A SECURITY MODEL THAT WORKS FOR YOU!



Similar documents
<Insert Picture Here> PeopleTools Security, What's New in PeopleTools 8.50

PeopleSoft Enterprise Directory Interface


USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

CS HCM Integration FAQ May 2010

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, Integration Guide IBM

Course Duration: 3.5 Days. CPE Hours Available: 32 CPE. Knowledge Level: Intermediate. Field of Study: Auditing. Prerequisites: None

managing SSO with shared credentials

SAML Security Option White Paper

IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

CA SiteMinder SSO Agents for ERP Systems

Group Management Server User Guide

Entrust IdentityGuard Comprehensive

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence

Banner overview. Authentication to Banner & 3 rd Party Apps. Authorization to Banner & 3 rd Party Apps

identity management in Linux and UNIX environments

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

Oracle Cloud Bjarte Drivenes Enterprise Architect. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Pentaho Reporting Overview

Shared Accounting Module Trading Partner Integration Guide

OracleAS Identity Management Solving Real World Problems

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

White Paper. Support for the HIPAA Security Rule PowerScribe 360

Web Applications Access Control Single Sign On

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation

owncloud Architecture Overview

Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo

FileCloud Security FAQ

The increasing popularity of mobile devices is rapidly changing how and where we

IBM Security Access Manager for Web

Swedbank Payment Portal Implementation Overview

Protected Trust Directory Sync Guide

OTM Performance OTM Users Conference Jim Mooney Vice President, Product Development August 11, 2015

ACE Management Server Deployment Guide VMware ACE 2.0

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Agenda. How to configure

Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support

Vendor Questionnaire

Configuring Sponsor Authentication

SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.

Synchronization Agent Configuration Guide

Ensuring the security of your mobile business intelligence

Content Filtering Client Policy & Reporting Administrator s Guide

Flexible Identity Federation

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

Take Control of Identities & Data Loss. Vipul Kumra

Arisant s Identity Management (IdM) for K-12 Education

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, Integration Guide IBM

Installation & Configuration Guide User Provisioning Service 2.0

CA Performance Center

Onegini Token server / Web API Platform

Denodo Data Virtualization Security Architecture & Protocols

OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

OneLogin Integration User Guide

Detailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19

The Top 3 Identity Management Considerations When Implementing Google Apps for the Enterprise

HP IMC Firewall Manager

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

qliqdirect Active Directory Guide

PeopleSoft Financials Overview

Single Sign On for ShareFile with NetScaler. Deployment Guide

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

Oracle Data Integrator 11g New Features & OBIEE Integration. Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect

There are more security levels in ARCHIBUS, as described bellow.

Architecture Guidelines Application Security

User Management Guide

USING FEDERATED AUTHENTICATION WITH M-FILES

Active Directory Integration WHITEPAPER

Active Directory Integration twitter.com/onelogin ONELOGIN WHITEPAPER

The Centrify Vision: Unified Access Management

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Creating a Strong Security Infrastructure for Exposing JBoss Services

Introduction. Connection security

Finance Reporting. Edition (OBIEE) Training

owncloud Architecture Overview

HelpSystems Web Server User Guide

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

Transcription:

A SECURITY MODEL THAT WORKS FOR YOU! SEPTEMBER 13, 2012 @2011 COPYRIGHT JERI HALE- UT DALLAS ALL RIGHTS RESERVED

Jeri Hale, University of Texas at Dallas Director of IR Quality, Compliance, and Accessibility at UTD with over 27 years experience in security, internal controls, implementations, process design, business analysis, and development. Designed Security, Integrations, and HCM custom applications at UTD. Currently responsible for compliance reviews, audit coordination, and quality consulting for all enterprise applications. Ben Dai, Tunabear Consulting, Inc. Principle Consultant for Tunabear Consulting, Ben s extensive PeopleSoft experience, along with MBA, CPA, and HUB certifications give him unique perspective and insight. Under Ben s direction and hands-on efforts, Tunabear developed many of the customizations and integrations needed for the security model.

