- Identity & Access Management



Similar documents
Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Additionally, as a publicly traded company, there are regulatory compliance motivations.

Extending Identity and Access Management

Integrated Identity and Access Management Architectural Patterns

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

How To Get A Single Sign On (Sso)

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者

Get Success in Passing Your Certification Exam at first attempt!

Authentication: Password Madness

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

SAML SSO Configuration

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Strategic Identity Management for Industrial Control Systems

Integrating Hitachi ID Suite with WebSSO Systems

Research. Identity and Access Management Defined

Improving Interoperability and Reducing Cost in the Data Centre

managing SSO with shared credentials

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Presentation to House Committee on Technology: HHS System Identity & Access Management

The Challenges of Web single sign-on

Global Headquarters: 5 Speen Street Framingham, MA USA P F

How the Quest One Identity Solution Products Enhance Each Other

Access Management Analysis of some available solutions

IBM Tivoli Identity Manager

Canadian Access Federation: Trust Assertion Document (TAD)

NCSU SSO. Case Study

The Unique Alternative to the Big Four. Identity and Access Management

White paper December Addressing single sign-on inside, outside, and between organizations

The Four "A's" of Information Security

The School Board of Palm Beach

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Aurora Hosted Services Hosted AD, Identity Management & ADFS

Single Sign-on (SSO) technologies for the Domino Web Server

Password Management Before User Provisioning

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost

Quest One Identity Solution. Simplifying Identity and Access Management

G A. Allan. Directory authentication providing a common ID and password across multiple systems

JumpCloud is your Directory-as-a-Service. A fully managed directory to rule your infrastructure whether on-premise or in the cloud.

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

IBM Security & Privacy Services

Agenda. How to configure

SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.

Architecture Guidelines Application Security

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

aaps algacom Account Provisioning System

Identity Management Roadmap and Maturity Levels. Martin Kuppinger Kuppinger Cole + Partner mk@kuppingercole.de

Building Secure Applications. James Tedrick

SAML-Based SSO Solution

<Insert Picture Here> Oracle Identity And Access Management

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

SAML-Based SSO Solution

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

SAP Business Objects Security

IBM Service Management solutions White paper. Make ITIL actionable with Tivoli software.

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

(A) User Convenience. Password Express Benefits. Increase user convenience and productivity

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Centralized Self-service Password Reset: From the Web and Windows Desktop

SAM Enterprise Identity Manager

Automated User Provisioning

Choose an IBM WebSphere Application Server configuration to suit your business needs

Okta Mobility Management

WHITEPAPER. Identity Management ROI Calculation Case Study. T h i n k I D e n t i t y. March 2006

SAP Road Map for SAP NetWeaver Single Sign-On

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Leverage Active Directory with Kerberos to Eliminate HTTP Password

WebLogic Server 7.0 Single Sign-On: An Overview

Enabling the vision of the Modern Datacenter. System Center 2012 SP2 Azure

Contextual Authentication: A Multi-factor Approach

SIEM and IAM Technology Integration

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Password Self Help Password Reset for IBM i

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD)

Securing the Cloud through Comprehensive Identity Management Solution

PROTECT YOUR WORLD. Identity Management Solutions and Services

Select the right solution for identity and access governance

CA Single Sign-On Migration Guide

Identity. Provide. ...to Office 365 & Beyond

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

identity management in Linux and UNIX environments

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Rich Media & HD Video Streaming Integration with Brightcove

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers

SSO Case Study: The USPS Gives SSO Its Stamp of Approval. May 10, Wayne Grimes, Manager, Customer Care Operations, USPS

Red Hat Enterprise ipa

Vyom SSO-Edge: Single Sign-On Solution for BMC Remedy

Enterprise Identity Management Reference Architecture

Transcription:

IBM Software Group NSHE - Identity & Access Management 2006 IBM Corporation

Identity & Access Management Access Management and The Monitoring, Auditing and Reporting for Compliance

So What s The Problem Anyway?

