SlideShare uma empresa Scribd logo
1 de 25
Identity and Access Management in a Highly Distributed and Dynamic Global Enterprise Shannon Tompkins, MBA, CISSP Manager, Global Identity and Access Management Yum! Brands, Inc. Dan Fitzgerald VP, Sales and Marketing intiGrow
World’s largest restaurant company in terms of the number of restaurant systems 37,000 restaurants in 110 countries 1,000,000 associates $11 billion in revenue in 2009 Mix of both equity restaurant systems and franchise restaurant systems Primary brands A&W, KFC, Long John Silver’s, Pizza Hut, Taco Bell Three Operating Segments U.S., Yum Restaurants International, China Division Leader in international retail development In 2009 Yum opened more than four restaurants per day internationally On average, China alone opens one new restaurant per day Who is Yum! Brands, Inc.? 2 IBM Pulse11: Feb. 28, 2011
Premier IBM Business Partner  Focused on IAM Operating in the USA and India Providing service in South America and Australia Became part of Yum! Brands IAM team when IAM expansion took off.  Has continued to provide services since 2007. Who is intiGrow? 3 IBM Pulse11: Feb. 28, 2011
Yum’s IAM Journey Current Global IAM Drivers Meeting the Challenges Successes Lessons Learned Q&A Agenda 4 IBM Pulse11: Feb. 28, 2011
Yum’s IAM Journey EarlyU.S. IAM 2005 - 2007 Before IAM 2005 U.S. > Global IAM 2007 – Present ,[object Object]
Access: Controlled Internet access to Web apps
Passwords: SSO, password synch, and self-service functions
Early IAM Research: Role based access control research to gain administrative efficiencies
IAM Business Case Developed: Web-based benefits enrollment enabled for equity-based corporate and restaurant employees
Corporate: Standard and unique Active Directory UIDs
Restaurants: No individual restaurant identities
Administration: Manual administration5 IBM Pulse11: Feb. 28, 2011
Yum’s IAM Journey Before IAM 2005 ,[object Object]
Five separate AD domains
Global AD account naming convention and naming uniqueness ensured via manual account requests and centralized ID generator application
AD integrations for some enterprise applications
No individual restaurant accounts; role-based shared accounts only for in-restaurant point of sale and back of house  applications
Corporate: Standard and unique Active Directory UIDs
Restaurants: No individual restaurant identities
Administration: Manual administration6 IBM Pulse11: Feb. 28, 2011
Yum’s IAM Journey Early U.S. IAM 2005 - 2007 Before IAM 2005 ,[object Object]
IT told the U.S. business that it would provide Web-based benefits enrollment
Suddenly ALL U.S. equity restaurant employees required an optional centralized account
Early IAM Research: Role based access control research to gain administrative efficiencies
IAM Business Case Developed: Web-based benefits enrollment enabled for equity-based corporate and restaurant employees

Mais conteúdo relacionado

Destaque

Morgana matariki pp presentation
Morgana matariki pp presentationMorgana matariki pp presentation
Morgana matariki pp presentationlesleymccardle
 
Hausen: Koululaisten suun terveys on yhteinen asia
Hausen: Koululaisten suun terveys on yhteinen asiaHausen: Koululaisten suun terveys on yhteinen asia
Hausen: Koululaisten suun terveys on yhteinen asiaKouluterveyskysely
 
Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...
Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...
Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...lau_db
 
Prc open stack conf aug 2012 cox v1
Prc open stack conf aug 2012 cox v1Prc open stack conf aug 2012 cox v1
Prc open stack conf aug 2012 cox v1OpenCity Community
 
Englekirk News
Englekirk NewsEnglekirk News
Englekirk Newskimtanouye
 
Ch. 10 -_motivation and engagement
Ch. 10 -_motivation and engagementCh. 10 -_motivation and engagement
Ch. 10 -_motivation and engagementPeapod Ledesma
 
Openstack document for apac v3
Openstack document for apac v3Openstack document for apac v3
Openstack document for apac v3OpenCity Community
 
