SUN IdM: Migrate with Confidence. SDG IAG Practice: Global Technology Solutions



Similar documents
Cloud Testing Testing on the Cloud

<Insert Picture Here> Oracle Identity And Access Management

Enterprise Identity Management Reference Architecture

Implementing Oracle BI Applications during an ERP Upgrade

Implementing Oracle BI Applications during an ERP Upgrade

Increasing Efficiency across the Value Chain with Master Data Management

SMART Considerations for Active Directory Migration. A Strategic View and Best Practices for Migrating the Corporate Directory

Sun and Oracle: Joining Forces in Identity Management

How can Identity and Access Management help me to improve compliance and drive business performance?

Using Master Data in Business Intelligence

Simplify Your Migrations and Upgrades. Part 1: Avoiding risk, downtime and long hours

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center

Total Cloud Control with Oracle Enterprise Manager 12c. Kevin Patterson, Principal Sales Consultant, Enterprise Manager Oracle

C21 Introduction to User Access

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

7 things to ask when upgrading your ERP solution

Realizing the Benefits of Data Modernization

1 Introduction Product Description Strengths and Challenges Copyright... 5

BEDIFFERENT ACE G E R M A N Y. aras.com. Copyright 2012 Aras. All Rights Reserved.

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Business-Driven, Compliant Identity Management

Identity and Access Management The road to sustained compliance

AN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION

JENZABAR EX. Exceptional insights. Extraordinary results. JENZABAR EX

Data Migration through an Information Development Approach An Executive Overview

BEDIFFERENT A C E I N T E R N A T I O N A L

Strategy for Application Modernization A Summa White Paper

N.K. Srivastava GM-R&M-Engg.Services NTPC- CC/Noida

Transforming Business Processes with Agile Integrated Platforms

Creative Shorts: Twelve lifecycle management principles for world-class cloud development

WebSphere Cast Iron Cloud integration

Technology Insight Series

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper

Datamation. Find the Right Cloud Computing Solution. Executive Brief. In This Paper

Governed Migration using Dell One Identity Manager

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

How to leverage SAP HANA for fast ROI and business advantage 5 STEPS. to success. with SAP HANA. Unleashing the value of HANA

The Top 5 Considerations for Oracle Cloud ERP

Advanced Metering Information Systems

Red Hat Enterprise Linux solutions from HP and Oracle

Data Ingestion into Office 365

Project Management Office: Seeing the Whole Picture

The Unique Alternative to the Big Four. Identity and Access Management

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

How To Integrate With Salesforce Crm

Driving Business Value. A closer look at ERP consolidations and upgrades

Guidelines For A Successful CRM

Is it Time to Purchase a Fashion Enterprise Solution?

How To Get A Better At Developing An Application

SailPoint IdentityIQ Managing the Business of Identity

Next presentation starting soon Next Gen Customer Experience Enabled by PwC & Oracle s Cloud CRM & CX Applications

Customer Relationship Management. EC-Council

Solutions White Paper. Using Storage Virtualization. to Meet the Challenges of Rapid Data Growth

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

Business-Driven, Compliant Identity Management

SailPoint IdentityIQ Managing the Business of Identity

vision realize your software-defined with the Digital Data Center from Atos Whitepaper

Minutes on Modern Finance Midsize Edition

Guideline on Implementing Cloud Identity and Access Management

Oracle Planning and Budgeting Cloud Service

Connectivity in the Enterprise: The Rise of Cloud and Its Integration Challenges

Identity Governance Evolution

Harness the value of information throughout the enterprise. IBM InfoSphere Master Data Management Server. Overview

Cordys Business Operations Platform

Mitel Professional Services Catalog for Contact Center JULY 2015 SWEDEN, DENMARK, FINLAND AND BALTICS RELEASE 1.0

AN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION

5 TIPS FOR MAXIMIZING THE VALUE OF YOUR SECURITY ASSESSMENT

Masterminding Data Governance

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

ARC VIEW. Stratus High-Availability Solutions Designed to Virtually Eliminate Downtime. Keywords. Summary. By Craig Resnick

