Simplify Identity Management with the CA Identity Suite

Similar documents
CA Identity Manager: Capabilities and Architecture

BUYER S GUIDE. Identity Management and Governance

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

BUYER S GUIDE. Identity Management and Governance

Can I customize my identity management deployment without extensive coding and services?

Can My Identity Management Solution Quickly Adapt to Changing Business Requirements and Processes?

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them?

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

SOLUTION BRIEF SEPTEMBER Healthcare Security Solutions: Protecting your Organization, Patients, and Information

can I customize my identity management deployment without extensive coding and services?

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Axway API Portal. Putting APIs first for your developer ecosystem

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

How can Identity and Access Management help me to improve compliance and drive business performance?

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. Identity-centric Security: The ca Securecenter Portfolio

CA Federation Manager

How to Secure Your SharePoint Deployment

CA Process Automation for System z 3.1

Web Applications Access Control Single Sign On

When millions need access: Identity management in an increasingly connected world

IBM Cognos 8 BI: The platform of choice for Software as a Service (SaaS)

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

CA Workload Automation Agents for Mainframe-Hosted Implementations

RSA Identity Management & Governance (Aveksa)

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

CA Technologies Solutions for Criminal Justice Information Security Compliance

The Top 5 Federated Single Sign-On Scenarios

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Cisco Mobile Collaboration Management Service

Vistara Lifecycle Management

etoken TMS (Token Management System) Frequently Asked Questions

Strengthen security with intelligent identity and access management

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Application Setup help topics for printing

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Minimize Access Risk and Prevent Fraud With SAP Access Control

Identity Governance Evolution

Dell One Identity Manager Scalability and Performance

CA Arcot RiskFort. Overview. Benefits

Regulatory Compliance Using Identity Management

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

BusinessObjects XI. New for users of BusinessObjects 6.x New for users of Crystal v10

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

CA Automation Suite for Data Centers

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

Governance and Control of Privileged Identities to Reduce Risk

Integrating Hitachi ID Suite with WebSSO Systems

Additionally, as a publicly traded company, there are regulatory compliance motivations.

BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Leveraging Privileged Identity Governance to Improve Security Posture

Qlik Sense Enabling the New Enterprise

CASE STUDY. Global Airline Empowers Mobile Workforce for SaaS Apps while Reducing Risk

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Provide access control with innovative solutions from IBM.

Statement of Direction

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

Enterprise Identity Management Reference Architecture

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services

Securing and protecting the organization s most sensitive data

Authentication Strategy: Balancing Security and Convenience

Speeding Office 365 Implementation Using Identity-as-a-Service

BMC Remedy IT Service Management Suite

Creating an Enterprise App Store Addressing the Consumerization of IT without Jeopardizing Control

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Version Overview. Business value

SAM Enterprise Identity Manager

SOLUTION WHITE PAPER. Remedyforce Powerful Platform

TrustedX - PKI Authentication. Whitepaper

Key Authentication Considerations for Your Mobile Strategy

Empower Human Ingenuity IT Process Automation Buying Guide

A Comprehensive Solution for API Management

IBM Tivoli Directory Integrator

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

can you improve service quality and availability while optimizing operations on VCE Vblock Systems?

Symantec Mobile Management 7.2

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management

Select the right solution for identity and access governance

Cloud Services Catalog with Epsilon

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

CA Service Desk Manager

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution

content-aware identity & access management in a virtual environment

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

Administration Challenges

agility made possible

Symantec Enterprise Vault.cloud Overview

CA Workload Automation

can you simplify your infrastructure?

Transcription:

SOLUTION BRIEF CA DATABASE IDENTITY SUITE MANAGEMENT IDENTITY FOR MANAGEMENT DB2 FOR z/os DRAFT Answer the cover question by stating how the solution can deliver the desired benefits; typically, technical Simplify Identity Management with the CA Identity Suite capabilities will help to deliver better business value. The answer should be worded as simply and conversationally as possible. Answer the cover question by stating how the solution can deliver the desired benefits; typically, technical capabilities will help to Healthcare deliver better business Security value. The answer Solutions: should be Protecting worded as simply Your and conversationally Organization, as possible. Patients, And Information Answer the cover question by stating (Up to 80 words, in English)