How big is the Problem? Number of systems and applications

How big is the Problem? Number of systems and applications Homogeneous or Heterogeneous

How big is the Problem? Number of systems and applications Homogeneous or Heterogeneous Number of users

How big is the Problem? Number of systems and applications Homogeneous or Heterogeneous Number of users Dynamics of the organization, systems, applications and users

How big is the Problem? Number of systems and applications Homogeneous or Heterogeneous Number of users Dynamics of the organization, systems, applications and users Size

How big is the Problem? Number of systems and applications Homogeneous or Heterogeneous Number of users Dynamics of the organization, systems, applications and users Size Complexity

How big is the Problem? Number of systems and applications Homogeneous or Heterogeneous Number of users Dynamics of the organization, systems, applications and users Size Complexity Dispersion, decentralization, delegation

How big is the Problem? Number of systems and applications Homogeneous or Heterogeneous Number of users Dynamics of the organization, systems, applications and users Size Complexity Dispersion, decentralization, delegation Growth or volatility

How big is the Problem continued Number and growth of calls to your help desk for password resets and account lockout resets Amount of Administrator time being spent managing user access Complexity and cost of cross training Administrators Business Processes for: Adding new users and granting access Changes to access rights Suspending/restoring access rights Deletion of ac

How big is the Problem continued Number and growth of calls to your help desk for password resets and account lockout resets Amount of Administrator time being spent managing user access Complexity and cost of cross training Administrators Business Processes for: Adding new users and granting access Changes to access rights Suspending/restoring access rights Deletion of access rights

How big is the Problem continued Number and growth of calls to your help desk for password resets and account lockout resets Amount of Administrator time being spent managing user access Complexity and cost of cross training Administrators Business Processes for: Adding new users and granting access Changes to access rights Suspending/restoring access rights Deletion of access rights

How big is the Problem continued Number and growth of calls to your help desk for password resets and account lockout resets Amount of Administrator time being spent managing user access Complexity and cost of cross training Administrators Business Processes for: Adding new users and granting access Changes to access rights Suspending/restoring access rights Deletion of access rights

How big is the Problem continued Number and growth of calls to your help desk for password resets and account lockout resets Amount of Administrator time being spent managing user access Complexity and cost of cross training Administrators Business Processes for: Adding new users and granting access Changes to access rights Suspending/restoring access rights Deletion of access rights

How big is the Problem continued Number and growth of calls to your help desk for password resets and account lockout resets Amount of Administrator time being spent managing user access Complexity and cost of scross training Administrators Business Processes for: Adding new users and granting access Changes to access rights Suspending/restoring access rights Deletion of access rights

How big is the Problem continued Number and growth of calls to your help desk for password resets and account lockout resets Amount of Administrator time being spent managing user access Complexity and cost of cross training Administrators Business Processes for: Adding new users and granting access Changes to access rights Suspending/restoring access rights Deletion of access rights

Manual Provisioning Organizations use slow and inconsistent processes to provision user access rights User Change Request for Access Generated Users with Accounts Administrators Create Accounts Elapsed turn-on time: up to 12 days per user Policy & Role Examined Account turn-off performance: 30-60% of accounts are invalid IT InBox 1 FTE user admin only handles 300-500 users Approval Routing

Options

Options Do nothing, status quo Number and complexity of systems, applications, etc. are growing Number of users is growing internal as well as external Business requirements are increasing and increasing at an increasing rate Increasing calls to the helpdesk and increased Administrators time Requires additional IT resources

Options Do nothing, status quo Number and complexity of systems, applications, etc. are growing Number of users is growing internal as well as external Business requirements are increasing and increasing at an increasing rate Increasing calls to the helpdesk and increased Administrators time Requires additional IT resources

Options Do nothing, status quo Number and complexity of systems, applications, etc. are growing Number of users is growing internal as well as external Business requirements are increasing and increasing at an increasing rate Increasing calls to the helpdesk and increased Administrators time Requires additional IT resources

Options Do nothing, status quo Number and complexity of systems, applications, etc. are growing Number of users is growing internal as well as external Business requirements are increasing and increasing at an increasing rate Increasing calls to the helpdesk and increased Administrators time Requires additional IT resources

Options Do nothing, status quo Number and complexity of systems, applications, etc. are growing Number of users is growing internal as well as external Business requirements are increasing and increasing at an increasing rate Increasing calls to the helpdesk and increased Administrators time Requires additional IT resources

Options Homogeneous solutions Microsoft Works well if you are only a Microsoft shop Novell Works well if you are a Novell shop and do not have complex Identity Management and Security Requirements Not much else

Options Heterogeneous solutions Single Sign-On Solutions Centralized Authentication to a LDAP directory Federated Variety of vendors with solutions offering a range of functions, features and capabilities from limited to extensive You get what you pay for!

