SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
Novell Identity Manager
                   ®

It’s Not Just about Identity Management Anymore!




Steve Whicker                   Sarah Hetrick
Manager – Security Compliance   Sr Technical Engineer
AHIS – Central Region           AHIS – Central Region
St Vincent Health               St Vincent Health
sawhicke@stvincent.org          sehetric@stvincent.org
Identity Management Goals
    at St. Vincent Health
    •   Enable regulatory compliance (HIPAA) and internal controls
        in IS security processes
    •   Reduce operating costs through user account provisioning
        (process automation) and sharing common infrastructure
        components
    •   Decrease corporate exposure by reducing the risk of
        unauthorized access to data & automating enforcement of
        security policy
    •   Improve associate satisfaction by automating online HR
        benefits management
    •   Improve data integrity by decreasing duplicative identity data
        stores and manual data entry processes
    •   Improve the quality of services provided by IS
2   © Novell, Inc. All rights reserved.
St. Vincent Health’s Identity
    Management Drivers
                Regulatory
                                                    Security                Efficiency / Cost
                Compliance

     •   HIPAA                            •   Automate Manual       •   Reduce Manual
     •   Unique user                          Security Policies         Admin via automated
         identification                   •   Automate Identity         account provisioning
         requirements                         Management (Create,   •   Manage online HR
     •   Access Control                       Modify, Delete)           Benefits
         Requirements                     •   Automate Roles        •   Set up Foundation for
     •   Auditing                             Based Access              Expanded Services
         Requirements                         Control               •   Improve Data
     •   Minimum Necessary
                                          •   Automate Workflow         Accuracy
         Requirements                         Approval, Denial      •   Leverage Current
     •   Enterprise Role-                                               Investments
         based Access Control                                       •   Provide Password
         (RBAC) model                                                   Reset Self Service
     •   Auditing / Reporting




3   © Novell, Inc. All rights reserved.
Where We Started (July 2005)

    •   Four separate networks (Indianapolis, Frankfort, Anderson, Kokomo)
    •   Two separate and overlapping access request processes for identity
        and access management (ID Request & IS Request), made it difficult
        to centrally manage the access request and change logs
    •   Identity creation and management was a manual process
    •   No centralized process to document request completion
    •   No formal validation process to verify the authenticity of requesting
        manager
    •   Multiple touch points (Network Administrator and Application support
        personnel) for creation of Login ID for an individual user
    •   De-provisioning process was not consistently followed
    •   No user entitlement matrix existed
4   © Novell, Inc. All rights reserved.
Our Identity Management Roadmap
   Infrastructure




                                                                            Enable Bi-
                               Upgrade NT           Upgrade Existing                           Consolidate File
     Readiness
      Directory




                                                                            Directional
                              Domains to AD          Drivers to IdM2                           Services Trees
                                                                             Creates

                                Implement
                            Universal Password



                              Document Identity                                                                        Implement
Implementation




                                                                          Design Enhanced
                                Management
 Provisioning




                                                                                                                       PeopleSoft
  Design and




                                                                        Identity Management
  Enhanced




                               Requirements                                                                            Connector         Implement Web
                                                                                                   Implement
                                                                                                                                             Based
                                                                                                  Password Self
                                               Document Web based                                                                         Provisioning
                               Process                                   Design Web based            Service        Enhance Existing
                                                  Provisioning                                                                             Workflow
                             Analysis and                              Provisioning Workflow                         Connectors and
                               Design               Workflow
                                                                                                                       Implement
                                                  Requirements
   Provisioning Design
   and Implementation
       Role Based




                                                                                                     Role Definition and Mapping


                                                                                                       Document Role based          Design Role           Implement Role
                                                                                                                                                                                       Provision users to
                                                                                                           provisioning                based             based access and
                                                                                                                                                                                       additional systems
                                                                                                          requirements              provisioning            provisioning


                                                      Design
                              Identify Audit                                                                      Audit Logging ( enable real time logging with appropriate systems)
          Auditing and




                                                    Auditing and
                                 Needs
           Reporting




                                                     Reporting

                                                                                                          Implement Audit




                                Skill
                                                                                                          Skills Development and Training
                             Assessment
    Business and
      Ongoing
      Support