Big data movement webcast
Big data movement webcastBig data movement webcast
Big data movement webcasttervela
 
ออกแบบและพัฒนาโครงงาน บทที่ 2
ออกแบบและพัฒนาโครงงาน บทที่ 2ออกแบบและพัฒนาโครงงาน บทที่ 2
ออกแบบและพัฒนาโครงงาน บทที่ 2บุ๊กบิ๊ก หุหุหุ
 

Destaque (18)

Morgana matariki pp presentation
Morgana matariki pp presentationMorgana matariki pp presentation
Morgana matariki pp presentation
 
Hausen: Koululaisten suun terveys on yhteinen asia
Hausen: Koululaisten suun terveys on yhteinen asiaHausen: Koululaisten suun terveys on yhteinen asia
Hausen: Koululaisten suun terveys on yhteinen asia
 
270611%20bezoek%20roosendaal[1]
270611%20bezoek%20roosendaal[1]270611%20bezoek%20roosendaal[1]
270611%20bezoek%20roosendaal[1]
 
Cosbench apac
Cosbench apacCosbench apac
Cosbench apac
 
Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...
Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...
Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...
 
Prc open stack conf aug 2012 cox v1
Prc open stack conf aug 2012 cox v1Prc open stack conf aug 2012 cox v1
Prc open stack conf aug 2012 cox v1
 
Cooll usersguide 5
Cooll usersguide 5Cooll usersguide 5
Cooll usersguide 5
 
Englekirk News
Englekirk NewsEnglekirk News
Englekirk News
 
Vocabulous jan 30
Vocabulous jan 30Vocabulous jan 30
Vocabulous jan 30
 
Final Script Draft 3
Final Script Draft 3Final Script Draft 3
Final Script Draft 3
 
Inheritance
InheritanceInheritance
Inheritance
 
ใบงาน ม.2
ใบงาน ม.2ใบงาน ม.2
ใบงาน ม.2
 
Ch. 10 -_motivation and engagement
Ch. 10 -_motivation and engagementCh. 10 -_motivation and engagement
Ch. 10 -_motivation and engagement
 
Openstack document for apac v3
Openstack document for apac v3Openstack document for apac v3
Openstack document for apac v3
 
Fashion is fed and stayl is eternal
Fashion is fed and stayl is eternalFashion is fed and stayl is eternal
Fashion is fed and stayl is eternal
 
Big data movement webcast
Big data movement webcastBig data movement webcast
Big data movement webcast
 
ออกแบบและพัฒนาโครงงาน บทที่ 2
ออกแบบและพัฒนาโครงงาน บทที่ 2ออกแบบและพัฒนาโครงงาน บทที่ 2
ออกแบบและพัฒนาโครงงาน บทที่ 2
 
Comicus-Markedsføring-2016
Comicus-Markedsføring-2016Comicus-Markedsføring-2016
Comicus-Markedsføring-2016
 

Semelhante a Identity and Access Management in a Highly Distributed and Dynamic Global Enterprise

IT Analyst EMA and JReport: Enhance Your Applications with Embedded BI
IT Analyst EMA and JReport: Enhance Your Applications with Embedded BIIT Analyst EMA and JReport: Enhance Your Applications with Embedded BI
IT Analyst EMA and JReport: Enhance Your Applications with Embedded BIBob Report
 
API Management
API ManagementAPI Management
API ManagementProlifics
 
APM Talk
APM TalkAPM Talk
APM TalkMongoDB
 
IBM API management Philip Little
IBM API management Philip LittleIBM API management Philip Little
IBM API management Philip LittleValeri Illescas
 
exnovation ppt.pptx
exnovation ppt.pptxexnovation ppt.pptx
exnovation ppt.pptxExnoweb
 
Adobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer ExperienceAdobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer ExperienceDay Software
 
Unlock your Digital Content & Expand beyond your Website
Unlock your Digital Content & Expand beyond your WebsiteUnlock your Digital Content & Expand beyond your Website
Unlock your Digital Content & Expand beyond your Website3scale
 
