastness of the GSU computing environment. The estimated 10,000 workstations are connected through the backbone. 10 Current Environment Assessment Specification
11 9. Security Single Sing On Authentication Authorization Auditing Confidentiality Nonrepudiation Internal data edirectory Oracle Checks Student ID and PIN Oracle credentials Verify user is a GSU member. edirectory Partner data Customer data Internal Application GoSOLAR GILL Partner application WebCT Vista Compares SSN and PIN Checks Student ID and PIN Checks Student ID and PIN Verifies if user is a GSU member. Verifies if user is a GSU member. <unsure> SSL <none> Verifies if user is a GSU member. <none> Customer Relation Management Authentication Authorization Auditing Confidentiality Non repudiation Customer data Remedy Remedy s own mechanism Remedy s own mechanism Remedy s own mechanism Remedy s own mechanism Workstation Support Authentication Authorization Auditing Confidentiality Non repudiation Customer data icommand Active Directory / LDAP Active Directory or LDAP icommand s own mechanism icommand s own mechanism Current Environment Assessment Specification 11
12 10. Conclusions and Commentary Single Sign On - The single sign on solution will have some obstacles as current disparate systems house redundant login information and credentials as well as their own means of authenticating. These different systems also run on different platforms. The scattered data will need to be consolidated into a single data store. The data store will then need a single point of access that these systems can use to communicate and authenticate with. Because of the different platforms used these methods will have to be able to be written using a platform independent technology like web services. Customer Relation Management - For Authentication / Authorization, there is current planning going to use the LDAP authentication option. IS&T is deploying an LDAP authentication directory for that purpose. The LDAP authentication will then be available for other systems (such as PeopleSoft HR, Financials; Banner Student, Financial Aid, etc.; GroupWise ...). The goal is to get a single LDAP authentication where users would use their CampusID and password. Remedy upgrade requires a significant process reengineering of CRM. We believe it will make IS&T more responsive, more competitive, and better trained to support customers. Workstation Support The implementation of the icommand software to automate the workstation support will require an iterative approach. This will help obtain buy-in from those organizations, within GSU, who maintain their own workstation support staff. Moreover, as IS&T completes each phase of the implementation, it will be able to document and show the robostness of the system; this is especially important to overcome concers over security. 12 Current Environment Assessment Specification
13 Appendix A: References External resources: Internal resources: september2004_files/gsu_nmi_results_at_i2-y3.ppt Current Environment Assessment Specification 13
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES 1. Federation Participant Information 1.1 The InCommon Participant Operational Practices information below is for: InCommon Participant organization
More informationEasy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
More informationCA SiteMinder. Implementation Guide. r12.0 SP2
CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationRemote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
More informationPeopleSoft Enterprise Directory Interface
PeopleSoft Enterprise Directory Interface Today s self-service applications deliver information and functionality to large groups of users over the internet. Organizations use these applications as a cost-effective
More informationInformation Technology Guide
Information Technology Guide Introduction Welcome to Byrdine F. Lewis School of Nursing and Health Professions (The Lewis School). This is a brief introduction and guide to information technology matters.
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Royal Roads University_ Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they
More informationArchitecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
More informationEnterprise Directory Project Pre-Feasibility Study Information and Educational Technology
UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an
More informationOpen Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
More informationPassword Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist
Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationOracle WebCenter Content
Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: khutchings@usdatamanagement.com Introduction In May 2011, US Data Management (USDM) was
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie
ShibboLEAP Project Final Report: School of Oriental and African Studies (SOAS) Colin Rennie May 2006 Shibboleth Implementation at SOAS Table of Contents Introduction What this document contains Who writes
More informationNovell to Microsoft Conversion: Identity Management Design & Plan
Novell to Microsoft Conversion: Identity Management Design & Plan Presented To: 3/2/2011 1215 Hamilton Lane, Suite 200 Naperville, IL 60540 www.morantechnology.com Voice & Fax: 877-212-6379 Version History
More informationOakland County Department of Information Technology Project Scope and Approach
Oakland County Department of Information Technology Project Scope and Approach Project Name: Microsoft Enterprise Deployment Program 211-12 Project ID: T6186ED Leadership Group: Information Technology
More informationSOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
More informationThe Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
More informationThe following sections provide information on the features and tasks of Server Inventory:
IIServer Inventory The Server Inventory component of Novell ZENworks 7 Server Management enables you to collect hardware and software inventory information from local and remote servers of your enterprise.
