Identity and Access Management (IAM) Linkage to Innovative Service Delivery Brian Reed, IAM Practice Lead, HP Enterprise Services, Canada

Size: px
Start display at page:

Download "Identity and Access Management (IAM) Linkage to Innovative Service Delivery Brian Reed, IAM Practice Lead, HP Enterprise Services, Canada"

Transcription

1 Identity and Access Management (IAM) Linkage to Innovative Service Delivery Brian Reed, IAM Practice Lead, HP Enterprise Services, Canada February 17 th, 2012 Victoria, B.C.

2 Presentation Outline Session Objectives IAM Linkage to Innovative Service Delivery: Case Study 1: Belgium - Flemish e-government Transformation Shifting from pull to innovative push models is changing the urgency for IAM Case Study 2: EU Self Certification Enabling Self Certification for Benefits Eligibility through Voice Print Biometrics and Mobile Authentication DEMO live voice print demonstration Case Study 3: Mobile Voting Global IAM Business Challenges Implications for IAM Program Design Market trends and models Technology considerations Reference architectures Global Initiatives: British Business Federation Authority (BBFA) Federated Identity Management Reference Implementations Government of Canada Pension Modernization: IAM Framework of Enterprise Applications U.S. Access India UID Solution Convergence Summary

3 Session Objectives To share through case studies, the linkages between fiscal climate change and IAM; and linkages of IAM to innovative service delivery To share reference models and innovative strategies for deploying large scale IAM solutions To exchange ideas about the business challenges of the public sector with respect to identity and access management

4 IAM LINKAGE TO INNOVATIVE SERVICE DELIVERY 4 HP Restricted 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

5 A Climate Change in Government Finance, not just a few Bad Winters US Federal Debt as Percentage of GDP ( ) 150% 121% 100% 102% Factors Impacting Long-Term Government Finances 50% 33% Ageing population 0% 40% Taxes as Percentage of GDP in OECD Countries ( ) Source: Office of Management and Budget Rising citizen service expectations 35% Sustainability 25% 20% Source: OECD Tax erosion from globalisation and ageing population

6 Operating Expense and IT Expenditure Average Total Operating Expense Average Breakdown of IT Expenditure 93.5% 6.5% Transform and Grow 27% Run 73% Source: Gartner, Inc., IT Key Metrics Data 2010: Key Industry Measures: Government Analysis: Multi Year

7 IT strategy to manage the fiscal crisis Minimize Maximize Explore 1 IT Run 2 Government 3 Disruptive Spending Return on IT Solutions

8 Maximizing Government Return on IT PUBLIC VALUE RETURN Policy Outcomes & Outputs Efficiency Quality of Service Public Trust Public Taxpayers Customers Citizens Government = Return on IT IT SPENDING

9 SERVICE DELIVERY INNOVATION CASE STUDIES 1) e-government: Belgium and the Flemish Government (2) Human services: EU Self-Certification using Mobile Telephony (3) Mobile Voting

10 Belgium / Flanders - MAGDA Platform

11 Case Study 1: Belgium and Flemish Government, Integrated focus on citizen & business value once-only data collection, multiple data (re) use i.e. A government that does not ask for what it already knows, and is truly certain of what it knows Key Drivers : Improved service delivery reduce administrative burden for enterprises pro-active delivery of entitlements to citizens Improved internal operations / administration avoid unnecessary double work (data entry & quality) simplify and streamline existing administrative processes 11

12 Origin: «Only Ask it Once» Situation Political support: Minister in charge had the key message in his policy letter e-government team in place Focus on citizen support resolution in parlement Focus e-gov on citizen and business at the regional level Implement the Only ask it regional level and extend to national level Ensure maximum privacy Only Ask it Once MAGDA ( Maximum Data Sharing Flemish Parliament Between Administrations and Agencies ) Platform 12

13 Framework components: Key Building Blocks Goal : Citizen Value Platform : MAGDA Citizen Value MAGDA Part of the coalition agreement and longterm vision (VIA) Authentic Data : the information, the value VIA 2020 strategy Authentic Sources Commitment Change agent Change agent : driver Legal & privacy regulation E-ID : the key to get access E-ID : key Legal Privacy (Video) 13