Iag api management architect presentation
Iag   api management architect presentationIag   api management architect presentation
Iag api management architect presentationsflynn073
 
E1 Pages Contest 2018 Hosted by Terillium
E1 Pages Contest 2018 Hosted by TerilliumE1 Pages Contest 2018 Hosted by Terillium
E1 Pages Contest 2018 Hosted by TerilliumTerillium
 
Enterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; OpportunitiesEnterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; OpportunitiesSudhanshuKMevat
 
APIdays Paris 2018 - Creating an API economy business strategy Alan Glickenho...
APIdays Paris 2018 - Creating an API economy business strategy Alan Glickenho...APIdays Paris 2018 - Creating an API economy business strategy Alan Glickenho...
APIdays Paris 2018 - Creating an API economy business strategy Alan Glickenho...apidays
 
Api management customer
Api management customerApi management customer
Api management customernick_garrod
 
Born Mobile Generation & Enterprise IT Challenges (NITC 2013)
Born Mobile Generation & Enterprise IT Challenges (NITC 2013)Born Mobile Generation & Enterprise IT Challenges (NITC 2013)
Born Mobile Generation & Enterprise IT Challenges (NITC 2013)Harsha Purasinghe
 
Dallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessDallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessSameer Khan
 
Amplify_Session_1185_Final Version
Amplify_Session_1185_Final VersionAmplify_Session_1185_Final Version
Amplify_Session_1185_Final VersionGuruprasad Samaga
 
IBM Portal Web intro
IBM Portal Web introIBM Portal Web intro
IBM Portal Web introdanisman
 

Semelhante a Identity and Access Management in a Highly Distributed and Dynamic Global Enterprise (20)

Enhance Your Applications with Embedded BI
Enhance Your Applications with Embedded BIEnhance Your Applications with Embedded BI
Enhance Your Applications with Embedded BI
 
IT Analyst EMA and JReport: Enhance Your Applications with Embedded BI
IT Analyst EMA and JReport: Enhance Your Applications with Embedded BIIT Analyst EMA and JReport: Enhance Your Applications with Embedded BI
IT Analyst EMA and JReport: Enhance Your Applications with Embedded BI
 
API Management
API ManagementAPI Management
API Management
 
APM Talk
APM TalkAPM Talk
APM Talk
 
Next Generation IT
Next Generation ITNext Generation IT
Next Generation IT
 
IBM API management Philip Little
IBM API management Philip LittleIBM API management Philip Little
IBM API management Philip Little
 
exnovation ppt.pptx
exnovation ppt.pptxexnovation ppt.pptx
exnovation ppt.pptx
 
Adobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer ExperienceAdobe: Intrapreneurs and the Digital Customer Experience
Adobe: Intrapreneurs and the Digital Customer Experience
 
Unlock your Digital Content & Expand beyond your Website
Unlock your Digital Content & Expand beyond your WebsiteUnlock your Digital Content & Expand beyond your Website
Unlock your Digital Content & Expand beyond your Website
 
Iag api management architect presentation
Iag   api management architect presentationIag   api management architect presentation
Iag api management architect presentation
 
E1 Pages Contest 2018 Hosted by Terillium
E1 Pages Contest 2018 Hosted by TerilliumE1 Pages Contest 2018 Hosted by Terillium
E1 Pages Contest 2018 Hosted by Terillium
 
Enterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; OpportunitiesEnterprise and Applications: Definition; Types; Challenges; Opportunities
Enterprise and Applications: Definition; Types; Challenges; Opportunities
 
APIdays Paris 2018 - Creating an API economy business strategy Alan Glickenho...
APIdays Paris 2018 - Creating an API economy business strategy Alan Glickenho...APIdays Paris 2018 - Creating an API economy business strategy Alan Glickenho...
APIdays Paris 2018 - Creating an API economy business strategy Alan Glickenho...
 
