Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services



Similar documents
Enterprise Identity Management Reference Architecture

<Insert Picture Here> Oracle Identity And Access Management

Sun and Oracle: Joining Forces in Identity Management

ORACLE FUSION MIDDLEWARE PROFILE

The Unique Alternative to the Big Four. Identity and Access Management

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Simplify and Automate IT

Simplify and Automate IT

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

Q3FY11 Oracle OPN Specialized Security Pillar Executive Webcast

Identity and Access Management. An Introduction to IAM

<Insert Picture Here> Oracle I&AM: Service Oriented Security - a flexible Security Foundation For Next-Generation Applications

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost

Business Intelligence with SharePoint 2010

C21 Introduction to User Access

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

RSA Identity and Access Management 2014

Microsoft Business Intelligence solution. What makes Microsoft BI difference

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Independent process platform

Altiris Asset Management Suite 7.0

Status Evolution Balance Trends

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Presentation to House Committee on Technology: HHS System Identity & Access Management

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

CA SiteMinder SSO Agents for ERP Systems

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

THE THEME AREA. This situation entails:

Key Issues for Identity and Access Management, 2008

Identity Governance Evolution

Identity and Access Management

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Magic Quadrant and Microsoft Dynamics CRM ERM

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Delivering value to the business with IAM

HP Services Global Service Desk with esupport. Innovative technology and business processes that transform IT support for your employees

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Security It s an ecosystem thing

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Integrating Hitachi ID Suite with WebSSO Systems

Oracle Role Manager. An Oracle White Paper Updated June 2009

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Oracle Access Manager. An Oracle White Paper

Common Situations. Departments choosing best in class solutions for their specific needs. Lack of coordinated BI strategy across the enterprise

AirWatch Solution Overview

An Oracle White Paper January Access Certification: Addressing & Building on a Critical Security Control

CA Technologies Data Protection

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

Quest One Identity Solution. Simplifying Identity and Access Management

Interactive Intelligence. Joe Staples Chief marketing officer Interactive Intelligence

Cloud Database Demystified to Deliver SaaS Customer Value

PROTECT YOUR WORLD. Identity Management Solutions and Services

The real trend of the Future Workspace. John Phillips Enterprise Technology Strategist Microsoft Corporation

Additionally, as a publicly traded company, there are regulatory compliance motivations.

32% of Excel users are comfortable with using it for Advanced Analysis e.g., PivotTables

FileNet and SharePoint Better Together. Tom Moen Channel Development Manager

Enterprise Cloud Services

An Oracle White Paper Dec Oracle Access Management Security Token Service

Salient Partner Program

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

IAN MASSINGHAM. Technical Evangelist Amazon Web Services

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

White paper December Addressing single sign-on inside, outside, and between organizations

Identity and Access Management Point of View

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Symantec to Acquire Clearwell Systems, Inc. May 19, 2011

Five Business Drivers of Identity and Access Management

Research. Identity and Access Management Defined

Building an identity repository is at the heart of identity and access management.

Identity Access Management: Beyond Convenience

CA Virtual Assurance for Infrastructure Managers

EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality

Jeff Ross Senior Vice President and Chief Financial Officer March 2010

The Four "A's" of Information Security

The Return on Investment (ROI) for Forefront Identity Manager

End User Services. Managed Mobile. Mobile Device Management. Managed Mobile. Copyright 2012 FUJITSU

Oracle Identity Management Securing The New Digital Experience

What s new in AM 9.30 Accelerating business outcomes

DATA TRANSPARENCY TOWN HALL MEETING

RSA Identity Management & Governance (Aveksa)

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA

Introduction to Oracle Business Intelligence Standard Edition One. Mike Donohue Senior Manager, Product Management Oracle Business Intelligence

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Single Sign-on (SSO) technologies for the Domino Web Server

An Oracle White Paper March NIEM Solution Architecture Using Oracle Fusion Middleware

Vyom SSO-Edge: Single Sign-On for BMC Remedy

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?

G06 - How to store your data in SharePoint

Trust but Verify: Best Practices for Monitoring Privileged Users

How To Manage A Password Protected Digital Id On A Microsoft Pc Or Macbook (Windows) With A Password Safehouse (Windows 7) On A Pc Or Ipad (Windows 8) On An Ipad Or Macintosh (Windows 9)

Transcription:

Identity Management Overview Bill Nelson bill.nelson@gca.net Vice President of Professional Services 1

Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity) Management Identity Management Solution Areas Oracle Identity Management Suite 2

3 Pop Quiz!

User Provisioning Q: What determines your employee s access? a Give Wally access to whatever Alice has b Provide access based on his business roles c Do whatever his manager says 4

User Entitlements Q: Who is the most privileged user in your enterprise? a Security administrator b Chief Financial Officer c The summer intern who is now working for your competitor 5

User Access Q: How do you control access to your sensitive applications? a Usernames and passwords b Contextual authentication c Hardware token 6

Cost of Compliance Q: How much are manual compliance controls costing your organization? a Nothing, no new headcount b Don t ask c Don t know 7

Auditing and Reporting Q: Can you prove that it was Professor Plum who did it in the library with a candlestick? a Yeah right b I haven t a CLUE! 8

Common Identity-Related Requests We Must Have: More control over our account management processes A reduction in calls to the help desk for: Resetting account passwords Updating account information Accurate reporting in order to pass audits We Would Like to: Implement a roles-based account management solution Implement single sign on Provide our users with self-service Synchronize account data between repositories 9 So what is driving these requests?

