Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support

Size: px
Start display at page:

Download "Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support"

Transcription

1 Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version /9/2005 Current Environment Assessment Specification 1

2 CURRENT ENVIRONMENT ASSESSMENT SPECIFICATION 1. Introduction Purpose Key Participants Scope Integration Technologies... 5 Single Sign On:... 5 Customer Relation Management:... 6 Workstation Support: Application and Data Sources Interfaces Integration Matrix Integration Diagram Security Conclusions and Commentary Appendix A: References Current Environment Assessment Specification

3 1. Introduction This document defines the current information technology environment as it pertains to the business integration strategy and architecture as of 10/09/2005 for Georgia State University. The focus of this document is on three initiatives: Single Sign on Customer Relation Management Workstation Support Single Sign On - This initiative will provide a strategy to create a single entry point for authentication for all electronic web enabled resources maintained at Georgia State that require authentication. It can then be expanded to include access to universities across the country that require generic authentication to their resources. Technologies being defined include Internet2 s Shibboleth and eduperson, PersonRegistry created via Oracle, and Novell s edirectory which is a LDAP service. The major constraint in the current environment is that every system that is implemented at Georgia State University needs to create its own method of authenticating users as well as track the identity of the authenticated users. This also creates security issues because there are multiple entry points into the University s systems which need to be monitored. If security standards change in the future every resource that has its own authentication schema needs to be updated and tested for compliance. The University is experiencing something similar to this as the Board of Regents has announced that it wants the Universities systems to meet a security mandate which states that Social Security Number may no longer be used as a primary means of authentication for non payroll based systems. Customer Relation Management Currently Georgia State University Help Center uses Remedy to log trouble tickets and how to resolve it. There are a number of issues identified with this current process: It is not streamlined - the customer information data has to be entered to Remedy when customer calls the Help Center; the other problem is that there is no guarantee of documentation and knowledge reuse in the current process. Technicians are still being contacted in person, and there is not enforcements of what problem will be routed to 2 nd level or 3 rd level support. This document looks into the current technical configuration of the existing Remedy setup, and the call routing process. This document will serve as a reference for integrated architecture and process which will be proposed later on. Workstation Support - As a part of IS&T, Planning and Strategic Initiatives (P&SI) is responsible for providing workstation support to the campus. To better manage the estimated 10,000 workstations around campus, in December of 2004, IS&T purchased 10,000 1 licenses for the Symantec icommand software. However, implementation was delayed due to remote access limitations of the purchased version of the software. Upon receipt of a softwareupgrade in summer 2005, IS&T has been conducting appropriate testing, and the first implementation is anticipated to begin soon. Use of icommand will be piloted at IS&T as the first step of the implementation. One of the foreseen challenges in the enterprise-wide implementation is the acceptance of the use of icommand by various organizational units. Concerns over workstation security have been expresses, specifically, some faculty members are concerned that grade and exam information, may be compromised. Current Environment Assessment Specification 3

4 2. Purpose The purpose of the Current Environment Assessment is to document and assess the current integration technologies that support the business functions of the enterprise. This assessment will be used when determining recommended technologies and vendors in the Integration Architecture Document. 3. Key Participants The creators and the maintainers of this document are CIS 8020 Team number 2 consisting of Igor Wolbers, Tony Yuan, and Saeed Nadjariun. The intended audience members include: Director of Planning and Strategic Initiatives will use this document to ensure it is inline with its strategic mission. Director of Library Services Support will use this document to ensure that the architecture to be implemented is scalable enough to be used in an initiative to use generic authentication schemas for accessing library resources. Director of Advanced Campus Services will use this document to ensure that it is inline with other strategies that would utilize the outcomes of this initiative. IS&T technical staff The Planning and Strategic Initiatives (PS&I) Will use this document for appropriate planning and implementation. 4. Scope The scope of the environmental assessment includes: Single Sign On - All web enabled electronic resources which are maintained by the University of Georgia State as well as the various colleges that are a part of it, specifically any web enabled resource that requires authentication such as GILL, GOSOLAR, WebCT, etc... Customer Relation Management - IS&T s Help Center support efforts only. However the enhanced Help Center and its process will serve all faculty and staff at Georgia State University. Workstation Support - The current environment assessment covers all the operating units within Georgia State University where workstations are being used. 4 Current Environment Assessment Specification