Ihop Cs Slide Final Xp
Ihop Cs Slide Final   XpIhop Cs Slide Final   Xp
Ihop Cs Slide Final Xp
 
Api management customer
Api management customerApi management customer
Api management customer
 
Born Mobile Generation & Enterprise IT Challenges (NITC 2013)
Born Mobile Generation & Enterprise IT Challenges (NITC 2013)Born Mobile Generation & Enterprise IT Challenges (NITC 2013)
Born Mobile Generation & Enterprise IT Challenges (NITC 2013)
 
Dallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data SuccessDallas Digital Summit: 6 Steps to Big Data Success
Dallas Digital Summit: 6 Steps to Big Data Success
 
Amplify_Session_1185_Final Version
Amplify_Session_1185_Final VersionAmplify_Session_1185_Final Version
Amplify_Session_1185_Final Version
 
IBM Portal Web intro
IBM Portal Web introIBM Portal Web intro
IBM Portal Web intro
 
Feedsme
Feedsme Feedsme
Feedsme
 

Mais de Arun Gopinath

Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environmentsArun Gopinath
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based securityArun Gopinath
 
Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch managementArun Gopinath
 
Realizing business value with iam
Realizing business value with iamRealizing business value with iam
Realizing business value with iamArun Gopinath
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building blockArun Gopinath
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trustArun Gopinath
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframeArun Gopinath
 

Mais de Arun Gopinath (10)

Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Securing virtualization in real world environments
Securing virtualization in real world environmentsSecuring virtualization in real world environments
Securing virtualization in real world environments
 
Secure by design
Secure by designSecure by design
Secure by design
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based security
 
Rewriting the rules of patch management
Rewriting the rules of patch managementRewriting the rules of patch management
Rewriting the rules of patch management
 
Realizing business value with iam
Realizing business value with iamRealizing business value with iam
Realizing business value with iam
 
Ibm xiv storage your ideal cloud building block
Ibm xiv storage   your ideal cloud building blockIbm xiv storage   your ideal cloud building block
Ibm xiv storage your ideal cloud building block
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trust
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Identity and Access Management in a Highly Distributed and Dynamic Global Enterprise