More informationAchieving HIPAA Compliance with Identity and Access Management
Achieving HIPAA Compliance with Identity and Access Management A Healthcare Case Study Stephen A. Whicker Manager Security Compliance HIPAA Security Officer AHIS/St. Vincent Health DISCLAIMER: The views
More informationGeorgia State University: Building an Identity Management Infrastructure for the euniversity
NMI-EDIT NMI Integration Testbed Identity and Access Management Case Study Series Georgia State University: Building an Identity Management Infrastructure for the euniversity October 2004 NMI-EDIT Case
More informationPROJECT SUMMARY OBSERVATIONS, RECOMMENDATIONS, AND RESPONSES
PROJECT SUMMARY Overview Information technology (IT) processes and controls within Computing and Information Services (CIS) at Texas A&M University provide reasonable assurance that resources are used
More informationUniversity of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01
QUESTIONS 1. On page 12 of the RFP, it mentions the use of a Custom Identity Management (IdM) solution. Could you please share with us the platform and nature of the IdM System or any other relevant details,
More informationIDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator
IDENTITY MANAGEMENT ROLLOUT: IN A HURRY Jason Blackader, UNIX Systems Administrator Undergraduate, Graduate, Continuing Ed Industrial Design, Communication Design, Design Sciences, Arts & Media Two Campuses
More informationOracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
More informationTransformation of POS Operations at
Transformation of POS Operations at Retail Outlets for Australian Telco Abstract A leading Australian telecommunications service provider wanted to upgrade its Point of Sale (POS) operations at its retail
More informationCloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
More informationEnhancing Collaboration by Extending the Groups Directory Infrastructure. James Cramton Brown University
Enhancing Collaboration by Extending the s Directory Infrastructure James Cramton Brown University Why We are Here De-duplication without all the facts Software in central business system identifies individuals
More informationIdentity Assurance Framework
Executive Summary Assurance of a user s identity in an electronic system is required for many University business processes to function efficiently and effectively. As the risk associated with an electronic
More informationProject Scope and Approach
Oakland County Department of Information Technology Project Scope and Approach Project Name: IVR Platform Upgrade Project ID: D90186IV Leadership Group: Information Technology Steering Committee Department:
More informationActive Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
More informationNetwork Computing Architects Inc. (NCA) Network Operations Center (NOC) Services
Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following
More informationE-Business Suite Oracle SOA Suite Integration Options
Specialized. Recognized. Preferred. The right partner makes all the difference. E-Business Suite Oracle SOA Suite Integration Options By: Abhay Kumar AST Corporation March 17, 2014 Applications Software
More informationeverything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service]
everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service] [Essential Third Party Integration] [Cross Platform Service Desk Solution] [Reporting
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationInformation Security Operational Procedures
College Of Coastal Georgia Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides a general framework of the policy utilized by
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
More informationTable of Contents. Page 1 of 6 (Last updated 30 July 2015)
Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational
More informatione-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
More informationProposal No. P16/9921 Records Management Platform
Answers to Vendor Questions Questions are in black, Answers are in red 1. Please expand on the types of restrictions PCCCD is interested in. Provide what kinds of restrictions your system has the ability
More informationWhite paper: Information Rights Management for IBM FileNet. www.seclore.com Page 1
White paper: Information Rights Management for IBM FileNet www.seclore.com Page 1 Introduction Today, organizations worldwide are being bombarded by volumes of information flowing through email, internet
More informationAn Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
More informationPosition Description. Job Summary: Campus Job Scope:
Position Description Report Run Date Sep 10 2015 11:07AM Position Number: 02018467 Dept: ENT APPS & INFRASTRUCTURE SVCS - 061419 Position: WNDOWS SYSTEM APPLICATION ADMINISTRATOR Approved Payroll Title
More informationP-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.
P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines
More informationSTATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses
STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with
More information<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications
Integrating your On-Premise Applications with Cloud Applications Agenda Hybrid IT Infrastructure An Emerging Trend A New Set of Challenges The Five Keys to Overcoming the Challenges
More informationExternal Authentication with WebCT. What We ll Discuss
External Authentication with WebCT WebCT, Inc http://www.webct.com/ What We ll Discuss Introductions Terminology Authentication in WebCT External Authentication Custom Authentication Authorization in WebCT
More informationIntegrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
More informationOracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008
Oracle Business Intelligence Enterprise Edition LDAP-Security Administration White Paper by Shivaji Sekaramantri November 2008 OBIEE LDAP-Security Administration Before You Start... 3 Executive Overview...
More informationAchieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system
More informationOracle Desktop Virtualization
Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on
More informationUser Guide Microsoft Exchange Remote Test Instructions
User Guide Microsoft Exchange Remote Test Instructions University of Louisville Information Technology 1.1 Who Should Use It This guide is intended for University of Louisville Faculty and Staff participating
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
More informationIntegrated Approach to User Account Management
Mission Critical Enterprise Systems Symposium 2006 Integrated Approach to User Account Management Kesselman, Glenn and Smith, William Lockheed Martin Mission Services Quest Software Public Sector October
More informationWebsense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
More informationOffice of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
More informationPREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
More informationVendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
More informationThe School Board of Palm Beach
Project Change Request Customer Name: County, Florida Customer Number: 6873401 The School Board of Palm Beach Reference Agreement: Florida State Term Software contract: 252-008-05-ACS Contract #: CFTJQOP
More informationManagement. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.