2 SOLUTION BRIEF: CA IDENTITY SUITE IDENTITY MANAGEMENT Section 1: Challenge Identity Management Challenges Managing and governing who has access to what remains the foundation of any effective security architecture. However, there are several other identity-related challenges that must be met in order to ensure high security, efficiency and usability: Poor User Experience Identity services are often plagued with inconvenient user interfaces that focus on the IT savvy user rather than the business user. This reduces user satisfaction and hinders more widespread adoption across the enterprise. Ineffective Role Foundations It is common for organizations to have far too many roles defined, poor assignment of privileges to roles or over-accumulation of roles by users. A poor role model creates administrative inefficiencies and increases the risk of improper access. Risks From Users With Excessive Privileges Users accumulate privileges over time and frequently end up with access to systems which they no longer need or use, creating the potential for inadvertent or malicious use of privileges. IT Complexity Today s IT environments are highly dispersed, and often hybrid, with the need for efficient provisioning to both on-premises and cloud apps. Application access must be provisioned not only for employees, but increasingly for others including business partners, contractors and customers. As a result, a large enterprise may have millions of separate entitlements to manage. Difficult Application Connectivity Many organizations need to provision users to a wide range of applications and systems, and some of these are often not supported by most provisioning solutions. As a result, custom connectors must be developed, leading to increased development and ongoing maintenance costs. The basic processes of managing identities and entitlements is well-understood, and solutions exist that do a reasonable job at it. But these solutions often do not meet the needs of today s hybrid, complex environments supporting huge numbers of often mobile users. These users need access to identity services that provide a business-oriented experience that enables, rather than hinders, them to get their job done.

3 SOLUTION BRIEF: CA IDENTITY SUITE IDENTITY MANAGEMENT Section 2: Opportunity CA Identity Suite Key Identity Management Capabilities The CA Identity Suite is an integrated suite of identity management and governance capabilities that combine robust functionality with an intuitive, convenient and business-oriented experience. By improving business user productivity and satisfaction, the CA Identity Suite user experience is designed to dramatically increase the identity and access management solution value proposition for large enterprises while removing a significant administrative burden from the IT organization. The components of CA Identity Suite are represented by the following graphic: CA Identity Suite Entitlement Info Business Data HR Systems Identity Management Automated Provisioning Policy/Workflow Mgt Identity Portal Business User Experience Access Request/User Mgt Identity Governance Role Discovery & Analytics Entitlement Certification Xpress Technologies PolicyX ConfigX ConnectX Salesforce Unix Directory/ Database SAP Mainframe Custom Application CA Identity Suite also delivers core enterprise-grade identity management and governance capabilities, including broad provisioning support for on-premises and cloud apps and consumer-grade scale. The identity management capabilities of CA Identity Suite are contained within CA Identity Manager. The key capabilities of this component include: User experience for the business user Often, the user experience for basic identity management functions, like provisioning, is oriented towards the IT savvy user, with names for resources and access rights that are often cryptic and IT-centric. The combination of CA Identity Manager and the CA Identity Portal enables business users to easily leverage identity services because of the simple, intuitive, business-oriented user experience that it provides. No longer must basic identity services be performed only by IT or IT knowledgeable people. For example, a business entitlements catalogue maps cryptic resource names to business terms that are intuitive and familiar to all users. Because these identity services are now so easy to use, user satisfaction and the level of use of identity services across the enterprise both generally increase.

4 SOLUTION BRIEF: CA IDENTITY SUITE IDENTITY MANAGEMENT User Self-Service Providing a convenient, business-oriented experience is necessary, but not sufficient, for improved user satisfaction and productivity. It is also important to let users manage their own information (subject to security policies) so that they don t have to tax the IT help desk resources. The CA Identity Suite includes broad capabilities to enable secure self-service for users. These capabilities include: Identity dashboard provides convenient, centralized access to all things identity for each user. Information such as user profile, current access rights, risk level and user activity are all available in one place, eliminating the need to engage IT either to obtain or change user identity information. Administrators still retain granular control over what attributes can be changed by each user. Self-registration enables users to register for Web applications through a publicly available Web page. The user interface can be easily configured to request the specific information required by the organization depending on the type of user. This capability is frequently used for the purpose of managing external users of consumer-based applications. Forgotten passwords and password resets enable users to identify themselves via alternative means of authentication such as a series of custom questions instead of calling the help desk to reset a forgotten password. Access requests allow users to request additional access using a simple shopping cart model. Access to resources is done through a business entitlements catalog, which maps often confusing IT-centric resource names into business terms that everybody can understand. The process of requesting access is therefore much simpler than when IT-centric names are used. Intuitive, business-oriented user experience drives improved user satisfaction and engagement