  • 1. Identity and Access Management in a Highly Distributed and Dynamic Global Enterprise Shannon Tompkins, MBA, CISSP Manager, Global Identity and Access Management Yum! Brands, Inc. Dan Fitzgerald VP, Sales and Marketing intiGrow
  • 2. World’s largest restaurant company in terms of the number of restaurant systems 37,000 restaurants in 110 countries 1,000,000 associates $11 billion in revenue in 2009 Mix of both equity restaurant systems and franchise restaurant systems Primary brands A&W, KFC, Long John Silver’s, Pizza Hut, Taco Bell Three Operating Segments U.S., Yum Restaurants International, China Division Leader in international retail development In 2009 Yum opened more than four restaurants per day internationally On average, China alone opens one new restaurant per day Who is Yum! Brands, Inc.? 2 IBM Pulse11: Feb. 28, 2011
  • 3. Premier IBM Business Partner Focused on IAM Operating in the USA and India Providing service in South America and Australia Became part of Yum! Brands IAM team when IAM expansion took off. Has continued to provide services since 2007. Who is intiGrow? 3 IBM Pulse11: Feb. 28, 2011
  • 4. Yum’s IAM Journey Current Global IAM Drivers Meeting the Challenges Successes Lessons Learned Q&A Agenda 4 IBM Pulse11: Feb. 28, 2011
  • 5.
  • 6. Access: Controlled Internet access to Web apps
  • 7. Passwords: SSO, password synch, and self-service functions
  • 8. Early IAM Research: Role based access control research to gain administrative efficiencies
  • 9. IAM Business Case Developed: Web-based benefits enrollment enabled for equity-based corporate and restaurant employees
  • 10. Corporate: Standard and unique Active Directory UIDs
  • 11. Restaurants: No individual restaurant identities
  • 12. Administration: Manual administration5 IBM Pulse11: Feb. 28, 2011
  • 13.
  • 15. Global AD account naming convention and naming uniqueness ensured via manual account requests and centralized ID generator application
  • 16. AD integrations for some enterprise applications
  • 17. No individual restaurant accounts; role-based shared accounts only for in-restaurant point of sale and back of house applications
  • 18. Corporate: Standard and unique Active Directory UIDs
  • 19. Restaurants: No individual restaurant identities
  • 20. Administration: Manual administration6 IBM Pulse11: Feb. 28, 2011
  • 21.
  • 22. IT told the U.S. business that it would provide Web-based benefits enrollment
  • 23. Suddenly ALL U.S. equity restaurant employees required an optional centralized account
  • 24. Early IAM Research: Role based access control research to gain administrative efficiencies
  • 25. IAM Business Case Developed: Web-based benefits enrollment enabled for equity-based corporate and restaurant employees
  • 26. Corporate: Standard and unique Active Directory UIDs
  • 27. Restaurants: No individual restaurant identities
  • 28. Administration: Manual administration7 IBM Pulse11: Feb. 28, 2011
  • 29.
  • 30. Migrated from multi-domain AD to ITAM LDAP as enterprise application directory, which increased the scope and criticality of user provisioning
  • 31. User provisioning and password synchronizations to third-party hosted Software as a Service (SAAS) Web applications
  • 32. Provision equity and franchisee restaurant crew employee accounts around the globe for access to key, strategic, global applications
  • 33. Provisioning: Now automatically maintain 400k+ accounts (and growing) around the globe for corporate, restaurant, and franchisee identities
  • 34. Access: Controlled Internet access to Web apps
  • 35. Self Service: SSO, password synch, and self-service functionsIBM Pulse11: Feb. 28, 2011
  • 36. How Did IAM Become Global At Yum? 9 Key global Web applications became strategic Yum global initiatives across brands (e.g., learning management, hiring management) For the first time, restaurant crew-level associates around the globe required individual identity credentials to access global and brand-based applications IBM Pulse11: Feb. 28, 2011
  • 37. The Business Challenges 10 Technology to the restaurants Strategic global Web applications Brand-based Web applications Outsource application hosting Provide rapid and accurate access to resources Reduce costs IBM Pulse11: Feb. 28, 2011
  • 38. The Operational Challenges 11 Dynamic staffing environments Thousands of restaurants around the globe Average ~30-40 associates per restaurant High restaurant employee turnover High franchise-to-equity ownership ratios Outsourced application hosting models IBM Pulse11: Feb. 28, 2011
  • 39.
  • 40. Enables global access to applications
  • 41. Provides one user account and one password per equity and franchise associate
  • 42. Enables password synch, password self-service, and (new) single sign-on servicesIBM Pulse11: Feb. 28, 2011
  • 43. How Do We Do It? 13 Ha – One of our team whiteboard talks on the “New Hire” process IBM Pulse11: Feb. 28, 2011
  • 44. How Do We Do It? 14 ITIM Provisions to Managed Endpoints by Policy ITIM LDAP AD ITAM LDAP Voice Mail Email ITIM Collab App Attribute Data Market LDAPs AppLDAPs Learning App Hiring App = Internally Hosted = Externally Hosted IBM Pulse11: Feb. 28, 2011