ORACLE Oracle Press Oracle Fusion Middleware 11 g Architecture and Management Reza Shafii Stephen Lee Gangadhar Konduri Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan
More informationHP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide
HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal
More informationOracle Data Integrator 12c: Integration and Administration
Oracle University Contact Us: +33 15 7602 081 Oracle Data Integrator 12c: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive data integration
More informationLinux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
More informationOracle Data Integrator 11g: Integration and Administration
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709 Oracle Data Integrator 11g: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive
More informationDefine and manage the business rules that will drive eligibility assessments across human services programs
Table 1 HSE Platform Services and Capabilities (Components) Identity Management Consent Management Portal Enterprise Information Exchange Master Data Management Ensure individuals are identified across
More informationAPI Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
More informationUse of Commercial Backup Software with Juris (Juris 2.x w/msde)
Use of Commercial Backup Software with Juris (Juris 2.x w/msde) Juris databases hosted on a Microsoft SQL Server 2000 Desktop Engine (MSDE) instance can be backed up manually through the Juris Management
More informationUniversity of Central Florida Class Specification Administrative and Professional. Director Systems and Operations
Director Systems and Operations Job Code: 2519 Report to the university Chief Technology Officer. Serve as the top technical administrator for enterprise systems and operations. Direct the functional areas
More informationINTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
More informationState of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW)
State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW) ServiceNow Implementation Project Objectives to be completed are: 1. Aide in optimizing processes and integration
More informationOracle Identity Manager, Oracle Internet Directory
Oracle Identity Manager (OIM) is a user provisioning system. It defines properties for how users and groups get authorized to access compute and content resources across the enterprise. Identity Management
More informationSSL VPN A look at UCD through the tunnel
SSL VPN A look at UCD through the tunnel Background Why? Who is it for? Stakeholders IET Library Schools and Colleges Key Requirements Integrate with existing authentication Flexible security groups within
More informationSpecific observations and recommendations that were discussed with campus management are presented in detail below.
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and
More informationIBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
More informationLawson Technology: Implementation Considerations
Lawson Technology: Implementation Considerations Table of Contents Introduction...3 Lawson Security Highlights...3 Role-Based Security...5 Lawson Single Sign-On...6 Security and Self-Service Applications...7
More informationCustomer Bank Account Management System Technical Specification Document
Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6
More informationEvaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
More informationNetIQ Identity Manager Setup Guide
NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationPassword Management Guide
www.novell.com/documentation Management Guide Identity Manager 4.0.2 June 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationHow to Use ADP Self Service
How to Use ADP Self Service The new Employee Self Service system, accessible through the ADP Portal, allows employees to access their payroll statements and personal information on-line, 24 hours a day,
More informationCDAT Overview. Remote Managing and Monitoring of SESM Applications. Remote Managing CHAPTER
CHAPTER 1 The Cisco Distributed Administration Tool (CDAT) provides a set of web-based facilities that allow the service-provider administrator to perform two different sets of tasks: Remote managing and
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationIBM Tivoli Netcool Configuration Manager
IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage
More informationREDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public
REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION SD045 V4.1 Issue Date 04 07 2014 Page 1 Public 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s N3 Secure Remote Access (N3-SRA) Service offers
More informationIdentity Management Requirements
Identity Management Requirements Table of Contents 1 OVERVIEW... 3 1.1 Approach... 3 1.2 Architectural Goals and Constraints... 3 1.3 Business Requirements... 3 1.4 High Level Business Requirements Overview...
More informationCECH Virtual Lab Guide Windows 7/Vista Edition
CECH Virtual Lab Guide Windows 7/Vista Edition Introduction: This guide is a step-by-step walkthrough of installing, configuring, and using the VMware Horizon View Client to access the University of Cincinnati
More informationInformation Technology Solutions. Managed IT Services
Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance
More informationComputer Classroom Security Standard
Computer Classroom Security Standard Cal State Fullerton operates a heterogeneous network environment composed of centrally supported workstations, servers, and the network infrastructure. Along with administrative
More informationThe Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
More informationwww.novell.com/documentation Installation Guide Identity Manager 3.6.1 August 31, 2012
www.novell.com/documentation Installation Guide Identity Manager 3.6.1 August 31, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationSelf-Service Active Directory Group Management
Self-Service Active Directory Group Management 2015 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID Group Manager is a self-service group membership request portal. It allows users to request
More informationEnterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
More informationTEXAS AGRILIFE SERVER MANAGEMENT PROGRAM
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State
More informationAuthentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
More informationInformation Technology Services (ITS) Update
May 9, 2012 Dear Trinity Community, Information Technology Services (ITS) Update As the flurry of the end of a busy spring semester comes to close, Information Technology Services is gearing up for many
More informationGalveston College Wireless Network Users Setup Guide Version 1.0
Galveston College Wireless Network Users Setup Guide Version 1.0 TABLE OF CONTENT 1 DOCUMENT CONTROL RECORD... 3 2 ISSUE AND AMENDMENT RECORD... 3 3 GENERAL... 3 3.1 INTRODUCTION...3 3.2 OBJECTIVE... 3
More information