5 SOLUTION BRIEF: CA IDENTITY SUITE IDENTITY MANAGEMENT User Provisioning Provisioning involves automating the process of adding, modifying and deleting users and their attributes. This includes managing users profile attributes, including their role memberships and their associated access rights. CA Identity Manager supports these operations and goes beyond the traditional boundaries of organizations to automate these processes across the extended enterprise. Wizard-based on-boarding of new users (including self-registration) includes users such as employees, business partners and contractors. User on-boarding is simple and intuitive, due to the business-oriented user experience provided by the CA Identity Suite. In addition, transactions can be scheduled for future execution based on date/time criteria. This is helpful especially for contractors who have a defined start and end date. Manage identities, roles and policies across on-premises and cloud applications. CA Identity Manager simplifies management of internal users (employees), external users (customers or partners) or identities not directly owned by a single person (root accounts). Customizable workflows support the unique way each organization approves and schedules these activities. This workflow is highly flexible and capable of supporting varying business requirements through template definition, escalation, parallel approvals, serial approvals and multi-step approvals. Broad set of connectors to target systems CA Identity Manager provide a broad set of pre-built connectors that provide provisioning integration with many popular Web, client-server and mainframe applications, including major computing platforms, enterprise applications, databases, collaboration environments and industry-standard interfaces. These connectors provide deep functionality, to help reduce the need for any custom coding to support unique local requirements. Connector Xpress is a wizard-driven utility that enables you to generate custom connectors via a graphical user interface without coding. Connector Xpress greatly reduces the level of technical expertise which is generally required for creating connectors with other identity management solutions. This enables the creation of custom connectors within hours rather than days or weeks. Fine-grained Entitlement Management CA Identity Manager can manage entitlements at a range of depths, from coarse- to fine-grained entitlements. For example, customers who invested in developing detailed SAP role models can automate provisioning down to the SAP role level. Unlike traditional identity management systems, CA Identity Manager leverages these roles directly out of target systems instead of requiring redundant definition of each SAP role in CA Identity Manager. These application roles can be augmented by CA Identity Manager business roles in defining workflows and business processes. This flexibility is important in leveraging existing investments, reducing replication of data and driving down the cost of maintaining the deployment over time. Policy Enforcement Business policy enforcement often requires custom coding to support your local, unique needs. Policy Xpress lets you configure policies that execute your unique, complex business processes without the need for custom code, often within hours, rather than requiring weeks of programming. This helps reduce the costs of internal development and ongoing maintenance and you will no longer be locked into unsupported, aging software. With Policy Xpress, you can quickly and easily respond to organizational changes, without having to manage an entire software development effort.

6 SOLUTION BRIEF: CA IDENTITY SUITE IDENTITY MANAGEMENT Password Management CA Identity Manager includes a comprehensive set of password management services that increase security by enforcing consistent password policies across the organization. These include: Password policies enforce different password strength requirements for different users, ensuring that sufficiently strong passwords are used to protect critical applications and accounts. Password synchronization occurs because CA Identity Manager can propagate passwords across target systems, including synchronizing operating system-level password changes back to CA Identity Manager across Windows, UNIX and mainframe environments. Mass Updates Organizations often need to support massive entitlement changes as a result of enterprise structure changes, such as the merging of business units or acquisition of new companies. CA Identity Manager supports these types of mass changes using a bulk loader service. Changes can be initiated by feeding in an information file where each text line represents a requested change. CA Identity Manager can also apply a common change to many users which match certain criteria, such as applying the same change to all current employees at a certain site. Software Development Kit CA Identity Manager Software Development Kit (SDK) includes a set of documented application programming interfaces (APIs) that let you integrate and extend CA Identity Manager capabilities for your specific environment. Task execution Web services APIs enable third-party applications to remotely submit CA Identity Manager tasks for execution. This capability is used by organizations to embed identity management services into their existing applications that their users are already using. Business logic SDK is a set of Java based APIs that can be used for embedding custom business logic inside identity management policies. Java connector server SDK is used to develop custom connectors which support provisioning to home- grown applications. Configuration Management Config Xpress is a utility that provides system administrators the ability to easily move components between staging environments for simplified configuration management. It also provides a change analysis report that highlights differences between environments as compared to a current and baseline installation. It provides a push-button system documentation process that records the many system components for future reference or as a part of a system recovery plan. Config Xpress also provides a convenient and efficient method to display component relationships. For example, it shows which screens are used by specific tasks and which administrative roles grant access to those tasks.