Strategies and Approaches

Strategies and Approaches Do nothing, status quo Works well if: Number and complexity of systems, applications, etc. are not growing and are homogeneous Number of users is not growing internal as well as external Business requirements are not increasing, or if Additional IT resources are not a problem and are available

Strategies and Approaches Do nothing, status quo Works well if: Number and complexity of systems, applications, etc. are not growing and are homogeneous Number of users is not growing internal as well as external Business requirements are not increasing, or if Additional IT resources are not a problem and are available

Strategies and Approaches Do nothing, status quo Works well if: Number and complexity of systems, applications, etc. are not growing and are homogeneous Number of users is not growing internal as well as external Business requirements are not increasing, or if Additional IT resources are not a problem and are available

Strategies and Approaches Do nothing, status quo Works well if: Number and complexity of systems, applications, etc. are not growing and are homogeneous Number of users is not growing internal as well as external Business requirements are not increasing, or if Additional IT resources are not a problem and are available

Strategies and Approaches Homogeneous Microsoft s Users and Computers console to manage users Microsoft SPNEGO and Kerberos for Single Sign-On Novell e-dir

Strategies and Approaches Heterogeneous Single Sign-On Solutions IBM s Tivoli Access Manager for Enterprise Single Sign-On (TAM ESSO) Centralized Authentication to a LDAP directory Supported by all UNIX and LINUX O/S and some applications Supported by most Web Application Servers and Portals Federation Concept of ID Providers and Service Providers Three protocols: SAML, Liberty and WS Federation Requires a Trust Agreement amongst partners for each to manage their own users and to define the protocol, version and content of the tokens

Strategies and Approaches Heterogeneous Single Sign-On Solutions IBM s Tivoli Access Manager for Enterprise Single Sign-On (TAM ESSO) Centralized Authentication to a LDAP directory Supported by all UNIX and LINUX O/S and some applications Supported by most Web Application Servers and Portals Federation Concept of ID Providers and Service Providers Three protocols: SAML, Liberty and WS Federation Requires a Trust Agreement amongst partners for each to manage their own users and to define the protocol, version and content of the tokens

Strategies and Approaches Heterogeneous Single Sign-On Solutions IBM s Tivoli Access Manager for Enterprise Single Sign-On (TAM ESSO) Centralized Authentication to a LDAP directory Supported by all UNIX and LINUX O/S and some applications Supported by most Web Application Servers and Portals Federation Concept of ID Providers and Service Providers Three protocols: SAML, Liberty and WS Federation Requires a Trust Agreement amongst partners for each to manage their own users and to define the protocol, version and content of the tokens

Strategies and Approaches continued Implement an (IDM) Solution Variety of vendors with or Account Provisioning solutions that offer a range of functions, features and capabilities from limited to extensive Independent Analysts provide insight and evaluations Gartner Meta Keep in mind that there are three parts to this Access Management and the Monitoring, Auditing and Reporting for Compliance

Strategies and Approaches continued Implement an (IDM) Solution Variety of vendors with or Account Provisioning solutions that offer a range of functions, features and capabilities from limited to extensive Independent Analysts provide insight and evaluations Gartner Meta Keep in mind that there are three parts to this Access Management and the Monitoring, Auditing and Reporting for Compliance

Strategies and Approaches continued Implement an (IDM) Solution Variety of vendors with or Account Provisioning solutions that offer a range of functions, features and capabilities from limited to extensive Independent Analysts provide insight and evaluations Gartner Meta Keep in mind that there are three parts to this Access Management and the Monitoring, Auditing and Reporting for Compliance

Analyst View: Gartner on TIM Strategic Quandrant Chart for GOAL vs. Viability GOAL Viability

Next Steps

Next Steps Understand, define and document your environment, business needs and processes Buyer s Guide and Redbooks can help you with this task Perform a ROI analysis to determine if it is cost effective Use IBM s ROI Tool to help you assess and calculate the ROI: Create and send out a RFI to determine which vendors can meet (or exceed) your requirements Use IBM s Buyer s Guide to help you with this task

Next Steps Understand, define and document your environment, business needs and processes Buyer s Guide and Redbooks can help you with this task Perform a ROI analysis to determine if it is cost effective Use IBM s ROI Tool to help you assess and calculate the ROI: Or, create your own ROI analysis: ITIM Value Calculator.xls Create and send out a RFI to determine which vendors can meet (or exceed) your requirements Use IBM s Buyer s Guide to help you with this task