Business Drivers for Identity Management Companies are being asked to: Reduce Cost while Improving QoS Open Access and provide more services but expected to Minimize Risk Adhere to regulatory compliance In general: => Do more with less => Do it safely and securely The enterprise is getting squeezed 10

Solution: Identity Management Features: Identity Management focus areas: 1. Data Synchronization 2. Account Management (Provisioning/Deprovisioning) 3. Password Management (self-service) 4. Single Sign-On 5. Attestation and Non-repudiation It all boils down to how do we create an identity, use the identity during the course of normal business activity, review the identity to ensure it is still necessary, and then remove (or disable) it when it is not needed. 11

What is Identity? Before we go any further, let s review the concept of an identity. 1. Virtual representation of a user 2. Rights and relationships to enterprise resources 3. Profile that tells a company's network: Who you are What you are entitled to do When you are allowed to perform specific functions Where you are allows to perform functions from Why you have been granted permissions How you are using your identity over time 12

Contextual Identities You have a different identity based on your relationships Name: Dad Nickname: Snuggles Address: 1234 Somewhere Street Home Phone: 813-555-1212 Roles: Lawn Guy, Dish Washer, Heavy Hand Broker First name: William Last name: Nelson Investor Type: Moderate Account numbers: 123456789 User name: bnelson Password: ******** PIN: ***** Family Bank 13 First name: William (Bill) Last name: Nelson Department: Prof Svcs Office location: 1A2F Manager: Attila User Name: bnelson Password: ******** Office First name: William Last name: Nelson Address: 1234 Somewhere Street Account number: 987654321 User name: bnelson_1234 Password: ******** PIN: *****

What is Identity Management? So then, what is identity management? Involves User Account Creation, Modification, Disablement and Deletion Across heterogeneous platforms using a scalable, secure, rapid deployment architecture Utilizes delegated administration, workflow, rules and policies Supports end-user self service password reset and provisioning 14 With centralized auditing and reporting

15 Categories for Identity Management

Identity Management Categories Identity Management focus areas: 1. Data Synchronization 2. Account Management 3. Password Management (self-service) 4. Single Sign-On 5. Attestation and Non-repudiation 16

Data Synchronization Reality: Things Change Information changes over time Data changes need to be synchronized across the many pockets of data Access rights may need to be updated Beware of accumulated access rights! 17

Identity Hub 1. Change event occurs in HR 2. Data is synchronized between: Human Resources Application Downstream Resources 3. Manual modifications at Identity Hub 4. Process can involve: Approvals Notifications 18

Identity Management Categories Identity Management focus areas: 1. Data Synchronization 2. Account Management 3. Password Management (self-service) 4. Single Sign-On 5. Attestation and Non-repudiation 19

20 Typical Identity Provisioning

21 Streamlined Identity Provisioning

Account Management 1. Automatic account updates Synchronization with HR Role-based provisioning Support for Sunrise/Sunset 2. Manual account updates Delegated administration Immediate account lockout Password Resets User data modifications 3. Process can involve: Approvals Notifications 22

Identity Management Categories Identity Management focus areas: 1. Data Synchronization 2. Account Management 3. Password Management (self-service) 4. Single Sign-On 5. Attestation and Non-repudiation 23

24 Typical Password Mgmt

25 Streamlined Password Mgmt

End-User Self-Service 1. Users access a web interface Answers to Auth Questions Password Changes Personal Data Changes Request Access to Resources 2. Data is synchronized: Upstream (HR; maybe) Downstream (Resources) 3. Process can involve: Approvals Notifications 26

Identity Management Categories Identity Management focus areas: 1. Data Synchronization 2. Account Management 3. Password Management (self-service) 4. Single Sign-On 5. Attestation and Non-repudiation 27

Enterprise Single Sign On User logs into Windows desktop User logs into each subsequent application User must keep track of multiple IDs and passwords User logs into Windows desktop Software on the desktop intercepts login requests Windows password acts as SSO to other applications Users do not need to know IDs and passwords Users can add their own applications (if allowed) Credentials are stored/cached encrypted centralized database desktop/laptop 28

29 Web Single Sign On

Identity Management Categories Identity Management focus areas: 1. Data Synchronization 2. Account Management 3. Password Management (self-service) 4. Single Sign-On 5. Attestation and Non-repudiation 30

31 Audit and Attestation

32 Oracle Identity Management Suite

Oracle Identity Management Suite Storage Virtualization Synchronization Identity lifecycle Role management & mining Organization management Provisioning Reconciliation Password management Strong authentication Risk based authorization Single sign-on Federation Web Services security Operating systems security Audit Reporting Analytics Attestation Segregation of duties 33

Gartner Says: Leader in Magic Quadrants User Provisioning H2, 2007 Web Access Mgmt H2, 2007 34 Magic Quadrant Disclaimer: The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Burton Group Says: Strongest Vendor Oracle is currently the IdM vendor to beat - VantagePoint 2007: Identity and Privacy Trends in Enterprise IT 35

Forrester Says: Market Leader Oracle has established itself as Leader. - The Forrester Wave: Identity And Access Management, Q1 2008 Oracle reached the top of our evaluation through a combination of the breadth, depth, interoperability, and packaging of its IAM features alongside the strategy and current state of market execution on its application-centric identity vision. - The Forrester Wave: Identity And Access Management, Q1 2008 36

37 Oracle Identity Management Customers

Key Differentiators Complete suite of best-of-breed products Complete & best integrated identity management suite Includes compliance, virtualization and system mgmt Market leadership validated by press and analysts Proven for large scale deployments Large, complex, and award winning deployments Broad customer base and use cases Large referenceable customer base Best long-term investment Strong support of open standards and hot-pluggable strategy Pre-integrated with leading applications and infrastructure 38

39 Questions?

Identity Management Overview Bill Nelson bill.nelson@gca.net Vice President of Professional Services 40