                                                                                                Ongoing Maintenance and Support


                                                                              Governance, Organizational Change Management and Communication




           5             © Novell, Inc. All rights reserved.
Identity and Request
    Management Portal
                                                                                      Windows
                                                                                   Biztalk Data
                                                                                   Warehouse
                                                                 Windows

                                                                                                  Vistar



                                                               STVLDAP




                                                                                        Windows



                                                                            IND1
                                                                 IDV
    Identity Management Portal


                                                                                        Windows



                                      National AD / Exchange    STVI       STVNET
                                              Windows
6   © Novell, Inc. All rights reserved.
Hiring Process
                                                                            Start 1                                                                                         20. User and Manager
                                                                                                                                                                           receives notification that
   Non-System




                                                                                                                                                                         application has been granted
    Processes




                                                                            1. HR/manager is notified
                                                                             of new hire (associate/
                                                                                 non-associate)
   PeopleSoft




                                                                                2. HR/manager enters                     7. PeopleSoft is
     HRMS




                                                                                   hire data into PS                   updated with Login
                                                                                   (associate / non-                   ID & email address
                                                                                       associate)

                                                                     No                                                                                                           19. Workflow
   Workflow Processes




                             3. All required attributed                                5a. Identity Manager            6. Identity Manager         5b. Go to                     generates email
                                                                                Yes
    eDirectory (IDV)




                                 Are available and           4. Is this a               determine unique               creates and places         Modify Users                     notifications
                               PeopleSoft effective         new Identity?                    Login ID                       the Identity          Process Box
                                                                                                                                                                                               Yes
                     ™




                                date has transpired                                                                                                    #4

                                                                                        13. Identity Manager                                   Manager     12. Go to                 18. Application
                               15b. Application                     14. WF                                             11. Identity Manager
                                                                                       generates workflow &                                    requests   Modify Users              support approves
                             support checks queue                 approved by                                           emails manager of                                                 WF
                                                                                       email notify for default                               additional  Process Box
                                                                   approver?                                                 new hire
                                                                                       applications per rules                                 Apps via WF    #10b
                                                    Yes for non
                                                    connected
SVHLDAP)
eDirectory




                                                                                                                     8b. Identity Manager         8a. Identity Manager
 (STVI &




                                                      system
                                                                                                                      creates Identity in          creates Identity in
                                                                                                                          SVHLDAP                         STVI
 Directory Directory
(STVNET) (IND1)




                                                                                                                                                   9. Identity Manager
            Active




                                                                            Yes for connected system                                              creates Identity IND1
  Active




                                                                                                                                                  10. Identity Manager
                                                                                                                                                creates Identity STVNET
       Other Applications




                                                            17. Application support
                             16. Application support
                                                             creates Identity and
                            determines access rights
                                                                 access rights
                                                                                                            15a. Create new
                             Process perfomed for each application requested                           user account automatically



                     7       © Novell, Inc. All rights reserved.
Termination Process
                             Start 1                          Start 2                         Start 3
                                                                                                                                                                                     15. Manager
   Non-System
    Processes




                            1. Manager is notified of a       1b. HR Service Center is                                               5. Server team is email notified that the    receives notification
                               termination event for            notified of termination      1c. Termination is initiated          user never showed up for work, research is
                                 associate or non             event for associate or non       through VISTAR feed                  done, accounts may be deleted manually,
                                    associate                          associate                                                       instead of just disable automatically
   PeopleSoft
     HRMS




                                           2. Data is entered into
                                             PeopleSoft HRMS


                                                                                                                                                                                 14. Workflow generates
   Workflow Processes




                                        3. IDM Updates User data in
    eDirectory (IDV)




                                                                                  4a. Is this an a                                                                                  email notifications
                                       IDV. disables account & moves
                                                                                  no show hire?
                                        user to the inactive container
                     ™




                                                                              4b. Routes termination
                                                                                                             Yes               11. All application support admin(s)                       13.
                                                                                                                              are notified via email of a termination             Application Support
                                                                               WF request to all app
                                                                                                                               workflow task to be completed after                  Approves WF
                                                                                security admin(s)
                                                                                                                                they disable or delete the account
SVHLDAP)
eDirectory
 (STVI &




                                        6. IDM Updates User data in            7. IDM disables Groupwise
                                                                                                                      10. IDM deletes user
                                       STVI. disables account & moves             user and sets visibility
                                                                                                                      account in SVHLDAP
                                        user to the inactive container                   to note
 Directory Directory