14 Case Study 2: Human services: Self-Certification using Mobile Telephony: EU Example Challenges: Increased demand for unemployment benefits Intense manual processes On-going certification requires regular visits to the Department for Social Protection Local Offices Long lines, staff overloaded Reduce welfare fraud and Desired Policy Outcomes: Improve service delivery against Customer Charter and Action Plan Increase certification frequency, to help reduce fraud and overpayments Examine new communication channels, including Self Certification using mobile telephony Ensure on-going controls are in place overpayments 14

15 PUBLIC VALUE FRAMEWORK SOCIAL PROTECTION PUBLIC VALUE POLICY OUTCOMES QUALITY OF SERVICE PUBLIC TRUST EFFICIENCY EXECUTIVE KPI CORE FINANCIAL KPI Increase Participation Easy Access, Prompt and Accurate Service (On-Budget) Planned vs. Actual Maximize FFP Identity and Secure and Incentives ; Access to Service Minimize Penalties; Minimize Fraud Admin Exp. As a Percentage of Benefits Expenditures BUSINESS INITIATIVES Implement New Access Channels Improve Registration and Authentication Control Benefit Expenditures / Reduce Fraud OPERATING KPI PROCESS/FUNCTION Improve Registration Intake / Eligibility Determination Improve Authentication and Access Reporting and Intake Improve Accuracy and Timeliness Payment Process PS Initiatives Mobile Certification IT Initiatives Application Services, Data Integration Services, Converged Infrastructure

16 Enrolment Best-Practices and Benefits Enrolment Best Practices Explain Enrolment process, obtain consent Gather voice sample, verify capture Verify enrolment with a test certification Enrolment complete Opt-in Service Benefits Supports in-country mobility Leverages voice print biometrics Reduces need to visit local offices Reduces program administration costs 16 Quick Demo

17 Case Study 3: Mobile Voting; Electoral Participation; Rising Expectations Developed countries Decline in voter participation Drop in turnout among young people Only 37.4 per cent of voters aged 18 to 24-years-old voted in the 2008 Canadian federal election, similar in US & UK; 49% of all eligible voters in 2011 Ontario election Developing countries Challenge to communicate information on polling centre locations and hours of operation Haiti elections: cell phones and internet to facilitate voter turnout United Nations Development Programme, Newsroom, March 18,

18 Internet mobile phone voting Example of mobile voting process Home Authentication Select candidate Cast Vote Confirmation Authentication Servicios Select Servicios Candidates Servicios Cast vote Servicios Confirmation Candidates Authentication Help Language Identification x PIN : Select your candidate from the next list and press ok: Candidate 1 Candidate 2 Candidate 3 You have selected next candidate: Candidate 1 Confirm and Cast vote? Your vote have been sent and cast. Receipt: fdsfksdopfiwpreoiwepoi gghfghfghgfhgfh Send Modify Send Have a nice day! Exit Back Help Back Next Help Mail receipt End First display shows browser menu and option to change language before proceeding. Authorize access to voting service through secure authentication Browse through candidates list (one after one), displaying: Candidate name and Party logo Confirm candidate selection, cipher the vote and cast the ballot Confirmation that the vote has been recorded, including a proof for the voter 18

19 GLOBAL IDENTITY MANAGEMENT BUSINESS CHALLENGES Implications for IAM Program Design: Market Trends and Models Reference Architectures Global Initiatives Reference Implementations 19 HP Restricted 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

20 Global Identity Management Business Challenges Citizens and businesses are demanding simpler access to government services across multiple delivery channels Privacy must be considered from both a trust and compliance perspective Current state: proliferation of identity stores and access management systems frustrate a citizen-centric transformation Citizens not only have multiple personas and contexts in terms of their interaction with government but they have multiple identities Understanding these personas and mapping them to appropriate information access is a significant business challenge Technologies are more mature but integration with legacy systems is still complex

21 Implications for IAM Program Design Business strategy and analysis of information management requirements need to lead introduction of technology Need to understand the risk profile of information assets and transactions and map to required levels of identity assurance Need to assess trade-offs: convenience versus control; individual control versus institutional control; cost versus residual risk Identify business partners and establish governance over IAM including trust agreements and levels of assurance on identity management process

22 Identity, Access and Governance Establishing trusted digital identities-identity proofing Authentication and risk Managing policy - authorization, personas, context Governance - authoritative sources, trust relationships, liability