Enrollment: 17,800 Among top ranked schools management/geosciences & best value Ranked 29 th in world s most outstanding young universities (Times Higher Education) Executive MBA Ranked #1 in Texas and #10 in USA (Financial Times)

Boutique Consultancy with User Experience Methodology for tight communication links Usability Assessments Key Milestones Customer Satisfaction Role on the Security Implementation: Web Services (Inbound Integrations) PeopleCode Role Rules Outbound Integrations App Engine Dynrole & Data Storage Solutions

PeopleSoft 9.0/9.1 Enterprise Portal FMS / SCM HCM / Global Payroll Campus Solutions PeopleTools Linux DB Server NT Application Server/Web Server Oracle Database Business Intelligence Enterprise Edition Higher Ed Constituency Hub Identity Manager Server Technology Linux DB NT Application/Web SciQuest Higher Markets

UT Dallas security model overview for business/student applications "computing cloud UT Dallas critical control objectives: Accessibility Auditability Administrative feasibility Functional/Technical Methods meeting control objectives Portal as single point of entry for security administration and computing cloud

THE CHALLENGE THE COMPUTING CLOUD

TECHNICAL/FUNCTIONAL How do we secure it? USER EXPERIENCE How do we maintain it? AUDITABILITY How do we control and track changes? EFFICIENCY How do we keep it clean? ADMINISTRATION How can we AFFORD effective security and controls?

Situation Shared HCM/FMS Databases at UT System Domain UTD-Specific Portal/Campus Solutions Varied User Types Technical(Developers/Batch IDs) Functional (Super Users and Functional Processes) Departmental (Campus-Based Department Users) End-Users (Self Service) Systems (Sys Adm / Integrations) Other Campuses Technical Challenges Campus-specific User IDs Campus-specific authentication services Campus-specific Portal Content Multiple EmplIDs for Campus & Shared HCM/FMS Campus-specific Row Security Campus-specific Process Schedules Campus-specific Primary Permissions Campus-specific Business Processes Campus-specific IT and Security Policies Campus-specific Dynamic Role Criteria

THE SOLUTION THE SECURITY MODEL

Web Services communicates between two electronic devices over the Internet usually includes a broker that looks for web-based messages formatted in XML protocol Digital Certificate brokers encryption keys using web services for Secure Socket Layer (SSL) communications over the server Lightweight Directory Access Protocol(LDAP) accesses and maintains distributed directories on web services LDAP Attributes identifies attributes associated with an LDAP account that grant it access to various internet services

User Profile Defines PeopleSoft user accounts Roles Identifies PeopleSoft object permissions for a user Permission lists Grants access to PeopleSoft objects Dynamic roles Assigns roles using programs and web services

Security Model UT Dallas s conceptual model for securing its enterprise application systems within the cloud Golden Roles Role-based (rather than access-based) roles. These are the roles we centralized on the portal Role System Identifier identifies systems to which the Golden Roles pertain Role Map maps PeopleSoft roles to standard roles in hosted systems (i.e., SciQuest/OBIEE) Constituent Roles sources roles from LDAP attributes

Accessible Auditable Security Model Design Administratively Feasible

Easy Signon - LDAP Authentication/Single Sign-on Across Domains Role-Based Roles = Assigned Duties Desktop Single set of roles OR ability to map to a single set of roles across all systems in the computing cloud Provisions standardized across all systems based on campus business process requirements Permissions attached to roles within each database Auto-Provisioning Access assigned based on users identifying information (Employee Applicant Student Alumni)

Database Audit Triggers for role assignments Writes ANY change to an audit table (Online or SQL updates) Downside on same database looking at Oracle Governance, Risk, and Compliance Platform for this purpose LDAP data logged upon login Expired IDs archived before role removal Logon Logs archived before purged Access/Role assignment reports for entire cloud from Portal Electronic justification for Role-Based Access