                                         8. IDM Updates User data in
(STVNET) (IND1)
            Active




                                       IND1. disables account & moves
                                         user to the inactive container
  Active




                                            9. IDM deletes user
                                            account in STVNET
       Other Applications




                                                                                                                                 13. Application support admins
                                                                                                                                  disable/delete user manually
                                                                                                                                      in other application(s)



                     8      © Novell, Inc. All rights reserved.
Other Processes Handled

    •   Renames (Name Changes)

    •   Business Unit Changes

    •   User Data Changes




9   © Novell, Inc. All rights reserved.
Automated Escalation Process Insures
     Customer Request Are Not Lost
                                                       Initiated by Manager to
                                                    Grant application for End User

                                                 Application           Escalate to          2nd Escalation to
                                                   Owner               Owner's Mgr            Owner's Mgr
        Start


                                       1d
                                       2d                                                   Denied
            Could take                 3d                 Time
                                                                 Out
            up to 6 days               4d                                                        Denied
                                       5d                                      Time
                                                                                      Out
                                       6d                                                             Denied
                                                  Approved *
                                                                                                      Ti m e
                                                                                                               Out
                                                                        Approved *             Approved *



          * indicates                                                                                                  Log for all
                                               IDM                                                                   denied activities
          completion
                                            Entitlement
            of work
                                            is granted


                                                                               Finished



10   © Novell, Inc. All rights reserved.
Service Request Management

     •   Replaced existing Information Services Request
         (ISR) System
     •   Provides three different workflow processes
          –   Catalog Equipment Order
          –   Equipment Moves & Removals
          –   Professional Services (Including Projects)
     •   Utilized management hierarchy to route approvals
     •   Ties Identity and Request Management (IDRM) to
         the ticketing system
          –   Currently a manual connection
          –   Future connection will be automated using SOAP

11   © Novell, Inc. All rights reserved.
Professional Services Workflow

      PSP Request Initiated




        Manager Approval




     IS Tuesday / Thursday
     Group Reviews Request




                                                                                                  Start Project
            Project?
                                                                                                 Workflow Process




                                                          Request discussed with
            Requires                   Assign team for                             Manager OK       Request
                                                           Requested Approving
          Assessment?                    evaluation                                 with Cost?     Terminated
                                                                Manager




           Assign to
        Appropriate team




     E-mail to Services Desk           Ticket number is     E-mail to requester
     with request information         entered into IDRM       with status and
                                                                                                      Finish
         for ticket creation         Request and closed       Ticket Number



12   © Novell, Inc. All rights reserved.
Self-Service Password Reset

     •   Provides user the ability to reset their own
         password anytime any place
          –   At work

          –   At home on portals

     •   Reduces Helpdesk calls
     •   Provides for positive validation of user identity
         through “Challenge and Response” Questions
     •   Easily integrates with current systems


13   © Novell, Inc. All rights reserved.
Lessons Learned

     •   Know and thoroughly document your environment
     •   Assume nothing
         (verify things actually work as advertised)
     •   Understand the organizations business processes
          –   Talk to the users and understand yours and their
              business processes
     •   Cooperation and involvement of Human
         Resources is vital
     •   Have a viable test environment
     •   Be prepared for problems


14   © Novell, Inc. All rights reserved.
What’s Next?

     •   Install the Roles and Provisioning Module
          –   Upgraded version of the User Application

     •   Role Based Provisioning Design and Implementation




15   © Novell, Inc. All rights reserved.
Demonstration
Questions?
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Mais conteúdo relacionado

Mais procurados

Bringing API Management to AWS Powered Backends
Bringing API Management to AWS Powered BackendsBringing API Management to AWS Powered Backends
Bringing API Management to AWS Powered BackendsApigee | Google Cloud
 
How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...
How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...
How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...Amazon Web Services
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access managementDinusha Kumarasiri
 
Power BI Dashboard | Microsoft Power BI Tutorial | Data Visualization | Edureka
Power BI Dashboard | Microsoft Power BI Tutorial | Data Visualization | EdurekaPower BI Dashboard | Microsoft Power BI Tutorial | Data Visualization | Edureka
Power BI Dashboard | Microsoft Power BI Tutorial | Data Visualization | EdurekaEdureka!
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptxChrisaldyChandra
 