7 SOLUTION BRIEF: CA IDENTITY SUITE IDENTITY MANAGEMENT Enterprise-Class Scalability CA Identity Manager is deployed by some of the largest enterprises in the world, including those which require the highest degrees of scalability and around-the-clock availability. This same level of service benefits not only large enterprises but customers of various sizes, across various industries. CA Identity Manager s flexible, layered architecture has been designed to support enterprise needs, including: Layered clustering is supported at every CA Identity Manager infrastructure layer, including the CA Identity Manager application, provisioning Server, connector server and repositories. Clustering support addresses high availability as well as load balancing requirements. Component distribution can be extended horizontally by adding additional machines in a mirrored fashion. Alternatively, the deployment can be extended vertically by dedicating machines to handling specific functions which carry the highest loads. Strong Security Because user identities represent highly sensitive information, CA makes continuous investments to help deliver the highest levels of internal product security. This enables the management of users and their access rights across the entire enterprise while maintaining the product security disciplines in accordance with industry best practices. These features include: Cryptography CA Identity Manager uses the Advanced Encryption Standard (AES), incorporating proven cryptographic libraries Crypto-J v3.5 and Crypto-C ME v2.0. These cryptographic requirements include encryption algorithms, key sizes and implementation for handling sensitive data. FIPS 140-2 Support Federal Information Processing Standards (FIPS) 140-2 is a security standard for the cryptographic libraries and encryption algorithms which help ensure high standards of data security. Data Security CA Identity Manager secures data at rest and in transit by using secured protocols over all communication channels between components and endpoints. In the majority of cases, this includes usage of standard protocols over SSL such as HTTP over SSL (HTTPS) and LDAP over SSL (LDAPS). Reconciliation Services Synchronizing identities and access rights across the enterprise requires bi-directional connectivity with managed systems. In previous sections, we focused on the propagation of changes from CA Identity Manager to endpoint systems. Reconciliation services, called Reverse Synchronization, recognize changes made directly on endpoint systems, determine if they are within policy and synchronize them across other systems as appropriate. These include: System Acquisition Once a new managed system is defined, the reconciliation service discovers the list of existing accounts and automatically maps these accounts to users based on correlation rules. Accounts that do not satisfy correlation rules are flagged as orphan accounts for manual review. The system owner can associate accounts to users, mark them as system accounts, disable accounts or delete accounts. Authoritative System Support Authoritative systems are business applications or IT platforms designated as the source of certain user or account attributes. For example, in many enterprises a human resources application is the authoritative source for employee information. CA Identity Manager

8 SOLUTION BRIEF: CA IDENTITY SUITE IDENTITY MANAGEMENT supports the option to have multiple authoritative systems, each with authority over part of the user population or a subset of attributes. The ability for changes made at authoritative sources to override existing information in CA Identity Manager can be set at multiple levels. Authoritative system records can be mapped to CA Identity Manager user entities. Changes to these objects trigger tasks, such as Create User, Modify User and Delete User. Authoritative system records are mapped to CA Identity Manager individual accounts. An individual user may have multiple associated accounts with different synchronization policies for different user profile and account attributes. Authoritative Systems can have the ability to make updates on certain attributes but not be authorized to change others. By comparing the known status of accounts in CA Identity Manager with the actual assignment of these accounts in the target systems, Reverse Synchronization discovers when an authorized changes have taken place. Based on this, it can initiate automated alerts or remediation processes such as triggering a manual review by an administrator or initiating reverse actions for these changes. Mobile Use CA Identity Suite includes a native mobile application that extends commonly used features of CA Identity Manager to the mobile environment. The mobile app provides the business user with the ability to review and approve workflow requests, perform password self-service operations and review profile details all from a smartphone. This important capability allows the organization to support BYOD policy, and to improve efficiency, responsiveness and user satisfaction while reducing security risks. Manage identities and entitlements on-the-go