23 What can IAM Enable? Streamlined service delivery from a government and citizen/business perspective - cost to serve, multi-channel A trust fabric for e-government essential for adoption A customized client experience BYOD Enhanced program integrity Reduced fraud and error Increased privacy protection Capability to push programs/services as well as provide targeted access to information

24 MARKET TRENDS AND MODELS 2011 Hewlett-Packard Development Company, L.P. HP 24 Restricted The information contained herein is subject to change without notice

25 Gartner IAM Hype Cycle Less than 2 years 2 to 5 years 5 to 10 years More than 10 years Key Points: transformational high 1.Value drives adoption 2.Hard to predict moderate technology curves 3.Industries drive specific solutions e.g. healthcare low

26 IAM Technology Considerations Granularity Context awareness Adaptive Delegation Extensibility Federation Standardization Legacy apps support-adapters e.g. provisioning Support for multiple authentication schemes Completeness of applicationscomponents or suites?

27 REFERENCE ARCHITECTURES 2011 Hewlett-Packard Development Company, L.P. HP 27 Restricted The information contained herein is subject to change without notice

28 Citizenship and Immigration Canada -TRBP

29 Oklahoma State Healthcare Information System Identity Management Policy & Access Management Federation & Access Control Digital Identity (X.509) SAML Token Service (STS) Auditing & Reporting User Registration Reliability/Data Integrity Interoperability - HIE, NwHIN Connect Data Management Firewall/DMZ Provisioning & De-provisioning Authorization (RBAC) Identity Registry Escalation - SOA Suite Governance - NIST Framework Perimeter Level Security

30 GLOBAL INITIATIVES British Business Federation Authority (BBFA) Federated Identity Management 2011 Hewlett-Packard Development Company, L.P. HP 30 Restricted The information contained herein is subject to change without notice

31 Building a Consistent Approach to Customer-Centric Digital Identity Assurance across all Public Services

32 UK Citizen Access to Government Services

33 Context of Identity

34 REFERENCE IMPLEMENTATIONS 2011 Hewlett-Packard Development Company, L.P. HP 34 Restricted The information contained herein is subject to change without notice

35 Government Canada Application Modernization and IAM (Pension Modernization) Access Management Applications Identity Management PKI Based Authentication Web Server AM WebGate TruePass SVM Authentication Events Oracle Access Manager AM WebGate AM WebGate Pay Matane Imaging Web Application AM WebGate Insurance AM WebGate Identity Manager Web Server OC4J Connector Active Member Enrolement Web Server AM WebGate TruePass Application Server Oracle WebLogic Application Server Userid & Password Authentication Web Server AM WebGate WebPass Access Manager Administration Web Server Policy Manager WebPass Oracle Access Manager Configuration Manager Oracle Application Server / OC4J OAM Configuration Manager Database Authentication Events AM WebGate Access Manager Access Server Access Manager Identity Server IDM Oracle Single Sign On (OSSO) Server Oracle Application Server / OC4J OAM Audit Records Access Manager Audit Database Authorization Events/Single Sign-On/ Session Management OSSO Session Creation Oracle Virtual Directory AM WebGate AM WebGate AM WebGate AM WebGate AM WebGate AM WebGate osso Siebel Call Centre Oracle Business Intelligence Dashboard Answers PenWeb Data Capture Tool Penfax Oracle Portal Crown Corporation Portal Active Member Pension Application Web Content Management Authentication Requests Authorization Lookups User Profile Operations Synchronization of user information via G+ adapter Authentication Requests Provisioning & reconciliation of user information IDM OID Genesys Workforce Management Provisioning of user info and reconciliation of groups & users Integration Broker BPEL Worklist Provisioning of user info and reconciliation of groups & users Hyperion Reports Provisioning of user info and reconciliation of groups & users Hyperion periodically connects to the IDM OID and updates it s security repository with the list of valid users. Universal Customer Master Portal OID Trusted reconciliation of employer representative information Provisioning & reconciliation of user information Oracle Application Server / OC4J Siebel Connector PenWeb Connector DCT Connector Penfax Connector OID Connector OID Connector Oracle Identity Manager API Oracle Identity Manager Active Member Authoritative Source DB Tables Connector Identity Manager Database Directory / Data Services TruePass SVM WebLogic Application Server Plugin Active Member Enrolment Application Oracle WebLogic Application Server Validation of shared secrets & reconciliation of user information PenWeb Database