  • 45. How Do We Do It? Provisioning Inputs Batch Feeds Custom throttling applications Performance considerations Equity HR App Data Restaurant Inventory App Franchisee Batch Uploads SFTP Server ITIM UP Web Services TDIs Real-Time 24/7/365 Various Apply for Access Apps = Internally Hosted = Externally Hosted BOH Real-Time Processing = Internal Collection International ITIM 15 IBM Pulse11: Feb. 28, 2011
  • 46.
  • 47. Our HR system was our authoritative source for equity-based corporate and restaurant employee information
  • 48. With the growth of features, function and popularity of our brand-based Portal applications, we suddenly needed a way to grant access to franchisee employees
  • 49. We had no authoritative source for franchisee employee information
  • 50. Java-based Web Services enabled franchisees to submit their data to us through apply-for-access Web applications, batch data feeds, and in-restaurant HR application integrations16 IBM Pulse11: Feb. 28, 2011
  • 51.
  • 52. Creates and tracks a behind-the-scenes “Global Person Number” (GPN) for every individual to follow them indefinitely through rehires and across organizations (separate from their transient logon IDs)
  • 53. Transfers attribute data to attribute data stores
  • 54. Enables password synch and self-service operations
  • 55. Provides over-the-Internet authentication services for third-party hosted Web applications
  • 56. (New) Enables near real-time provisioning services from restaurants to third-party Web Applications17 IBM Pulse11: Feb. 28, 2011
  • 57. How Do We Do It? 18 Ha – Another One of our team whiteboard talks on the Web Services process IBM Pulse11: Feb. 28, 2011
  • 58. How Do We Do It? 19 Password Synchronizations AD ITAM Self-Service App ITIM Web Services International ITIM Learning App = Internally Hosted = Externally Hosted = Internal Collection IBM Pulse11: Feb. 28, 2011
  • 59. How Do We Do It? 20 Password Self-Service Learning App ITIM Links to Web App Web App with Forgot Password and Challenge Response Questions Links to Web App Self Service Web App ITIM WS Wrappers Self-Service WS Hiring App = Internally Hosted = Externally Hosted = Internal Collection IBM Pulse11: Feb. 28, 2011
  • 60. How Do We Do it? 21 Access Management All ITIM accounts have corresponding ITAM accounts WebSEAL/ITAM provides access to internal resources via junctions Authentication required Authorization to follow junctions occurs via ITAM policies per membership in designated ITAM LDAP groups Decentralized WebSEAL/ITAM deployment and support strategy IBM Pulse11: Feb. 28, 2011
  • 61. Yum’s IAM Successes IAM has enabled automatic user account provisions, password synchronizations, and password self-care operations to hundreds of thousands of clients around the globe which provides 24/7/365 access to key, strategic, global applications Very high IAM utilization levels Current monthly average metrics: 27,467 user accounts added 75,204 user accounts modified 16,575 user accounts deleted Lean and efficient FTE staffing model to support the IAM environment with staff augmentation support as needed 22 IBM Pulse11: Feb. 28, 2011
  • 62. Lessons Learned Very low downtime tolerance: Our IAM processes support core global, strategic initiatives 24/7/365 Scheduling downtime maintenance windows has become very challenging We overlooked early opportunities to lock-in routine maintenance windows. Now we’re reviewing options to increase resiliency even further to lessen our already low downtime occurrences. Provisioning: Automated provisioning is very logical. To succeed, business partners must be involved in workflow designs. Batch provisioning eventually takes too long for the business. Real-time / near real-time provisioning becomes required. Password Self-Service: Password self-service operations are heavily utilized. Helpdesk calls are substantially reduced. But once it’s in place, password self-service must always work. It quickly builds organizational and operational dependencies. Password Synch, SSO, Etc. Regardless of possible assumptions or directions from project leads to the contrary, every new provisioning project to a third-party hosted application will likely and eventually require a single sign-on, password synch, LDAP integration, or similar service. There is becoming an increasingly low tolerance within the organization for multiple passwords per logon account. 23 IBM Pulse11: Feb. 28, 2011
  • 63. Closing Comments 24 IBM Pulse11: Feb. 28, 2011
  • 64. Questions 25 IBM Pulse11: Feb. 28, 2011

Notas do Editor

  1. DescriptionThis package exposes the ITIM end user API through a web services interface and includes an Eclipse-based Reference UI to illustrate how developers can utilize the web services interface to develop their own custom UI.Click to see more.IBM Tivoli Identity Manager (ITIM) Web Services is a J2EE application that can be co-located on ITIM's Websphere server to provide access to most of the end user (self service) related ITIM API thru a standard web services interface. It can be used by customers who need to communicate with ITIM from an external application or custom User Interface (UI) application. A reference application with source code is included with the ITIM 5 archive files to illustrate the usage of the web services API.