SlideShare uma empresa Scribd logo
1 de 11
Inventy
What does it mean to
OPTIMIZE the user
lifecycle?
INVENTY
April 2015 – SAP Security 360° Service
Have you ever had serious
difficulties in obtaining
computer rights ?
I HAVE !
Application
Form
Search for
permissions
and accounts
Add to the
request
Validate
request
Provisioning
and details
Monitoring
request and
notifications
Operational
accounts and
permissions
EASY! A simple 7 step process…
Requesting IT access rights for a normal user ?
But reality is oftendifferent …
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
Each step requires coordination
of unclear sub processes involving multiple actors ...
At Inventy,
we OPTIMIZE and SECURE the user lifecycle
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
Optimization
Zone
S
S
S
S
C
C
S
S
S
S
S
C
C
S
with SAP Identity & Access Governance,
each step is modeled and automated in IDM & GRC …
S
C
Simple automated action
.
Complex action natively integrated
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
…integrated data flows accelerate AUDITS
and reduce maintenance costs
Integrated data flow
.
I
I
I
I
I
I
I
I
I
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
I
I
I
Add to the
request
Provisioning and
details
Operational
accounts and
permissions
By profiles and
by users
Return code from
target applications
Initial password
change
Connection
validation
Person in
charge
validation
Our commitment ?
A simple user experience
A COMPLIANT process with a low cost
Application
form
Search for
permissions
and accounts
Validate
request
Monitoring
request and
notifications
Adding partial
roles
Requests
by user
copy
Automatic
additions by HR
Profile
Manager
validation Provisioning
Security Validation /
Authorization catalog
exposure
Compliance
validation
User email
April 2015
Inventy
François Michel – francois.michel@inventy.ca - 514-804-2333
Odette Scully – odette.scully@inventy.ca – 514-972-7245
www.inventy.com
Contact us to learn more
We would love to hear
more from you!

Mais conteúdo relacionado

Mais procurados

eMpower - Attendance & leave management software
eMpower - Attendance & leave management  softwareeMpower - Attendance & leave management  software
eMpower - Attendance & leave management softwareRITESH HELONDE
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)Sajjad Khan
 
iDocuments smarter workforce
iDocuments smarter workforceiDocuments smarter workforce
iDocuments smarter workforceiDocuments
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overviewEslam Hafez
 
Oracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demoOracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demoRyan Golez
 
Global Insurance Company
Global Insurance CompanyGlobal Insurance Company
Global Insurance Companyguestf8ad8d
 
Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution RITESH HELONDE
 
Why Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral ManagementWhy Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral ManagementGaryRichards30
 
Aadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance SolutionAadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance SolutionMatrix ComSec
 
Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)Shivam Pandita
 

Mais procurados (18)

eMpower - Attendance & leave management software
eMpower - Attendance & leave management  softwareeMpower - Attendance & leave management  software
eMpower - Attendance & leave management software
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
AppRoamer_Presentation
AppRoamer_PresentationAppRoamer_Presentation
AppRoamer_Presentation
 
C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)
 
IdM FinalVer
IdM FinalVerIdM FinalVer
IdM FinalVer
 
eFACiLiTY Visitor Management System
eFACiLiTY Visitor Management SystemeFACiLiTY Visitor Management System
eFACiLiTY Visitor Management System
 
iDocuments smarter workforce
iDocuments smarter workforceiDocuments smarter workforce
iDocuments smarter workforce
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
eFACiLiTY Visitor Management System
eFACiLiTY Visitor Management SystemeFACiLiTY Visitor Management System
eFACiLiTY Visitor Management System
 
Oracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demoOracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demo
 
Finance
FinanceFinance
Finance
 
Global Insurance Company
Global Insurance CompanyGlobal Insurance Company
Global Insurance Company
 
Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution
 
Why Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral ManagementWhy Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral Management
 
Lloyd Pro Group
Lloyd Pro GroupLloyd Pro Group
Lloyd Pro Group
 
Multitasking- Friend or Foe
Multitasking- Friend or FoeMultitasking- Friend or Foe
Multitasking- Friend or Foe
 
Aadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance SolutionAadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance Solution
 
Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)
 

Destaque

Planificacion de una clase
Planificacion de una clasePlanificacion de una clase
Planificacion de una claseAngel Castillo
 
第2回こども病院移転計画調査委員会資料
第2回こども病院移転計画調査委員会資料第2回こども病院移転計画調査委員会資料
第2回こども病院移転計画調査委員会資料f_kodomo
 
Robert Weisberg MCN 2013 Print Meet Digital: A Print Perspective
Robert Weisberg MCN 2013 Print Meet Digital: A Print PerspectiveRobert Weisberg MCN 2013 Print Meet Digital: A Print Perspective
Robert Weisberg MCN 2013 Print Meet Digital: A Print PerspectiveRobert Weisberg
 