5 5. Integration Technologies Single Sign On: Integration Technology Vendor Solutions Applications Messaging systems Integration brokers/servers Application servers with some integration Oracle RDBMS Packaged application integration PeopleSoft In progress Adapters and interfaces Enterprise service bus and Web services tools Data, information and content integration tools Portals B2B technology BPM technology WebCT Vista Current systems that use stored data will use Oracle to persist that data. Integrated security Novel s edirectory (LDAP solution) Currently just campus PC based authentication and eduperson by MACE None as of yet Other middleware technologies Point solution technology Custom integration solution Current Environment Assessment Specification 5

6 Customer Relation Management: Integration Technology Vendor Solutions Applications Messaging systems Integration brokers/servers Application servers with some integration Packaged application integration PeopleSoft Remedy system is currently not using Messaging to interface with other systems. Remedy currently pull information from PeopleSoft on nightly basis Adapters and interfaces Enterprise service bus and Web services tools Data, information and content integration tools Portals B2B technology BPM technology Integrated security Other middleware technologies Point solution technology Custom integration solution CRM is currently not in Portals Remedy Latest Release of Remedy has business process management capability Currently Remedy use its own build in Authentication / Authorization mechanism for security No Customized integration middle ware for CRM 6 Current Environment Assessment Specification

7 Workstation Support: Integration Technology Vendor Solutions Applications Messaging systems Integration brokers/servers Application servers with some integration Packaged application integration Symantec ON icommand Adapters and interfaces Enterprise service bus and Web services tools Data, information and content integration tools Portals B2B technology BPM technology Integrated security Other middleware technologies Point solution technology Custom integration solution 6. Application and Data Sources Interfaces Single Sign On: Application/Data Owner Platform Interface Reusable Source Name WebCT Vista UCCS Java 2 Platform (TBD) (TBD) GOSOLAR UCCS Unix (TBD) (TBD) GILL LSS Web enabled (TBD) (TBD) Groupwise UCCS MS Windows edirectory Yes Customer Relation Management: Application/Data Owner Platform Interface Reusable Source Name Remedy / People Soft data source Help Center Unix / Oracle API Yes Workstation Support: Application/Data Owner Platform Interface Reusable Source Name icommand Windows Through Windows Yes Support Group Active Directory or LDAP Current Environment Assessment Specification 7

8 7. Integration Matrix Single Sign On - Currently, the team is not aware that any of these applications are integrated in any way with the exception of a possible common data store where Student/Staff information is housed. Customer Relation Management Remedy PeopleSoft Help Center Oracle Database Remedy Manual Process JDBC / Read PeopleSoft Help Center Manual process Oracle Database Nightly feed job Nightly job update Workstation Support Not available Nightly job update 8. Integration Diagram Single Sign On This is the As Is diagram shows that although each service uses some of the data from staff and student repositories (shown in red) they are in charge keeping track of their own authentication schema as well as any security information that is used by that service. (Original diagram was taken from a Power Point presentation created by Art Vandenberg. The original diagram was altered to fit the needs of this document). 8 Current Environment Assessment Specification

9 This diagram shows that a user authenticates directly to any one particular service (WebCT, , etc.) and the service is in charge of authenticating the user by going to its own local data store or host data store to check the credentials. (Original diagram was taken from a Power Point presentation created by Art Vandenberg. The original diagram was altered to fit the needs of this document). Customer Relation Management: Remedy Enter New / Use Oracle / UNIX Nightly Update PeopleSoft Current Environment Assessment Specification 9

10 Workstation Support: This is an eschematic of the university backbone (2003) which is used here to depict the vastness of the GSU computing environment. The estimated 10,000 workstations are connected through the backbone. 10 Current Environment Assessment Specification