36 USAccess and FEDERATED IDENTITY- CONCEPTUAL ARCHITECTURE Source: FICAM Roadmap and Implementation Guidance

37 India-Unique ID Programme Architecture

38 SUMMARY

39 Convergence of "Service Innovation" and "Technology Innovation" will Deliver Greatest Public Value Service Innovation Prevention Participation Collaboration Technology Innovation Mobility IAM: Whole-of- Government Enablers Cloud Computing Analytics 39

40 Summary A climate change in public finances is helping drive demand for IAM innovation IAM is not just a technology but a critical foundation block for e-government / m-government IAM must help improve policy outcomes, increase service quality, efficiencies and help build citizen trust Need to continue collaboration to develop and leverage IDM policy frameworks (e.g. Kantara and PanCanadian IDMA model) Need for a consistent framework for Whole of Government Enablers, to support both internal and external social media, collaborative tools, mobility, and access to public sector service delivery through multiple channels-anytime, anywhere The movement to cloud based services and mobile access is driving federated identity solutions. Incremental steps, pilots, and proof of concepts are delivering on the early promises of federation.

41 Presenter Contact Data Brian Reed, IAM Practice Lead, HP Canada Enterprise Services 41

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement

More information

Oracle IDM Integration with E-Business Suite & Middleware Technologies

Oracle IDM Integration with E-Business Suite & Middleware Technologies Oracle IDM Integration with E-Business Suite & Middleware Technologies Session ID#: 14251 Prepared by: Scott Brinker IDM Security Specialist CAP Deepak Sharma Sr. Consultant AST Corporation REMINDER Check

More information

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization

More information

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management

More information

Oracle Mobile Security Suite. René Klomp 6 mei 2014

Oracle Mobile Security Suite. René Klomp 6 mei 2014 Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be

More information

Enterprise Identity Management Reference Architecture

Enterprise Identity Management Reference Architecture Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

HOL9449 Access Management: Secure web, mobile and cloud access

HOL9449 Access Management: Secure web, mobile and cloud access HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle

More information

Oracle Fusion Middleware 11g Release 1 IDM Suite

Oracle Fusion Middleware 11g Release 1 IDM Suite Oracle Fusion Middleware 11g Release 1 IDM Suite Rodger King Senior Principal Support Engineer The following is intended to outline our general product direction. It is intended for information purposes

More information

Identity Governance Evolution

Identity Governance Evolution Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle

More information

The Unique Alternative to the Big Four. Identity and Access Management

The Unique Alternative to the Big Four. Identity and Access Management The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing

More information

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release

More information

Oracle E-Business Suite Single Sign On Using Oracle Access Manager

Oracle E-Business Suite Single Sign On Using Oracle Access Manager Oracle E-Business Suite Single Sign On Using Oracle Access Manager Session ID#: 301 Prepared by: Pierre Paniagua Consultant AST Corporation REMINDER Check in on the COLLABORATE mobile app About Pierre

More information

Oracle Reference Architecture and Oracle Cloud

Oracle Reference Architecture and Oracle Cloud Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended

More information

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services

More information

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003 Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled

More information

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

<Insert Picture Here> Oracle Identity And Access Management

<Insert Picture Here> Oracle Identity And Access Management Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.

More information

Identity and Access Management for the Hybrid Enterprise

Identity and Access Management for the Hybrid Enterprise Identity and Access Management for the Hybrid Enterprise Redmond Identity Summit 2014 Directories Devices Identity Keith Brintzenhofe Microsoft Corporation Thank You to our Sponsors Gold Silver Plus Silver

More information

Can We Reconstruct How Identity is Managed on the Internet?