Next Steps Understand, define and document your environment, business needs and processes Buyer s Guide and Redbooks can help you with this task Perform a ROI analysis to determine if it is cost effective Use IBM s ROI Tool to help you assess and calculate the ROI: IBM Business Value Analyst Tool Or, create your own ROI analysis: ITIM Value Calculator.xls Create and send out a RFI to determine which vendors can meet (or exceed) your requirements Use IBM s Buyer s Guide to help you with this task Tivoli Identity Manager Buyer's Guide

Next Steps Ask vendors to demo of their IAM solutions Participate in a hands on PoT to learn first hand about the IAM solution feature, functions and capabilities Not all vendors provide this learning opportunity Invest in a Pilot NOT a PoC!

Complex Organization: SDFSDFLJSDF SDFSDFLJSDF with UCSF is one of the Leading Medical Research Institutions in the World With a Projected User Population of Nearly 30,000 Numerous Distinct Business Units: SCHOOL OF MEDICINE, SCHOOL OF DENTISTRY, SCHOOL OF PHARMACY, SCHOOL OF NURSING, MEDICAL CENTER, CHANCELLOR'S IMMEDIATE OFFICE, VC-ADMINISTRATION & FINANCE, VC-UNIV ADVANCEMENT & PLANNING, CHANCELLOR-CAMPUSWIDE ACCTS, EXECUTIVE VICE CHANCELLOR, UNIV OF CAL FOUNDATION, NON-UNIVERSITY TENANTS, MC2-MEDICAL CENTER (CONTROL PT) Separate Authoritative Identity Sources for Each Business Unit Challenges: Integrate With Multiple Authoritative Identity Sources. Satisfy Discrete Requirements of Business Units while providing Interoperation IBM Tivoli Benefits That Will Lead to an ROI Solution to multiple Authoritative Identity Sources TDI Identity Feed System Standardized password policy enforcement Centralized and secure password store & maintenance Automated provisioning for basic account services(e.g. email, wireless, etc.) Improved compliance and security by quickly eliminating user accounts (de-provisioning) Reduced sign-on (improved user experience) Simplified security policy implementation across resources (improved security and lower administrative costs) Centralized auditing (improved compliance) 47

with Access Management System Campus School of Medicine Medical Center Browser WebSEAL Reverse Proxy Authentication Session Management Single Sign-On J2EE /.NET Web Applications Jdjsa;ldj Wireless Servers Web Portal Reporting Applications HR Applications Identity Feed System: sdf Reads from Multiple Authoritative Sources to Create Credentials for Shared Identity Store: System of Record Multiple Authoritative Sources for Each Business Unit: f hr system Student registration System Contractors visiting nurses etc. Directory Integrator System of Record: sdlfj sdlkfj DB2(MVS) System Identity Manager Targets sdlkfj TAM LDAP(Solaris) Custom Applications AD (Win 2003) IBM IDS (AIX 5.3)

Tivoli s IT Operational Management Products: Strong Foundations for Administrative and Academic Computing Business Application Management Server, Network & Device Management Storage Management Security Management Products include: Products include: Products include: Products include: Tivoli Composite Application Management Tivoli Business Systems Manager Tivoli Intelligent Orchestrator Tivoli Service Level Advisor Tivoli License Manager Tivoli License Compliance Manager Tivoli Enterprise Console Tivoli Monitoring Tivoli OMEGAMON Tivoli NetView Tivoli Remote Control Tivoli Systems Automation Tivoli Workload Scheduler Tivoli Provisioning Manager Tivoli Configuration Manager Tivoli Decision Support for z/os Tivoli Storage Manager Tivoli Continuous Data Protection for Files TotalStorage Productivity Center Netcool Products include: Omnibus Precision Real Time Active Dashboard Tivoli Access Manager Tivoli Identity Manager Tivoli Federated Identity Manager Tivoli Directory Server Tivoli Directory Integrator Tivoli Security Compliance Manager TSOM Netcool Monitors

For More Information Contact: David Crea Phone: 1-425-820-2919 E-Mail: djcrea@us.ibm.com Danya I Yaldoo Phone: 1-415-545-2140 E-Mail: danyayal@us.ibm.com e J Alyn Ward Phone: 1-425-831-0352 E-Mail: jalyn@us.ibm.com Paul Wells Phone: 1-916-224-6420 E-Mail: pcwells@us.ibm.com IBM developerworks Live!; New Orleans, April 9 12, 2003 2002 2005 IBM Corporation