Encryption in Microsoft 365 - session for CollabDays UK - Bletchley Park
Encryption in Microsoft 365 - session for CollabDays UK - Bletchley ParkEncryption in Microsoft 365 - session for CollabDays UK - Bletchley Park
Encryption in Microsoft 365 - session for CollabDays UK - Bletchley ParkAlbert Hoitingh
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyOkta-Inc
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Solutions Architect's Handbook 2nd Edition - Book Review
Solutions Architect's Handbook 2nd Edition - Book ReviewSolutions Architect's Handbook 2nd Edition - Book Review
Solutions Architect's Handbook 2nd Edition - Book ReviewAshraf Fouad
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Tom Laszewski
 
Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Matt Soseman
 
Azure - Identity as a service
Azure - Identity as a serviceAzure - Identity as a service
Azure - Identity as a serviceBizTalk360
 
Azure Training | Microsoft Azure Tutorial | Microsoft Azure Certification | E...
Azure Training | Microsoft Azure Tutorial | Microsoft Azure Certification | E...Azure Training | Microsoft Azure Tutorial | Microsoft Azure Certification | E...
Azure Training | Microsoft Azure Tutorial | Microsoft Azure Certification | E...Edureka!
 
MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021Matt Soseman
 
Access Security - Privileged Identity Management
Access Security - Privileged Identity ManagementAccess Security - Privileged Identity Management
Access Security - Privileged Identity ManagementEng Teong Cheah
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
 

Mais procurados (20)

Bringing API Management to AWS Powered Backends
Bringing API Management to AWS Powered BackendsBringing API Management to AWS Powered Backends
Bringing API Management to AWS Powered Backends
 
How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...
How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...
How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
 
Power BI Dashboard | Microsoft Power BI Tutorial | Data Visualization | Edureka
Power BI Dashboard | Microsoft Power BI Tutorial | Data Visualization | EdurekaPower BI Dashboard | Microsoft Power BI Tutorial | Data Visualization | Edureka
Power BI Dashboard | Microsoft Power BI Tutorial | Data Visualization | Edureka
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptx
 
Encryption in Microsoft 365 - session for CollabDays UK - Bletchley Park
Encryption in Microsoft 365 - session for CollabDays UK - Bletchley ParkEncryption in Microsoft 365 - session for CollabDays UK - Bletchley Park
Encryption in Microsoft 365 - session for CollabDays UK - Bletchley Park
 
Passwordless auth
Passwordless authPasswordless auth
Passwordless auth
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Solutions Architect's Handbook 2nd Edition - Book Review
Solutions Architect's Handbook 2nd Edition - Book ReviewSolutions Architect's Handbook 2nd Edition - Book Review
Solutions Architect's Handbook 2nd Edition - Book Review
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
 
Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Azure - Identity as a service
Azure - Identity as a serviceAzure - Identity as a service
Azure - Identity as a service
 
Azure Training | Microsoft Azure Tutorial | Microsoft Azure Certification | E...
Azure Training | Microsoft Azure Tutorial | Microsoft Azure Certification | E...Azure Training | Microsoft Azure Tutorial | Microsoft Azure Certification | E...
Azure Training | Microsoft Azure Tutorial | Microsoft Azure Certification | E...
 
Power BI for Developers
Power BI for DevelopersPower BI for Developers
Power BI for Developers
 
MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021
 
Access Security - Privileged Identity Management
Access Security - Privileged Identity ManagementAccess Security - Privileged Identity Management
Access Security - Privileged Identity Management
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 

Semelhante a Identity and Request Management Using Novell Identity Manager: Identity Manager—It’s Not Just about Identity Management Anymore!

Cogent Company Overview.11292009
Cogent Company Overview.11292009Cogent Company Overview.11292009
Cogent Company Overview.11292009Marc Hoppers
 
SharePoint 2010 as a Development Platform
SharePoint 2010 as a Development PlatformSharePoint 2010 as a Development Platform
SharePoint 2010 as a Development PlatformAyman El-Hattab
 
HCLT Brochure: E-Discovery and Document Review Solutions
HCLT Brochure: E-Discovery and Document Review SolutionsHCLT Brochure: E-Discovery and Document Review Solutions
HCLT Brochure: E-Discovery and Document Review SolutionsHCL Technologies
 
