Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments Dragos Manac 01.10.2008
Agenda The Need for Identity & Access Management Enterprise IPA Overview Pricing Questions to Consider Where to Go for More Information 2
Identity & Access Management: What Is It? User account creation User account attribute assignment Adding or removing access to specific systems (i.e. user provisioning) Resetting passwords for lost passwords Enforcement of secure passwords Enforcement of periodic password changes User account deletion 3
Identity & Access Management: Pain Points Compliance Several regulations now require comprehensive management and auditing of user accounts and rights Inefficiency Tedious, decentralized administration of user accounts and rights for multiple systems Cumbersome maintenance of multiple user names and passwords for end users Security Deficiencies Inability to enforce secure password standards Difficulty in controlling access to information and assets Inability to determine actual rights of individual users 4
Compliance Regulations in Depth Gramm-Leach-Bliley (15 U.S.C. 6801 6809) Applies to all financial institutions Mandates adoption of strict privacy measures to protect customer data HIPPA (Security Rule 164.308-164.316) Applies to all organizations that process personal health information (PHI) Mandates the development and enforcement of formal security policies and procedures for granting different levels of access to PHI. HSPD-12 Applies to all Federal agencies Mandates secure and reliable forms of identification for all Federal employees and contractors 5
Compliance Regulations in Depth PCI (Requirements 7 10) Applies to all companies that process credit card information Mandates the implementation of strict access controls Sarbanes-Oxley (Section 404) Applies to all public companies Mandates the implementation and maintenance of an adequate internal control structure and procedures for financial reporting 6
Identity & Access Management: Implications Significant fines Increased IT resources Decreased end user productivity Loss of personal information Legal liability Brand damage Decreased market capitalization Loss of confidential information Decreased competitive advantage Service outages and business disruptions 7
Red Hat Enterprise IPA Red Hat Enterprise IPA provides centralized and secure identity & access management for Linux and Unix environments Identity who you are Policy what you can do Audit what you did Version 1.0 released in June 2008 Based on open source freeipa project: www.freeipa.org Started and contributed to by Red Hat 8
Red Hat Enterprise IPA Delivers existing technologies in an integrated solution to address customer pain points: Red Hat Directory Server Light-weight Directory Access Protocol (LDAP) MIT Kerberos Layered product (requires Red Hat Enterprise Linux) 9
Enterprise IPA Features & Benefits Feature Centralized management of user identities Single sign-on (SSO) for users Kerberos authentication and NSS data encryption Web-based graphical Interface for deployment and management Open source, open protocols Delivered via simple yearly subscription Benefit Increased IT efficiency / reduced costs Increased end user productivity Secure access to and transmission of all user information Low total cost of ownership (TCO) No vendor lock-in Open, interoperable, and extensible for re-use by other applications No complex licensing schemes Product updates and world-class support included at no additional cost 10
Enterprise IPA Roadmap: Version 1.1 GA November 2008 Available at no additional cost to all IPA subscribers Feature Two-way synchronization of user identities and passwords with Microsoft Active Directory Single sign-on (SSO) for users across Windows and RHEL environments Benefit Increased IT efficiency / reduced costs Increased end user productivity 11
Enterprise IPA Roadmap: Version 2.0 GA 2009 Available at no additional cost to all IPA subscribers Feature Creation and management of secure identities for machines & services User and group host access policy management Mutual authentication and secure communication for services Central management of administrative access to machines and services Centralized audit of administrative actions Benefit Increased IT efficiency / reduced costs Increased IT efficiency / reduced costs Increased security Increased security Increased security 12
Enterprise IPA Roadmap: RH Linux Automation Several Red Hat Linux Automation efforts are dependent upon IPA: Virtualization management Next generation system management Linux Appliance RHEL Desktop MRG/AMQP JBoss ON 2.0 Users Applications IPA Data Servers 13
Enterprise IPA Services Planning Deployment Migration From NIS to IPA From LDAP to IPA Integration Synchronization with Active Directory 14
Enterprise IPA Pricing Enterprise IPA 1.0 $7,500 annual subscription per IPA server Enterprise IPA 2.0 $7,500 annual subscription per IPA server $100 annual subscription per managed server $25 annual subscription per managed desktop Notes: Requires RHEL subscription per IPA server SLA based on underlying RHEL Virtual machine counts as a machine 15
Questions to Consider Do you have 25 or more of any of the following Linux or Unix systems deployed? Red Hat Enterprise Linux (RHEL) 3, 4, or 5 HP-UX 11, 11i v.1, or 11i v2 Sun Solaris 8,9, or 10 AIX 5.3 Mac OS X Are you facing new compliance regulations that require comprehensive management and auditing of user accounts and rights? Are you spending significant time administering user accounts and rights for multiple systems? Are your end users maintaining multiple user names and passwords in order to do their jobs? Is your current identity management solution too expensive or difficult to maintain? 16
Additional Information: www.redhat.com/enterprise_ipa 17