A.gambaran umum bermutu (fix)
A.gambaran umum bermutu (fix)A.gambaran umum bermutu (fix)
A.gambaran umum bermutu (fix)Sutiono Tio
 
第5回こども病院移転計画調査委員会資料
第5回こども病院移転計画調査委員会資料第5回こども病院移転計画調査委員会資料
第5回こども病院移転計画調査委員会資料f_kodomo
 
検証検討チーム
検証検討チーム検証検討チーム
検証検討チームf_kodomo
 
第4回こども病院移転計画調査委員会資料
第4回こども病院移転計画調査委員会資料第4回こども病院移転計画調査委員会資料
第4回こども病院移転計画調査委員会資料f_kodomo
 
第1回こども病院移転計画調査委員会資料
第1回こども病院移転計画調査委員会資料第1回こども病院移転計画調査委員会資料
第1回こども病院移転計画調査委員会資料f_kodomo
 
Edu impacto positivo_es
Edu impacto positivo_esEdu impacto positivo_es
Edu impacto positivo_esAngel Castillo
 
第3回こども病院移転計画調査委員会資料
第3回こども病院移転計画調査委員会資料第3回こども病院移転計画調査委員会資料
第3回こども病院移転計画調査委員会資料f_kodomo
 
What does it mean to optimize the user lifecycle ?
What does it mean to optimize the user lifecycle ?What does it mean to optimize the user lifecycle ?
What does it mean to optimize the user lifecycle ?Odette Scully
 
3.1 evolucion del_computador
3.1  evolucion del_computador3.1  evolucion del_computador
3.1 evolucion del_computadorAngel Castillo
 
Proyecto virtual-tics 1
Proyecto virtual-tics 1Proyecto virtual-tics 1
Proyecto virtual-tics 1Angel Castillo
 
Planificacion de una clase
Planificacion de una clasePlanificacion de una clase
Planificacion de una claseAngel Castillo
 
2 partes externas del computador y periféricos del computador
2 partes externas del computador y periféricos del computador2 partes externas del computador y periféricos del computador
2 partes externas del computador y periféricos del computadorAngel Castillo
 
第7回こども病院移転計画調査委員会資料
第7回こども病院移転計画調査委員会資料第7回こども病院移転計画調査委員会資料
第7回こども病院移転計画調査委員会資料f_kodomo
 

Destaque (19)

Planificacion de una clase
Planificacion de una clasePlanificacion de una clase
Planificacion de una clase
 
第2回こども病院移転計画調査委員会資料
第2回こども病院移転計画調査委員会資料第2回こども病院移転計画調査委員会資料
第2回こども病院移転計画調査委員会資料
 
Robert Weisberg MCN 2013 Print Meet Digital: A Print Perspective
Robert Weisberg MCN 2013 Print Meet Digital: A Print PerspectiveRobert Weisberg MCN 2013 Print Meet Digital: A Print Perspective
Robert Weisberg MCN 2013 Print Meet Digital: A Print Perspective
 
Dim a2013m12n27a5
Dim a2013m12n27a5Dim a2013m12n27a5
Dim a2013m12n27a5
 
A.gambaran umum bermutu (fix)
A.gambaran umum bermutu (fix)A.gambaran umum bermutu (fix)
A.gambaran umum bermutu (fix)
 
第5回こども病院移転計画調査委員会資料
第5回こども病院移転計画調査委員会資料第5回こども病院移転計画調査委員会資料
第5回こども病院移転計画調査委員会資料
 
6. slide in 2
6. slide in 26. slide in 2
6. slide in 2
 
検証検討チーム
検証検討チーム検証検討チーム
検証検討チーム
 
第4回こども病院移転計画調査委員会資料
第4回こども病院移転計画調査委員会資料第4回こども病院移転計画調査委員会資料
第4回こども病院移転計画調査委員会資料
 
第1回こども病院移転計画調査委員会資料
第1回こども病院移転計画調査委員会資料第1回こども病院移転計画調査委員会資料
第1回こども病院移転計画調査委員会資料
 
3 software
3  software3  software
3 software
 
Edu impacto positivo_es
Edu impacto positivo_esEdu impacto positivo_es
Edu impacto positivo_es
 
第3回こども病院移転計画調査委員会資料
第3回こども病院移転計画調査委員会資料第3回こども病院移転計画調査委員会資料
第3回こども病院移転計画調査委員会資料
 
What does it mean to optimize the user lifecycle ?
What does it mean to optimize the user lifecycle ?What does it mean to optimize the user lifecycle ?
What does it mean to optimize the user lifecycle ?
 