The business benefits_of_metastorm_bp_mv9
The business benefits_of_metastorm_bp_mv9The business benefits_of_metastorm_bp_mv9
The business benefits_of_metastorm_bp_mv9wnowakkk
 
Envision IT Seminar Presentation - Microsoft Office 365
Envision IT Seminar Presentation - Microsoft Office 365 Envision IT Seminar Presentation - Microsoft Office 365
Envision IT Seminar Presentation - Microsoft Office 365 Envision IT
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middlewareinvestorrelation
 
Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012Juanchi_43
 
Business Service Management on the Fly—In under 60 Minutes!
Business Service Management on the Fly—In under 60 Minutes!Business Service Management on the Fly—In under 60 Minutes!
Business Service Management on the Fly—In under 60 Minutes!Novell
 
Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用George Ang
 
Qcon java在企业级开发中的应用
Qcon java在企业级开发中的应用Qcon java在企业级开发中的应用
Qcon java在企业级开发中的应用youzitang
 
BSM201.pdf
BSM201.pdfBSM201.pdf
BSM201.pdfNovell
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012DDLS
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
 
Jazz for Service Management - OMNIbus
Jazz for Service Management - OMNIbusJazz for Service Management - OMNIbus
Jazz for Service Management - OMNIbusIBM_BSM
 
Developing An SOA Strategy V1
Developing An SOA Strategy V1Developing An SOA Strategy V1
Developing An SOA Strategy V1Salim Sheikh
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 PredictionsFlexera
 
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudwwwally
 
Gulf Computers Presentation
Gulf Computers PresentationGulf Computers Presentation
Gulf Computers Presentationharish_kris
 

Semelhante a Identity and Request Management Using Novell Identity Manager: Identity Manager—It’s Not Just about Identity Management Anymore! (20)

Cogent Company Overview.11292009
Cogent Company Overview.11292009Cogent Company Overview.11292009
Cogent Company Overview.11292009
 
SharePoint 2010 as a Development Platform
SharePoint 2010 as a Development PlatformSharePoint 2010 as a Development Platform
SharePoint 2010 as a Development Platform
 
HCLT Brochure: E-Discovery and Document Review Solutions
HCLT Brochure: E-Discovery and Document Review SolutionsHCLT Brochure: E-Discovery and Document Review Solutions
HCLT Brochure: E-Discovery and Document Review Solutions
 
The business benefits_of_metastorm_bp_mv9
The business benefits_of_metastorm_bp_mv9The business benefits_of_metastorm_bp_mv9
The business benefits_of_metastorm_bp_mv9
 
Envision IT Seminar Presentation - Microsoft Office 365
Envision IT Seminar Presentation - Microsoft Office 365 Envision IT Seminar Presentation - Microsoft Office 365
Envision IT Seminar Presentation - Microsoft Office 365
 
Dev ops intro
Dev ops  introDev ops  intro
Dev ops intro
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
 
Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012
 
Configuring and deploying a private cloud with system center 2012
Configuring and deploying a private cloud with system center 2012Configuring and deploying a private cloud with system center 2012
Configuring and deploying a private cloud with system center 2012
 
Business Service Management on the Fly—In under 60 Minutes!
Business Service Management on the Fly—In under 60 Minutes!Business Service Management on the Fly—In under 60 Minutes!
Business Service Management on the Fly—In under 60 Minutes!
 
Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用Ibm Java在企业级开发中的应用
Ibm Java在企业级开发中的应用
 
Qcon java在企业级开发中的应用
Qcon java在企业级开发中的应用Qcon java在企业级开发中的应用
Qcon java在企业级开发中的应用
 
BSM201.pdf
BSM201.pdfBSM201.pdf
BSM201.pdf
 
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012Microsoft sccm 2012 seminar   ddls sydney 22 nov 2012
Microsoft sccm 2012 seminar ddls sydney 22 nov 2012
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
Jazz for Service Management - OMNIbus
Jazz for Service Management - OMNIbusJazz for Service Management - OMNIbus
Jazz for Service Management - OMNIbus
 
Developing An SOA Strategy V1
Developing An SOA Strategy V1Developing An SOA Strategy V1
Developing An SOA Strategy V1
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
 
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
 
Gulf Computers Presentation
Gulf Computers PresentationGulf Computers Presentation
Gulf Computers Presentation
 

Mais de Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 

Mais de Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

Identity and Request Management Using Novell Identity Manager: Identity Manager—It’s Not Just about Identity Management Anymore!