Can We Reconstruct How Identity is Managed on the Internet? Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand

More information

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August

More information

A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries

A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries Leonie Spoerer, Yashik Singh and Maurice Mars Dept of TeleHealth, University of KwaZulu-Natal

More information

State of Vermont Guidance on the Re-use of Software Products, Shared Components, and Hosted Platform Environment Capabilities

State of Vermont Guidance on the Re-use of Software Products, Shared Components, and Hosted Platform Environment Capabilities Introduction The State of Vermont (SoV) has adopted a high-level architecture that provides a contemporary and robust approach to meeting Vermont s Healthcare Services Enterprise (HSE) vision. As readers

More information

Identity Management and Single Sign-On

Identity Management and Single Sign-On Delivering Oracle Success Identity Management and Single Sign-On Al Lopez RMOUG Training Days February 2012 About DBAK Oracle Solution Provider and License Reseller Core Technology and EBS Applications

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp. Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms

More information

Evaluating time and expense systems: Choosing the right platform for your organization

Evaluating time and expense systems: Choosing the right platform for your organization Evaluating time and expense systems: Choosing the right platform for your organization Prepared by: Art Shearon, Manager, McGladrey LLP 703.627.7795, art.shearon@mcgladrey.com August 2013 A growing number

More information

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap AAMVA Region I Conference E-ID, DLDV, and Privacy Conducting Business Securely

More information

Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority

Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority copyright of British Telecommunications plc 2006 Abstract As a large organisation with many partners BT has been

More information

RSA Identity Management & Governance (Aveksa)

RSA Identity Management & Governance (Aveksa) RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

TrustedX: eidas Platform

TrustedX: eidas Platform TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,

More information

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with

More information

Sun and Oracle: Joining Forces in Identity Management

Sun and Oracle: Joining Forces in Identity Management Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics

More information

Overview of products, services and capabilities

Overview of products, services and capabilities Overview of products, services and capabilities Enterprise Agreement Capabilities Enterprise Agreement Subscription Desktop (Common) Perpetual Server and Additional Product For desktop enterprise products

More information

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010 Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,

More information

RSA Identity and Access Management 2014

RSA Identity and Access Management 2014 RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and

More information

Identity: The Key to the Future of Healthcare

Identity: The Key to the Future of Healthcare Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital

More information

Identity Management for Interoperable Health Information Exchanges

Identity Management for Interoperable Health Information Exchanges Identity Management for Interoperable Health Information Exchanges Presented to the NASMD Medicaid Transformation Grants HIE Workgroup - March 26, 2008 Presented by: John (Mike) Davis, Department of Veterans

More information

Identity & Access Management new complex so don t start?

Identity & Access Management new complex so don t start? IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference - 2013

NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference - 2013 NISTIC Pilot - Attribute Exchange Network Biometric Consortium Conference - 2013 Market Development Startup (2011) Unrealized Large Market Potential Evolving Value Props & Use-Cases Evolving Tech/Policy

More information

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information

More information

<Insert Picture Here> Oracle CRM for Consumer Goods Smart Strategies for Profitable Growth

<Insert Picture Here> Oracle CRM for Consumer Goods Smart Strategies for Profitable Growth Oracle CRM for Consumer Goods Smart Strategies for Profitable Growth Angélique Moon Director, Consumer Goods CRM Product Strategy Safe Harbor Statement The following is intended to

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

VASCO: Compliant Digital Identity Protection for Healthcare

VASCO: Compliant Digital Identity Protection for Healthcare VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are

More information

Identity and Access Management. An Introduction to IAM

Identity and Access Management. An Introduction to IAM Identity and Access Management An Introduction to IAM Table of contents Introduction... 3 What is Identity and Access Management?... 3 Identity and Access Management components... 3 Business drivers for

More information

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning

More information

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta. Addressing the BYOD Challenge with Okta Mobility Management Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Executive Summary The Impact of BYOD BYOD can be a very polarizing

More information

Are Passwords Passé?

Are Passwords Passé? Are Passwords Passé? Deployment Strategies for Multifactor Authentication IAM Online December 10, 2014 Mike Grady, Scalable Privacy Project David Walker, Scalable Privacy Project Thank you to InCommon

More information

SOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information

SOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF SEPTEMBER 2014 Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT 94% of healthcare organizations

More information

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1 Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness

More information

Biometric SSO Authentication Using Java Enterprise System

Biometric SSO Authentication Using Java Enterprise System Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect edward.clay@sun.com & Ramesh Nagappan CISSP Java Technology Architect ramesh.nagappan@sun.com Agenda Part 1 : Identity