11 9. Security Single Sing On Authentication Authorization Auditing Confidentiality Nonrepudiation Internal data edirectory Oracle Checks Student ID and PIN Oracle credentials Verify user is a GSU member. edirectory Partner data Customer data Internal Application GoSOLAR GILL Partner application WebCT Vista Compares SSN and PIN Checks Student ID and PIN Checks Student ID and PIN Verifies if user is a GSU member. Verifies if user is a GSU member. <unsure> SSL <none> Verifies if user is a GSU member. <none> Customer Relation Management Authentication Authorization Auditing Confidentiality Non repudiation Customer data Remedy Remedy s own mechanism Remedy s own mechanism Remedy s own mechanism Remedy s own mechanism Workstation Support Authentication Authorization Auditing Confidentiality Non repudiation Customer data icommand Active Directory / LDAP Active Directory or LDAP icommand s own mechanism icommand s own mechanism Current Environment Assessment Specification 11

12 10. Conclusions and Commentary Single Sign On - The single sign on solution will have some obstacles as current disparate systems house redundant login information and credentials as well as their own means of authenticating. These different systems also run on different platforms. The scattered data will need to be consolidated into a single data store. The data store will then need a single point of access that these systems can use to communicate and authenticate with. Because of the different platforms used these methods will have to be able to be written using a platform independent technology like web services. Customer Relation Management - For Authentication / Authorization, there is current planning going to use the LDAP authentication option. IS&T is deploying an LDAP authentication directory for that purpose. The LDAP authentication will then be available for other systems (such as PeopleSoft HR, Financials; Banner Student, Financial Aid, etc.; GroupWise ...). The goal is to get a single LDAP authentication where users would use their CampusID and password. Remedy upgrade requires a significant process reengineering of CRM. We believe it will make IS&T more responsive, more competitive, and better trained to support customers. Workstation Support The implementation of the icommand software to automate the workstation support will require an iterative approach. This will help obtain buy-in from those organizations, within GSU, who maintain their own workstation support staff. Moreover, as IS&T completes each phase of the implementation, it will be able to document and show the robostness of the system; this is especially important to overcome concers over security. 12 Current Environment Assessment Specification

13 Appendix A: References External resources: Internal resources: september2004_files/gsu_nmi_results_at_i2-y3.ppt Current Environment Assessment Specification 13

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES 1. Federation Participant Information 1.1 The InCommon Participant Operational Practices information below is for: InCommon Participant organization

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

CA SiteMinder. Implementation Guide. r12.0 SP2

CA SiteMinder. Implementation Guide. r12.0 SP2 CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

PeopleSoft Enterprise Directory Interface

PeopleSoft Enterprise Directory Interface PeopleSoft Enterprise Directory Interface Today s self-service applications deliver information and functionality to large groups of users over the internet. Organizations use these applications as a cost-effective

More information

Information Technology Guide

Information Technology Guide Information Technology Guide Introduction Welcome to Byrdine F. Lewis School of Nursing and Health Professions (The Lewis School). This is a brief introduction and guide to information technology matters.

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Royal Roads University_ Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Oracle WebCenter Content

Oracle WebCenter Content Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: khutchings@usdatamanagement.com Introduction In May 2011, US Data Management (USDM) was

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie ShibboLEAP Project Final Report: School of Oriental and African Studies (SOAS) Colin Rennie May 2006 Shibboleth Implementation at SOAS Table of Contents Introduction What this document contains Who writes

More information

Novell to Microsoft Conversion: Identity Management Design & Plan

Novell to Microsoft Conversion: Identity Management Design & Plan Novell to Microsoft Conversion: Identity Management Design & Plan Presented To: 3/2/2011 1215 Hamilton Lane, Suite 200 Naperville, IL 60540 www.morantechnology.com Voice & Fax: 877-212-6379 Version History

More information

Oakland County Department of Information Technology Project Scope and Approach

Oakland County Department of Information Technology Project Scope and Approach Oakland County Department of Information Technology Project Scope and Approach Project Name: Microsoft Enterprise Deployment Program 211-12 Project ID: T6186ED Leadership Group: Information Technology

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

The Way to SOA Concept, Architectural Components and Organization

The Way to SOA Concept, Architectural Components and Organization The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new

More information

The following sections provide information on the features and tasks of Server Inventory:

The following sections provide information on the features and tasks of Server Inventory: IIServer Inventory The Server Inventory component of Novell ZENworks 7 Server Management enables you to collect hardware and software inventory information from local and remote servers of your enterprise.