  • 1. Novell Identity Manager ® It’s Not Just about Identity Management Anymore! Steve Whicker Sarah Hetrick Manager – Security Compliance Sr Technical Engineer AHIS – Central Region AHIS – Central Region St Vincent Health St Vincent Health sawhicke@stvincent.org sehetric@stvincent.org
  • 2. Identity Management Goals at St. Vincent Health • Enable regulatory compliance (HIPAA) and internal controls in IS security processes • Reduce operating costs through user account provisioning (process automation) and sharing common infrastructure components • Decrease corporate exposure by reducing the risk of unauthorized access to data & automating enforcement of security policy • Improve associate satisfaction by automating online HR benefits management • Improve data integrity by decreasing duplicative identity data stores and manual data entry processes • Improve the quality of services provided by IS 2 © Novell, Inc. All rights reserved.
  • 3. St. Vincent Health’s Identity Management Drivers Regulatory Security Efficiency / Cost Compliance • HIPAA • Automate Manual • Reduce Manual • Unique user Security Policies Admin via automated identification • Automate Identity account provisioning requirements Management (Create, • Manage online HR • Access Control Modify, Delete) Benefits Requirements • Automate Roles • Set up Foundation for • Auditing Based Access Expanded Services Requirements Control • Improve Data • Minimum Necessary • Automate Workflow Accuracy Requirements Approval, Denial • Leverage Current • Enterprise Role- Investments based Access Control • Provide Password (RBAC) model Reset Self Service • Auditing / Reporting 3 © Novell, Inc. All rights reserved.
  • 4. Where We Started (July 2005) • Four separate networks (Indianapolis, Frankfort, Anderson, Kokomo) • Two separate and overlapping access request processes for identity and access management (ID Request & IS Request), made it difficult to centrally manage the access request and change logs • Identity creation and management was a manual process • No centralized process to document request completion • No formal validation process to verify the authenticity of requesting manager • Multiple touch points (Network Administrator and Application support personnel) for creation of Login ID for an individual user • De-provisioning process was not consistently followed • No user entitlement matrix existed 4 © Novell, Inc. All rights reserved.
  • 5. Our Identity Management Roadmap Infrastructure Enable Bi- Upgrade NT Upgrade Existing Consolidate File Readiness Directory Directional Domains to AD Drivers to IdM2 Services Trees Creates Implement Universal Password Document Identity Implement Implementation Design Enhanced Management Provisioning PeopleSoft Design and Identity Management Enhanced Requirements Connector Implement Web Implement Based Password Self Document Web based Provisioning Process Design Web based Service Enhance Existing Provisioning Workflow Analysis and Provisioning Workflow Connectors and Design Workflow Implement Requirements Provisioning Design and Implementation Role Based Role Definition and Mapping Document Role based Design Role Implement Role Provision users to provisioning based based access and additional systems requirements provisioning provisioning Design Identify Audit Audit Logging ( enable real time logging with appropriate systems) Auditing and Auditing and Needs Reporting Reporting Implement Audit Skill Skills Development and Training Assessment Business and Ongoing Support Ongoing Maintenance and Support Governance, Organizational Change Management and Communication 5 © Novell, Inc. All rights reserved.
  • 6. Identity and Request Management Portal Windows Biztalk Data Warehouse Windows Vistar STVLDAP Windows IND1 IDV Identity Management Portal Windows National AD / Exchange STVI STVNET Windows 6 © Novell, Inc. All rights reserved.
  • 7. Hiring Process Start 1 20. User and Manager receives notification that Non-System application has been granted Processes 1. HR/manager is notified of new hire (associate/ non-associate) PeopleSoft 2. HR/manager enters 7. PeopleSoft is HRMS hire data into PS updated with Login (associate / non- ID & email address associate) No 19. Workflow Workflow Processes 3. All required attributed 5a. Identity Manager 6. Identity Manager 5b. Go to generates email Yes eDirectory (IDV) Are available and 4. Is this a determine unique creates and places Modify Users notifications PeopleSoft effective new Identity? Login ID the Identity Process Box Yes ™ date has transpired #4 13. Identity Manager Manager 12. Go to 18. Application 15b. Application 14. WF 11. Identity Manager generates workflow & requests Modify Users support approves support checks queue approved by emails manager of WF email notify for default additional Process Box approver? new hire applications per rules Apps via WF #10b Yes for non connected SVHLDAP) eDirectory 8b. Identity Manager 8a. Identity Manager (STVI & system creates Identity in creates Identity in SVHLDAP STVI Directory Directory (STVNET) (IND1) 9. Identity Manager Active Yes for connected system creates Identity IND1 Active 10. Identity Manager creates Identity STVNET Other Applications 17. Application support 16. Application support creates Identity and determines access rights access rights 15a. Create new Process perfomed for each application requested user account automatically 7 © Novell, Inc. All rights reserved.