9 SOLUTION BRIEF: CA IDENTITY SUITE IDENTITY MANAGEMENT System Administration CA Identity Manager includes a comprehensive set of capabilities that enable you to define what business operations each user can perform and under which business restrictions. This enables you to regulate who can do what to whom. Delegation models are based on combinations of roles and rules and can include custom logic for modeling unique delegation logic as needed. Workflow-based delegation provides the ability to easily create and apply approval processes so users can feel confident their actions will be appropriately delegated. Each approval can, in turn, be subject to delegation, allowing approvers to further delegate or transfer approval authority if it was improperly assigned. Granularity of delegation capabilities (create user, approve access request or view system report) can be defined based on user or organizational attributes or a combination of both. Scoping defines what specific actions individual users are authorized to perform but also includes the ability to define dynamic, instance-specific rules. For example, a user can have scope over all users in sales or all users at my location. Auditing and reporting The CA Identity Manager audit service captures a complete trail of business changes, provides ad-hoc query capabilities and can integrate third-party security information and event management (SIEM) solutions for cross-domain forensic and reporting analysis. In addition, CA Identity Manager reporting services offer the following capabilities: Enterprise-Class Reporting CA Identity Manager includes an embedded version of Business Objects Crystal Reports XI. This scalable approach enables organizations to build customized reports which support enterprise requirements. Snapshot Warehouse Organizations can periodically schedule capturing of current organizational access policy and actual entitlements assignments. The recorded information is stored in a relationship database as an individual snapshot, representing the status at a particular date. Viewing the progression of snapshots stored in the warehouse provides a historical view of access assignments. This information can be used in a forensic scenario to produce reports of assignments at a particular date or for trending to show the evolution over time and provide visibility into gradual changes happening in the organization. Out-of-Box Reports CA Identity Manager includes a set of pre-built reports that provide valuable visibility into the identity management operation and efficiency through entitlements, policies and workflow insight.

10 SOLUTION BRIEF: CA IDENTITY SUITE IDENTITY MANAGEMENT Section 3: Benefits of a Business User-Centric Approach to Identity Management The identity management capabilities of the CA Identity Suite enable organizations to quickly provision users to a broad range of applications, to simplify and streamline identity management processes, to enable convenient self-service and to reduce overall security costs. The solution offers also provides capabilities and benefits not available in other solutions, such as: Intuitive, Business-Oriented User Experience The user experience and convenience offered by the CA Identity Suite is unmatched in the industry. Key identity management capabilities such as provisioning, self-service, access requests and entitlement management are available in an intuitive, business-oriented experience. The result is improved user satisfaction and loyalty, along with increased productivity. Reduced Total Cost of Ownership (TCO) The breadth of application connectors available in CA Identity Suite reduces the amount of custom work required to provision your applications. More importantly, CA Identity Manager includes out-of the-box configuration tools that simplify the deployment process and make it easy to enforce your security policies without custom coding. Connectors to custom applications can also be deployed easily using Connector Xpress. Our customers have found that deployments are simpler, quicker and require less ongoing code maintenance. Strong, Robust Connectivity With Target Systems CA Identity Manager includes connectors that provide deep functionality, rather than simple connectivity. For example, the Active Directory (AD) connector enables management of groups and distribution lists directly, simplifying management of AD user information. This is just one example of the depth of the capabilities offered by the broad set of connectors within the Identity Suite. Proven Consumer-Scale Each of these benefits is predicated on the ability to support enterprise scalability and distribution requirements which can involve millions of resources over thousands of applications. CA Identity Manager is being used today in some of the largest and most complex IT environments in the world. It can meet your needs for scale now and into the future. Integration With Other Identity Capabilities CA Identity Manager delivers integration to other identity and access management solutions from CA Technologies, including CA Identity Governance, CA Single Sign-On and CA Advanced Authentication, which improves management of your users and their access to your IT resources and simplifies compliance efforts.

11 SOLUTION BRIEF: CA IDENTITY SUITE IDENTITY MANAGEMENT Connect with CA Technologies at CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate across mobile, private and public cloud, distributed and mainframe environments. Learn more at. Copyright 2015 CA. All rights reserved. Windows is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. UNIX is a registered trademark of The Open Group. Java and all Java-based trademarks and logos are trademarks of Oracle Corporation in the United States, other countries, or both. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. CS200-157609_1015