More information

Achieving HIPAA Compliance with Identity and Access Management

Achieving HIPAA Compliance with Identity and Access Management Achieving HIPAA Compliance with Identity and Access Management A Healthcare Case Study Stephen A. Whicker Manager Security Compliance HIPAA Security Officer AHIS/St. Vincent Health DISCLAIMER: The views

More information

Georgia State University: Building an Identity Management Infrastructure for the euniversity

Georgia State University: Building an Identity Management Infrastructure for the euniversity NMI-EDIT NMI Integration Testbed Identity and Access Management Case Study Series Georgia State University: Building an Identity Management Infrastructure for the euniversity October 2004 NMI-EDIT Case

More information

PROJECT SUMMARY OBSERVATIONS, RECOMMENDATIONS, AND RESPONSES

PROJECT SUMMARY OBSERVATIONS, RECOMMENDATIONS, AND RESPONSES PROJECT SUMMARY Overview Information technology (IT) processes and controls within Computing and Information Services (CIS) at Texas A&M University provide reasonable assurance that resources are used

More information

University of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01

University of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01 QUESTIONS 1. On page 12 of the RFP, it mentions the use of a Custom Identity Management (IdM) solution. Could you please share with us the platform and nature of the IdM System or any other relevant details,

More information

IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator

IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator IDENTITY MANAGEMENT ROLLOUT: IN A HURRY Jason Blackader, UNIX Systems Administrator Undergraduate, Graduate, Continuing Ed Industrial Design, Communication Design, Design Sciences, Arts & Media Two Campuses

More information

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...

More information

Transformation of POS Operations at

Transformation of POS Operations at Transformation of POS Operations at Retail Outlets for Australian Telco Abstract A leading Australian telecommunications service provider wanted to upgrade its Point of Sale (POS) operations at its retail

More information

Cloud Services Catalog with Epsilon

Cloud Services Catalog with Epsilon Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these

More information

Enhancing Collaboration by Extending the Groups Directory Infrastructure. James Cramton Brown University

Enhancing Collaboration by Extending the Groups Directory Infrastructure. James Cramton Brown University Enhancing Collaboration by Extending the s Directory Infrastructure James Cramton Brown University Why We are Here De-duplication without all the facts Software in central business system identifies individuals

More information

Identity Assurance Framework

Identity Assurance Framework Executive Summary Assurance of a user s identity in an electronic system is required for many University business processes to function efficiently and effectively. As the risk associated with an electronic

More information

Project Scope and Approach

Project Scope and Approach Oakland County Department of Information Technology Project Scope and Approach Project Name: IVR Platform Upgrade Project ID: D90186IV Leadership Group: Information Technology Steering Committee Department:

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following

More information

E-Business Suite Oracle SOA Suite Integration Options

E-Business Suite Oracle SOA Suite Integration Options Specialized. Recognized. Preferred. The right partner makes all the difference. E-Business Suite Oracle SOA Suite Integration Options By: Abhay Kumar AST Corporation March 17, 2014 Applications Software

More information

everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service]

everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service] everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service] [Essential Third Party Integration] [Cross Platform Service Desk Solution] [Reporting

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Information Security Operational Procedures

Information Security Operational Procedures College Of Coastal Georgia Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides a general framework of the policy utilized by

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Table of Contents. Page 1 of 6 (Last updated 30 July 2015) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

e-governance Password Management Guidelines Draft 0.1

e-governance Password Management Guidelines Draft 0.1 e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.

More information

Proposal No. P16/9921 Records Management Platform

Proposal No. P16/9921 Records Management Platform Answers to Vendor Questions Questions are in black, Answers are in red 1. Please expand on the types of restrictions PCCCD is interested in. Provide what kinds of restrictions your system has the ability

More information

White paper: Information Rights Management for IBM FileNet. www.seclore.com Page 1

White paper: Information Rights Management for IBM FileNet. www.seclore.com Page 1 White paper: Information Rights Management for IBM FileNet www.seclore.com Page 1 Introduction Today, organizations worldwide are being bombarded by volumes of information flowing through email, internet

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

Position Description. Job Summary: Campus Job Scope:

Position Description. Job Summary: Campus Job Scope: Position Description Report Run Date Sep 10 2015 11:07AM Position Number: 02018467 Dept: ENT APPS & INFRASTRUCTURE SVCS - 061419 Position: WNDOWS SYSTEM APPLICATION ADMINISTRATOR Approved Payroll Title

More information

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines

More information

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with

More information

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications Integrating your On-Premise Applications with Cloud Applications Agenda Hybrid IT Infrastructure An Emerging Trend A New Set of Challenges The Five Keys to Overcoming the Challenges

More information

External Authentication with WebCT. What We ll Discuss

External Authentication with WebCT. What We ll Discuss External Authentication with WebCT WebCT, Inc http://www.webct.com/ What We ll Discuss Introductions Terminology Authentication in WebCT External Authentication Custom Authentication Authorization in WebCT

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008 Oracle Business Intelligence Enterprise Edition LDAP-Security Administration White Paper by Shivaji Sekaramantri November 2008 OBIEE LDAP-Security Administration Before You Start... 3 Executive Overview...

More information

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/ Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system

More information

Oracle Desktop Virtualization

Oracle Desktop Virtualization Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on

More information

User Guide Microsoft Exchange Remote Test Instructions

User Guide Microsoft Exchange Remote Test Instructions User Guide Microsoft Exchange Remote Test Instructions University of Louisville Information Technology 1.1 Who Should Use It This guide is intended for University of Louisville Faculty and Staff participating

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

Integrated Approach to User Account Management

Integrated Approach to User Account Management Mission Critical Enterprise Systems Symposium 2006 Integrated Approach to User Account Management Kesselman, Glenn and Smith, William Lockheed Martin Mission Services Quest Software Public Sector October

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

Vendor Questionnaire

Vendor Questionnaire Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining

More information

The School Board of Palm Beach

The School Board of Palm Beach Project Change Request Customer Name: County, Florida Customer Number: 6873401 The School Board of Palm Beach Reference Agreement: Florida State Term Software contract: 252-008-05-ACS Contract #: CFTJQOP

More information

Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.

Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill. ORACLE Oracle Press Oracle Fusion Middleware 11 g Architecture and Management Reza Shafii Stephen Lee Gangadhar Konduri Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan

More information

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal

More information

Oracle Data Integrator 12c: Integration and Administration

Oracle Data Integrator 12c: Integration and Administration Oracle University Contact Us: +33 15 7602 081 Oracle Data Integrator 12c: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive data integration

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

Oracle Data Integrator 11g: Integration and Administration

Oracle Data Integrator 11g: Integration and Administration Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709 Oracle Data Integrator 11g: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive

More information

Define and manage the business rules that will drive eligibility assessments across human services programs

Define and manage the business rules that will drive eligibility assessments across human services programs Table 1 HSE Platform Services and Capabilities (Components) Identity Management Consent Management Portal Enterprise Information Exchange Master Data Management Ensure individuals are identified across

More information

API Architecture. for the Data Interoperability at OSU initiative

API Architecture. for the Data Interoperability at OSU initiative API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models

More information

Use of Commercial Backup Software with Juris (Juris 2.x w/msde)

Use of Commercial Backup Software with Juris (Juris 2.x w/msde) Use of Commercial Backup Software with Juris (Juris 2.x w/msde) Juris databases hosted on a Microsoft SQL Server 2000 Desktop Engine (MSDE) instance can be backed up manually through the Juris Management

More information

University of Central Florida Class Specification Administrative and Professional. Director Systems and Operations

University of Central Florida Class Specification Administrative and Professional. Director Systems and Operations Director Systems and Operations Job Code: 2519 Report to the university Chief Technology Officer. Serve as the top technical administrator for enterprise systems and operations. Direct the functional areas

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW)

State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW) State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW) ServiceNow Implementation Project Objectives to be completed are: 1. Aide in optimizing processes and integration

More information

Oracle Identity Manager, Oracle Internet Directory

Oracle Identity Manager, Oracle Internet Directory Oracle Identity Manager (OIM) is a user provisioning system. It defines properties for how users and groups get authorized to access compute and content resources across the enterprise. Identity Management

More information

SSL VPN A look at UCD through the tunnel

SSL VPN A look at UCD through the tunnel SSL VPN A look at UCD through the tunnel Background Why? Who is it for? Stakeholders IET Library Schools and Colleges Key Requirements Integrate with existing authentication Flexible security groups within

More information

Specific observations and recommendations that were discussed with campus management are presented in detail below.