  • 8. Termination Process Start 1 Start 2 Start 3 15. Manager Non-System Processes 1. Manager is notified of a 1b. HR Service Center is 5. Server team is email notified that the receives notification termination event for notified of termination 1c. Termination is initiated user never showed up for work, research is associate or non event for associate or non through VISTAR feed done, accounts may be deleted manually, associate associate instead of just disable automatically PeopleSoft HRMS 2. Data is entered into PeopleSoft HRMS 14. Workflow generates Workflow Processes 3. IDM Updates User data in eDirectory (IDV) 4a. Is this an a email notifications IDV. disables account & moves no show hire? user to the inactive container ™ 4b. Routes termination Yes 11. All application support admin(s) 13. are notified via email of a termination Application Support WF request to all app workflow task to be completed after Approves WF security admin(s) they disable or delete the account SVHLDAP) eDirectory (STVI & 6. IDM Updates User data in 7. IDM disables Groupwise 10. IDM deletes user STVI. disables account & moves user and sets visibility account in SVHLDAP user to the inactive container to note Directory Directory 8. IDM Updates User data in (STVNET) (IND1) Active IND1. disables account & moves user to the inactive container Active 9. IDM deletes user account in STVNET Other Applications 13. Application support admins disable/delete user manually in other application(s) 8 © Novell, Inc. All rights reserved.
  • 9. Other Processes Handled • Renames (Name Changes) • Business Unit Changes • User Data Changes 9 © Novell, Inc. All rights reserved.
  • 10. Automated Escalation Process Insures Customer Request Are Not Lost Initiated by Manager to Grant application for End User Application Escalate to 2nd Escalation to Owner Owner's Mgr Owner's Mgr Start 1d 2d Denied Could take 3d Time Out up to 6 days 4d Denied 5d Time Out 6d Denied Approved * Ti m e Out Approved * Approved * * indicates Log for all IDM denied activities completion Entitlement of work is granted Finished 10 © Novell, Inc. All rights reserved.
  • 11. Service Request Management • Replaced existing Information Services Request (ISR) System • Provides three different workflow processes – Catalog Equipment Order – Equipment Moves & Removals – Professional Services (Including Projects) • Utilized management hierarchy to route approvals • Ties Identity and Request Management (IDRM) to the ticketing system – Currently a manual connection – Future connection will be automated using SOAP 11 © Novell, Inc. All rights reserved.
  • 12. Professional Services Workflow PSP Request Initiated Manager Approval IS Tuesday / Thursday Group Reviews Request Start Project Project? Workflow Process Request discussed with Requires Assign team for Manager OK Request Requested Approving Assessment? evaluation with Cost? Terminated Manager Assign to Appropriate team E-mail to Services Desk Ticket number is E-mail to requester with request information entered into IDRM with status and Finish for ticket creation Request and closed Ticket Number 12 © Novell, Inc. All rights reserved.
  • 13. Self-Service Password Reset • Provides user the ability to reset their own password anytime any place – At work – At home on portals • Reduces Helpdesk calls • Provides for positive validation of user identity through “Challenge and Response” Questions • Easily integrates with current systems 13 © Novell, Inc. All rights reserved.
  • 14. Lessons Learned • Know and thoroughly document your environment • Assume nothing (verify things actually work as advertised) • Understand the organizations business processes – Talk to the users and understand yours and their business processes • Cooperation and involvement of Human Resources is vital • Have a viable test environment • Be prepared for problems 14 © Novell, Inc. All rights reserved.
  • 15. What’s Next? • Install the Roles and Provisioning Module – Upgraded version of the User Application • Role Based Provisioning Design and Implementation 15 © Novell, Inc. All rights reserved.
  • 18.
  • 19. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.