Data Virtualization Overview

Accenture Foundation Platform for Oracle

Arisant s Identity Management (IdM) for K-12 Education

8 THINGS TO CONSIDER WHEN SELECTING INCENTIVE COMPENSATION MANAGEMENT (ICM) SOFTWARE

Technology. Building Your Cloud Strategy with Accenture

Hybrid IT through Cloud Brokerage Your Path to Better Business Outcomes

Market Maturity. Cloud Definitions

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Top 10 Ways. Operational Software Can Boost a Contractor s Bottom Line

Apache Syncope OpenSource IdM

Cisco SAFE: A Security Reference Architecture

I D C T E C H N O L O G Y S P O T L I G H T

Modern Application Architecture for the Enterprise

A Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12 and Oracle Fusion Applications

Improving Financial Advisor Productivity through Automation

CGI Payments360. Moving money with greater agility and confidence. Experience the commitment

Technology. Building Your Cloud Strategy with Accenture

Transcription:

SUN IdM: SDG IAG Practice: Global Technology Solutions

Overview There are many reasons why organizations are migrating away from their current Oracle Waveset (OW) identity management solution to a newer next gen and Access Governance (IAG) platform. Perhaps their vendors were acquired, changing the roadmap. Or maybe the current solution is no longer a perfect fit. Some companies realize that a lot of money has been spent for little value. Others find that their solution does not suit the new requirements of managing risk and security related to identity and access governance. WHY? Reasons to Migrate Four end-of-life pressures: Vendor Product and support is reaching end of life for and Access Management (IAM) products Natural Project has completed its life cycle Technical Architecture Supporting middleware (databases and application servers) in need of upgrades Service Currently offered services insufficient to meet business needs End of life considerations Your current vendor may not be your future vendor Any future supplier may not be a vendor at all, but instead a service/system integrator. End of life of current Management (IDM) deployment is an opportunity to reconsider the deployment order of future IAM components. Challenges Migration of existing IDM solutions is not as easy as some vendors claim. That s because identity management implementations usually are not plain vanilla out-of-the-box solutions. There is no such thing as a "miracle migration toolset. More importantly, moving from one identity manager to another is not necessarily the best choice. The IAM landscape has evolved over the last few years resulting in blurred differences between user administration, provisioning and IAG solutions. Vendors have matured their offerings in view of practical business issues, regulatory compliance, risk and security and the challenges of having both identity and access governance (IAG) as a single solution. Other factors include: Changing technology and business requirements since the early provisioning-focused solution. Historically, identity and access management implementations are built by, and for, IT. So, they are typically IT-oriented. And because they are more suited for technical IT users, they are not so user-friendly. This challenge is typically compounded by lack of full integration of identity management and access governance management functions under a single, unified, business-oriented console. Enterprises today are looking at operational efficiency, cost reduction and enhanced security. But the truth is that in today s scenario, failure to address provisioning as both a business and technology issue is profoundly limiting. 55 N. Water Street Norwalk, CT 06854 T +1 (203) 866 8886 www.sdgc.com info@sdgc.com 1

Key Considerations No matter what solution you choose, replacing legacy OW requires effort and investment. Pick the right solution and you can achieve results that move your organization forward to a next gen IAG platform for the future. For most organizations, making the decision to migrate from Sun Manager (Oracle Waveset) to the next gen IAG platform comes about after a long process of evaluating a multitude of options for identity and access management (IAM). Yet while the decision marks the end of the selection process, it s just the first step in the actual migration. Organizations must consider the following: Deployment/migration strategy Business continuity Zero impact on business as usual tasks Maintaining the pace/synergy with adopted migration plan/strategy Unified user interfaces: improved user experience Access requests Approvals Password change/reset/synchronization Synchronization Real-time (with no lag or minimal lag time) Synchronization of identities across the managed targets Provisioning/de-provisioning Seamless integration of target systems administration Unambiguous on-boarding, off-boarding, job change/transfer analytics and intelligence Event driven access reviews and certification Near real-time closed loop remediation 55 N. Water Street Norwalk, CT 06854 T +1 (203) 866 8886 www.sdgc.com info@sdgc.com 2