More information

Achieving HIPAA Compliance with Identity and Access Management

Achieving HIPAA Compliance with Identity and Access Management Achieving HIPAA Compliance with Identity and Access Management A Healthcare Case Study Stephen A. Whicker Manager Security Compliance HIPAA Security Officer AHIS/St. Vincent Health DISCLAIMER: The views

More information

E-Government Service Delivery. Samir Said General Manager Microsoft Algeria

E-Government Service Delivery. Samir Said General Manager Microsoft Algeria E-Government Service Delivery Samir Said General Manager Microsoft Algeria Microsoft e-government Strategy E-Government Definition egovernment is a spectrum of technology-inspired strategies adopted by

More information

Oracle Access Manager. An Oracle White Paper

Oracle Access Manager. An Oracle White Paper Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any

More information

Integrating OID/SSO with E- Business Suite and Third-Party SSO Solutions. Presented by Paul Jackson (Norman Leach)

Integrating OID/SSO with E- Business Suite and Third-Party SSO Solutions. Presented by Paul Jackson (Norman Leach) Integrating OID/SSO with E- Business Suite and Third-Party SSO Solutions Presented by Paul Jackson (Norman Leach) Agenda Why SSO Install Options Log Locations EBS Cloning Considerations Disaster Recovery

More information

The Next Generation of Local Government: Transforming Non-Emergency and 311 Call Center Solutions to a Complete Constituent Experience

The Next Generation of Local Government: Transforming Non-Emergency and 311 Call Center Solutions to a Complete Constituent Experience The Next Generation of Local Government: Transforming Non-Emergency and 311 Call Center Solutions to a Complete Constituent Experience An Oracle White Paper February 2013 The Next Generation of Local Government

More information

Identity in the Cloud

Identity in the Cloud White Paper Identity in the Cloud Use the cloud without compromising enterprise security Table of Contents The Cloud Conundrum 3 Managing Cloud Identity 3 The Identity Lifecycle 4 SaaS Single Sign-On 4

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

B. Executive Summary

B. Executive Summary B. Executive Summary Across the country, state governments face tough economic challenges. High unemployment is causing record numbers of citizens to seek public assistance, straining government s aging

More information

Enterprise Management Solutions Protection Profiles

Enterprise Management Solutions Protection Profiles Enterprise Management Solutions Protection Profiles Eric Winterton, Booz Allen Hamilton Joshua Brickman, CA Inc. September 2008 Copyright 2008 CA, Inc. and Booz Allen Hamilton. All rights reserved. All

More information

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development

How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development A RapidValue Solutions Whitepaper Contents Executive Summary... 03 Oracle Mobile Application Framework (MAF): The Complete Development

More information

QLIKVIEW IN THE ENTERPRISE

QLIKVIEW IN THE ENTERPRISE QLIKVIEW IN THE ENTERPRISE IT Overview The QlikView Business Discovery platform is a natural fit within an organization s Information Architecture, allowing IT and BI groups to serve the ever-growing analytical

More information

Online Identity Attribute Exchange 2013-2014 Initiatives

Online Identity Attribute Exchange 2013-2014 Initiatives Online Identity Attribute Exchange 2013-2014 Initiatives Agenda Overview AXN Services Framework Demonstration NSTIC Pilots Summary ABAC Services Attribute Exchange Network Page 2 AXN - Enabling IT & Other

More information

AGIMO and whole-of-government ICT Policy

AGIMO and whole-of-government ICT Policy AGIMO and whole-of-government ICT Policy Overview DAMA Canberra July 2013 Meeting Brian Catto Andrew McGalliard James Woods ICT Policy Team AGIMO 1 Agenda Who are AGIMO? What is AGIMOs role? APS ICT Strategy

More information

Oracle Application Express and Oracle E-Business Suite. Love and Mariage!