Specific observations and recommendations that were discussed with campus management are presented in detail below. CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

Lawson Technology: Implementation Considerations

Lawson Technology: Implementation Considerations Lawson Technology: Implementation Considerations Table of Contents Introduction...3 Lawson Security Highlights...3 Role-Based Security...5 Lawson Single Sign-On...6 Security and Self-Service Applications...7

More information

Customer Bank Account Management System Technical Specification Document

Customer Bank Account Management System Technical Specification Document Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

NetIQ Identity Manager Setup Guide

NetIQ Identity Manager Setup Guide NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Password Management Guide

Password Management Guide www.novell.com/documentation Management Guide Identity Manager 4.0.2 June 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

How to Use ADP Self Service

How to Use ADP Self Service How to Use ADP Self Service The new Employee Self Service system, accessible through the ADP Portal, allows employees to access their payroll statements and personal information on-line, 24 hours a day,

More information

CDAT Overview. Remote Managing and Monitoring of SESM Applications. Remote Managing CHAPTER

CDAT Overview. Remote Managing and Monitoring of SESM Applications. Remote Managing CHAPTER CHAPTER 1 The Cisco Distributed Administration Tool (CDAT) provides a set of web-based facilities that allow the service-provider administrator to perform two different sets of tasks: Remote managing and

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

IBM Tivoli Netcool Configuration Manager

IBM Tivoli Netcool Configuration Manager IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage

More information

REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public

REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION SD045 V4.1 Issue Date 04 07 2014 Page 1 Public 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s N3 Secure Remote Access (N3-SRA) Service offers

More information

Identity Management Requirements

Identity Management Requirements Identity Management Requirements Table of Contents 1 OVERVIEW... 3 1.1 Approach... 3 1.2 Architectural Goals and Constraints... 3 1.3 Business Requirements... 3 1.4 High Level Business Requirements Overview...

More information

CECH Virtual Lab Guide Windows 7/Vista Edition

CECH Virtual Lab Guide Windows 7/Vista Edition CECH Virtual Lab Guide Windows 7/Vista Edition Introduction: This guide is a step-by-step walkthrough of installing, configuring, and using the VMware Horizon View Client to access the University of Cincinnati

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

Computer Classroom Security Standard

Computer Classroom Security Standard Computer Classroom Security Standard Cal State Fullerton operates a heterogeneous network environment composed of centrally supported workstations, servers, and the network infrastructure. Along with administrative

More information

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Benefits of an Industry Standard Platform for Enterprise Sign-On white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed

More information

www.novell.com/documentation Installation Guide Identity Manager 3.6.1 August 31, 2012

www.novell.com/documentation Installation Guide Identity Manager 3.6.1 August 31, 2012 www.novell.com/documentation Installation Guide Identity Manager 3.6.1 August 31, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Self-Service Active Directory Group Management

Self-Service Active Directory Group Management Self-Service Active Directory Group Management 2015 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID Group Manager is a self-service group membership request portal. It allows users to request

More information

Enterprise Identity Management Reference Architecture

Enterprise Identity Management Reference Architecture Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture

More information

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

Information Technology Services (ITS) Update

Information Technology Services (ITS) Update May 9, 2012 Dear Trinity Community, Information Technology Services (ITS) Update As the flurry of the end of a busy spring semester comes to close, Information Technology Services is gearing up for many

More information

Galveston College Wireless Network Users Setup Guide Version 1.0

Galveston College Wireless Network Users Setup Guide Version 1.0 Galveston College Wireless Network Users Setup Guide Version 1.0 TABLE OF CONTENT 1 DOCUMENT CONTROL RECORD... 3 2 ISSUE AND AMENDMENT RECORD... 3 3 GENERAL... 3 3.1 INTRODUCTION...3 3.2 OBJECTIVE... 3

More information