Migration Approach Choosing your approach: migration by objects or business use cases In an ideal world, migrating from OW to next gen IAG would be a simple matter. You would identity objects and processes (users, resources, policies, and so forth) directly from the former to the latter. This bottom-up approach would Replicating the legacy solution as-it-is may not be the ideal and real objectives of the migration. be fine if all objects were mapped perfectly to each other from one solution to the other. But they are not, for obvious reasons. Replicating the legacy solution as-it-is may not be the ideal and real objectives of the migration. So if migration by objects isn t the answer, what is? One possible solution is migration by business use cases. This is a top-down approach in which the next gen IAG objects are defined based on current and anticipated business requirements rather than on legacy objects. However, there is always the risk of overlooking some functional detail or existing object in OW that would be useful or critical to have in next gen IAG. Assess Strategize Plan Migrate Define Business Objectives and Drivers Design Solutions and Methodology Develop Solution Roadmap Build, Test and Deploy Determining the methodology: big bang vs. incremental In any implementation or migration of an infrastructure application, the basic question is whether to move everything over to the new implementation in one big bang, or take a more gradual approach in which the new solution is brought up in phases. In most cases, the big bang approach is generally not appropriate for an OW to next gen IAG migration. This approach is more suitable for simple, first-time IAG implementations, where there are few or no major issues associated with changing from one system to another. There are risks to consider in complex implementations. For example, if next gen IAG is not tested and released in a phased manner, there is a greater chance of disrupting operations when the cutover takes place. 55 N. Water Street Norwalk, CT 06854 T +1 (203) 866 8886 www.sdgc.com info@sdgc.com 3

Co-existence: An Incremental Approach Authoratative Source Authoratative Source Oracle HRMS 1 End Users Approvers OW Oracle Waveset OW Adapter Next Gen IAG Connector Bridge 2 SPML/Web Service/API Next Gen IAG Next Gen IAG Adapter 2 2 OW Oracle Waveset OW Adapter Next Gen IAG Connector Bridge SPML/Web Service/API 3 3 OW Task Bridge Approve/Reject Next Gen IAG Connector Connector 4 4 End Users Approvers The best approach may be integrated deployment in which OW and next gen IAG coexist, with OW continuing to handle user-facing front-end workflows (such as access requests and approvals) while you gradually move back office workflows (such as provisioning and de-provisioning) to next gen IAG. After all the back office operations are migrated to next gen IAG, you can move forward with migrating front end workflows to next gen IAG. This self-paced migration methodology will enable you to gradually phase out the OW infrastructure and minimize any business risk associated with the change. Maximizing efficiency: do you need acceleration tools? If you choose a phased approach to migration, it can be helpful to employ accelerators tools designed to support a gradual transition. These tools facilitate the process of using both the legacy OW and the new next gen IAG capabilities at the same time. There are a number of tools available for this purpose including those which enable OW provisioning workflows to use next gen IAG connectors to provision accounts on next gen IAG managed target systems. Others make it possible to work on legacy OW tasks from the next gen IAG user interface. Fact is, there is no one-size-fits-all solution. Standardized tools such as those described here can be used to help decrease overall migration effort and investment. 55 N. Water Street Norwalk, CT 06854 T +1 (203) 866 8886 www.sdgc.com info@sdgc.com 4

About SDG SDG is a leading provider of technology, consulting and risk management solutions to strengthen enterprise businesses while managing IT risk. We focus on six practices: Risk and Security; and Access Governance; Digital Collaboration; Quality Assurance; Mobility; Cloud and CRM. SDG helps enterprises realize their dreams by helping them develop, manage and deploy solutions with acceptable risk. For over two decades, SDG has enabled enterprises to realize their dreams by helping them develop, manage and deploy solutions with acceptable risk. We combine technology, thought leadership and a relentless passion for customer success. SDG partners with enterprise brands, but we specifically focus on mitigating client IT risk. Our ultimate goal is to help enterprises realize the opportunity of technology, increase innovation, improve speed-to-market and maximize returns on investment. 55 N. Water Street Norwalk, CT 06854 T +1 (203) 866 8886 www.sdgc.com info@sdgc.com 5