3.1 evolucion del_computador
3.1  evolucion del_computador3.1  evolucion del_computador
3.1 evolucion del_computador
 
Proyecto virtual-tics 1
Proyecto virtual-tics 1Proyecto virtual-tics 1
Proyecto virtual-tics 1
 
Planificacion de una clase
Planificacion de una clasePlanificacion de una clase
Planificacion de una clase
 
2 partes externas del computador y periféricos del computador
2 partes externas del computador y periféricos del computador2 partes externas del computador y periféricos del computador
2 partes externas del computador y periféricos del computador
 
第7回こども病院移転計画調査委員会資料
第7回こども病院移転計画調査委員会資料第7回こども病院移転計画調査委員会資料
第7回こども病院移転計画調査委員会資料
 

Semelhante a What does it mean to optimize the user lifecycle ?

CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Technologies
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldForte Advisory, Inc.
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...CA Technologies
 
Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications LBi Software
 
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERPOHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERPSmart ERP Solutions, Inc.
 
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!Net at Work
 
Bsto presentation
Bsto presentationBsto presentation
Bsto presentationmssigm
 
Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)WizeHive
 
New client's standard training & orientation guide-v2
New client's standard training & orientation   guide-v2New client's standard training & orientation   guide-v2
New client's standard training & orientation guide-v2mssigm
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
Transforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldTransforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldEkhlaque Bari
 
Step up authentication
Step up authenticationStep up authentication
Step up authenticationJack Forbes
 
Workforce enterprise ppt
Workforce enterprise pptWorkforce enterprise ppt
Workforce enterprise pptbaryonsadmin
 
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdfMulti_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdfMeetsolanki39
 
Zenith Online Presentation
Zenith  Online  PresentationZenith  Online  Presentation
Zenith Online PresentationGenpact LLC
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSalesforce Admins
 
Final user provisioning webinar draft 2
Final user provisioning webinar   draft 2Final user provisioning webinar   draft 2
Final user provisioning webinar draft 2Salesforce Developers
 

Semelhante a What does it mean to optimize the user lifecycle ? (20)

Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business User
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure World
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
 
Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications
 
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERPOHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
 
ECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) SolutionECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) Solution
 
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
 
Bsto presentation
Bsto presentationBsto presentation
Bsto presentation
 
Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)
 
New client's standard training & orientation guide-v2
New client's standard training & orientation   guide-v2New client's standard training & orientation   guide-v2
New client's standard training & orientation guide-v2
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Transforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldTransforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital world
 
App roamer presentation
App roamer presentationApp roamer presentation
App roamer presentation
 
Step up authentication
Step up authenticationStep up authentication
Step up authentication
 
Workforce enterprise ppt
Workforce enterprise pptWorkforce enterprise ppt
Workforce enterprise ppt
 
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdfMulti_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
 
Zenith Online Presentation
Zenith  Online  PresentationZenith  Online  Presentation
Zenith Online Presentation
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor Authentication
 
Final user provisioning webinar draft 2
Final user provisioning webinar   draft 2Final user provisioning webinar   draft 2
Final user provisioning webinar draft 2
 

Último

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

What does it mean to optimize the user lifecycle ?

  • 1. Inventy What does it mean to OPTIMIZE the user lifecycle? INVENTY April 2015 – SAP Security 360° Service
  • 2. Have you ever had serious difficulties in obtaining computer rights ?
  • 4. Application Form Search for permissions and accounts Add to the request Validate request Provisioning and details Monitoring request and notifications Operational accounts and permissions EASY! A simple 7 step process… Requesting IT access rights for a normal user ?
  • 5. But reality is oftendifferent … Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions
  • 6. Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation Each step requires coordination of unclear sub processes involving multiple actors ...
  • 7. At Inventy, we OPTIMIZE and SECURE the user lifecycle Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation Optimization Zone
  • 8. S S S S C C S S S S S C C S with SAP Identity & Access Governance, each step is modeled and automated in IDM & GRC … S C Simple automated action . Complex action natively integrated Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation
  • 9. …integrated data flows accelerate AUDITS and reduce maintenance costs Integrated data flow . I I I I I I I I I Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation I I I
  • 10. Add to the request Provisioning and details Operational accounts and permissions By profiles and by users Return code from target applications Initial password change Connection validation Person in charge validation Our commitment ? A simple user experience A COMPLIANT process with a low cost Application form Search for permissions and accounts Validate request Monitoring request and notifications Adding partial roles Requests by user copy Automatic additions by HR Profile Manager validation Provisioning Security Validation / Authorization catalog exposure Compliance validation User email
  • 11. April 2015 Inventy François Michel – francois.michel@inventy.ca - 514-804-2333 Odette Scully – odette.scully@inventy.ca – 514-972-7245 www.inventy.com Contact us to learn more We would love to hear more from you!