Oracle Application Express and Oracle E-Business Suite. Love and Mariage! Oracle Application Express and Oracle E-Business Suite Love and Mariage! Content 1 2 3 4 5 About me EBS Development Challenges EBS and APEX Examples of APEX extension for EBS Conclusion 2 Sylvain Martel

More information

Identity Management. Presented by Richard Brown. November 2014. November 2014. MILCIS IdM

Identity Management. Presented by Richard Brown. November 2014. November 2014. MILCIS IdM Identity Management Presented by Richard Brown Who is Cogito? Who are we? Why listen to us? Started as an information protection company working on the ADO PKI Moved into IdM as natural progression to

More information

Oracle Mobile Security Management

Oracle Mobile Security Management Oracle Mobile Security Management Angelo Maria Bosis Technology Sales Consulting Director Milano, 19 Marzo 2014 Safe Harbor Statement The following is intended to outline our general

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

Simplify Enterprise Mobility. Frédéric Desbiens Principal Product Manager Mobility and Development Tools

Simplify Enterprise Mobility. Frédéric Desbiens Principal Product Manager Mobility and Development Tools Simplify Enterprise Mobility Frédéric Desbiens Principal Product Manager Mobility and Development Tools Agenda MARKET TRENDS ORACLE MOBILE STRATEGY MOBILE SUITE & SECURITY SUITE ROADMAP MOBILE CLOUD SERVICE

More information

New Zealand Sets the Pace for SAML 2.0 Deployments

New Zealand Sets the Pace for SAML 2.0 Deployments Case Study: New Zealand Sets the Pace for SAML 2.0 Deployments New Zealand proves that great things often come from small countries as it joins the ranks of e-government SAML 2.0 deployers with its wide-ranging

More information

Governance, Risk & Compliance for Public Sector

Governance, Risk & Compliance for Public Sector Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment

More information

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is intended

More information

Customer centric transformation for next generation customer service CUSTOMER CENTRICITY

Customer centric transformation for next generation customer service CUSTOMER CENTRICITY Social Mobile Data CUSTOMER CENTRICITY Cyber security Cloud Customer centric transformation for next generation customer service Solutions and services for improving customer focus and satisfaction across

More information

ORACLE TAX ANALYTICS. The Solution. Oracle Tax Data Model KEY FEATURES

ORACLE TAX ANALYTICS. The Solution. Oracle Tax Data Model KEY FEATURES ORACLE TAX ANALYTICS KEY FEATURES A set of comprehensive and compatible BI Applications. Advanced insight into tax performance Built on World Class Oracle s Database and BI Technology Design after the

More information

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15 Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an

More information

PrinterOn Print Management Overview

PrinterOn Print Management Overview PrinterOn Print Management Overview Table of Contents 1. PrinterOn and Print Management Overview... 4 1.1. Combined PrinterOn and Print Management Capabilities... 5 1.1.1. Comprehensive Workflow Tracking

More information

Federated Identity in the Enterprise

Federated Identity in the Enterprise www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember

More information

SWISSVBS LEARNING CLOUD (SLC)

SWISSVBS LEARNING CLOUD (SLC) SWISSVBS LEARNING CLOUD (SLC) OVERVIEW The LMS for the Mobile-Cloud World The SwissVBS Learning Cloud (SLC) is an enterprise-class learning management and analytics platform. It is designed from the ground

More information

Identity and Access Management

Identity and Access Management Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

Protect Everything: Networks, Applications and Cloud Services

Protect Everything: Networks, Applications and Cloud Services Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active

More information

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2

More information

Building Secure Applications. James Tedrick

Building Secure Applications. James Tedrick Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

Identity and Access Management The road to sustained compliance

Identity and Access Management The road to sustained compliance Identity and Access Management The road to sustained compliance Identity and Access Management An overview 1 On-boarding is the process of establishing an identity for a person, device, or system account

More information

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities

More information

Access Management Analysis of some available solutions

Access Management Analysis of some available solutions Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available

More information

Government's Adoption of SOA and SOA Examples

Government's Adoption of SOA and SOA Examples Government's Adoption of SOA and SOA Examples Presented by : Ajay Budhraja, Chief of Enterprise Services ME (Engg), MS (Management), PMP, CICM, CSM, ECM (Master) AIIM, ITIL-F Copyright 2008 Ajay Budhraja

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach karsten.mueller-corbach@oracle.com

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach karsten.mueller-corbach@oracle.com R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach karsten.mueller-corbach@oracle.com The following is intended to outline our general product direction. It is intended for information purposes

More information

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, 2004 9:00 AM

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, 2004 9:00 AM Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance RSA Security and Accenture February 26, 2004 9:00 AM Agenda Laura Robinson, Industry Analyst, RSA Security Definition of

More information