Automate User Creation and Constituent (SS) Role Assignment at Signon Centralize Security Administration Single Task for Role Assignment Across the Cloud Row Security Roles Dynamic Role Assignment Based on Jobcode, Dept Mgr ID, Project Team, Chartfield Attributes, etc. Role Grant for Functional Roles Extends administrative capabilities to functional security administrators

THE DETAILS HOW WE DID IT

User Creation/Updates with Signon PeopleCode Log Tables Multiple User Types using ID Type Table Role System Identifiers User Sync Messaging Dynamic Role Rules: PeopleCode Role Rules with Web Services to access criteria in source systems Query Rules - Criteria Inside Portal Custom AE Dynrole Process Sciquest Signon XML Portal Content Reference Links Dynamically assigned OBIEE SQL Access to Portal Database

1) LDAP Authentication (signon PeopleCode) 2) Creates User Profile 3) User Types = Different ID s Human Capital Management Campus Solutions 4) PeopleSoft SSO (cross-domain webserver alias)

INITIAL PROVISIONING HCM HECH - Person Data/ Relationships OIM - NetID & Email Address) LDAP - Access Attributes Campus Solutions Portal - Role Assignment R O L E S Y S I D HCM - User Profiles/ Constituent Roles FMS - User Profiles/ Constituent Roles Campus Sol User Profiles/ Constituent Roles OBIEE (Applicable Users/Roles)

SECONDARY PROVISIONING HCM Empl Status, JobCode Position, Dept, etc. Request System: Manual Role & Row Sec Requests FMS- Chartfield Attribute, Project Team, etc. W E B S E R V I C E S CS Prog/Plan Status, Class Instructor, etc. Portal - Role Assignment R O L E S Y S I D HCM - User Profiles/ Constituent Roles FMS - User Profiles/ Constituent Roles Campus Sol User Profiles/ Constituent Roles OBIEE (Applicable Users/Roles)

Clone user sync message for each system Correct EmplID for Correct System Uses Role System Identifiers to filter by target Sends manually and automatically assigned roles Sends changes to user profile locks, password changes, rowsecclass, and primary permissions

LDAP Attributes to mapped to Constituent Roles used for Self Service and assigned/updated during Signon Dynamic role assignment Based on attributes in Psoft tables (Job Data, Student Data, Project Data, etc.) Custom Web Services among systems deliver assignment criteria Dynamic role assignment customization -- ONLY updates when someone s roles should be changed Large files with many changes are messaged to Portal, where dynamic role rules run

Hourly on the half hour: Job data refreshed from Job Record Hourly on the hour: PeopleCode Rules with custom web services Query Rules against Job Record/Role System IDs

Required Users in Temp Table (as delivered) Identify required changes against RoleUser (mod) Assign only changes Trigger User Sync messages Routing based on Role System Identifier

PeopleSoft Roles Mapped to Sciquest Roles Employees are Shoppers Web Service to FMS Identifies Approvers and accessible Cost Centers XML sends User Info, SciQuest Role (functional access), Cost Centers (row access) Creates Sciquest User

Dynamically assigned based on Role-System IDs Limits required security maintenance for Portal Content References Query rules inserted at signon and updated on the hour

Universal interface utilizing standard XML SOA model Disparate systems working as one Powerful Flexible and scalable, secure and synchronous

Beyond Single Sign On Disparate Applications working seamlessly External vs. Internal Bottom line that defines success SOA, Web Services, Cloud -- User does not have to know where they are, just WHAT THEY ARE DOING

HECH/OIM Testing with the Model no test Active Directory Load Testing Message Queues - User Sign-on vs. Dynamic Role Dynamic Role locks on User Profile Logging for Finding out PURGE the logs, app message queues, archive tables, audit tables, process scheduler Rebuild audit triggers when move from one environment to another Timeouts across domains