SlideShare uma empresa Scribd logo
1 de 11
Inventy
What does it mean to
OPTIMIZE the user
lifecycle?
INVENTY
April 2015 – SAP Security 360° Service
Have you ever had serious
difficulties in obtaining
computer rights ?
I HAVE !
Application
Form
Search for
permissions
and accounts
Add to the
request
Validate
request
Provisioning
and details
Monitoring
request and
notifications
Operational
accounts and
permissions
EASY! A simple 7 step process…
Requesting IT access rights for a normal user ?
But reality is oftendifferent …
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
Each step requires coordination
of unclear sub processes involving multiple actors ...
At Inventy,
we OPTIMIZE and SECURE the user lifecycle
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
Optimization
Zone
S
S
S
S
C
C
S
S
S
S
S
C
C
S
with SAP Identity & Access Governance,
each step is modeled and automated in IDM & GRC …
S
C
Simple automated action
.
Complex action natively integrated
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
…integrated data flows accelerate AUDITS
and reduce maintenance costs
Integrated data flow
.
I
I
I
I
I
I
I
I
I
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
I
I
I
Add to the
request
Provisioning and
details
Operational
accounts and
permissions
By profiles and
by users
Return code from
target applications
Initial password
change
Connection
validation
Person in
charge
validation
Our commitment ?
A simple user experience
A COMPLIANT process with a low cost
Application
form
Search for
permissions
and accounts
Validate
request
Monitoring
request and
notifications
Adding partial
roles
Requests
by user
copy
Automatic
additions by HR
Profile
Manager
validation Provisioning
Security Validation /
Authorization catalog
exposure
Compliance
validation
User email
April 2015
Inventy
François Michel – francois.michel@inventy.ca - 514-804-2333
Odette Scully – odette.scully@inventy.ca – 514-972-7245
www.inventy.com
Contact us to learn more
We would love to hear
more from you!

Mais conteúdo relacionado

Mais procurados

eMpower - Attendance & leave management software
eMpower - Attendance & leave management  softwareeMpower - Attendance & leave management  software
eMpower - Attendance & leave management softwareRITESH HELONDE
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)Sajjad Khan
 
iDocuments smarter workforce
iDocuments smarter workforceiDocuments smarter workforce
iDocuments smarter workforceiDocuments
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overviewEslam Hafez
 
Oracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demoOracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demoRyan Golez
 
Global Insurance Company
Global Insurance CompanyGlobal Insurance Company
Global Insurance Companyguestf8ad8d
 
Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution RITESH HELONDE
 
Why Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral ManagementWhy Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral ManagementGaryRichards30
 
Aadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance SolutionAadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance SolutionMatrix ComSec
 
Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)Shivam Pandita
 

Mais procurados (18)

eMpower - Attendance & leave management software
eMpower - Attendance & leave management  softwareeMpower - Attendance & leave management  software
eMpower - Attendance & leave management software
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
AppRoamer_Presentation
AppRoamer_PresentationAppRoamer_Presentation
AppRoamer_Presentation
 
C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)C4INFOTECH - SMART FINANCIAL SUITE (SFS)
C4INFOTECH - SMART FINANCIAL SUITE (SFS)
 
IdM FinalVer
IdM FinalVerIdM FinalVer
IdM FinalVer
 
eFACiLiTY Visitor Management System
eFACiLiTY Visitor Management SystemeFACiLiTY Visitor Management System
eFACiLiTY Visitor Management System
 
iDocuments smarter workforce
iDocuments smarter workforceiDocuments smarter workforce
iDocuments smarter workforce
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
eFACiLiTY Visitor Management System
eFACiLiTY Visitor Management SystemeFACiLiTY Visitor Management System
eFACiLiTY Visitor Management System
 
Oracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demoOracle Talent Acquisition Cloud quick tour demo
Oracle Talent Acquisition Cloud quick tour demo
 
Finance
FinanceFinance
Finance
 
Global Insurance Company
Global Insurance CompanyGlobal Insurance Company
Global Insurance Company
 
Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution Emsphere Web based - Payroll Management Solution
Emsphere Web based - Payroll Management Solution
 
Why Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral ManagementWhy Is HealthViewX The Next-Generation Software In Patient Referral Management
Why Is HealthViewX The Next-Generation Software In Patient Referral Management
 
Lloyd Pro Group
Lloyd Pro GroupLloyd Pro Group
Lloyd Pro Group
 
Multitasking- Friend or Foe
Multitasking- Friend or FoeMultitasking- Friend or Foe
Multitasking- Friend or Foe
 
Aadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance SolutionAadhaar Enabled Biometric Attendance Solution
Aadhaar Enabled Biometric Attendance Solution
 
Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)Shivam_Intern_Poster(1)
Shivam_Intern_Poster(1)
 

Semelhante a What does it mean to optimize the user lifecycle ?

CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Technologies
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldForte Advisory, Inc.
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...CA Technologies
 
Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications LBi Software
 
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERPOHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERPSmart ERP Solutions, Inc.
 
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!Net at Work
 
Bsto presentation
Bsto presentationBsto presentation
Bsto presentationmssigm
 
Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)WizeHive
 
New client's standard training & orientation guide-v2
New client's standard training & orientation   guide-v2New client's standard training & orientation   guide-v2
New client's standard training & orientation guide-v2mssigm
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
Transforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldTransforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldEkhlaque Bari
 
Step up authentication
Step up authenticationStep up authentication
Step up authenticationJack Forbes
 
Workforce enterprise ppt
Workforce enterprise pptWorkforce enterprise ppt
Workforce enterprise pptbaryonsadmin
 
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdfMulti_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdfMeetsolanki39
 
Zenith Online Presentation
Zenith  Online  PresentationZenith  Online  Presentation
Zenith Online PresentationGenpact LLC
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSalesforce Admins
 
Final user provisioning webinar draft 2
Final user provisioning webinar   draft 2Final user provisioning webinar   draft 2
Final user provisioning webinar draft 2Salesforce Developers
 

Semelhante a What does it mean to optimize the user lifecycle ? (20)

Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business User
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure World
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
 
Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications Improve Employee Self Service With Bolt On Applications
Improve Employee Self Service With Bolt On Applications
 
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERPOHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
OHUG 2011 Automated Employee Onboarding and Offboarding by SmartERP
 
ECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) SolutionECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) Solution
 
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
 
Bsto presentation
Bsto presentationBsto presentation
Bsto presentation
 
Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)Frustrated with your application management process? (Part I)
Frustrated with your application management process? (Part I)
 
New client's standard training & orientation guide-v2
New client's standard training & orientation   guide-v2New client's standard training & orientation   guide-v2
New client's standard training & orientation guide-v2
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Transforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital worldTransforming IT for Digital : Agility for Digital world
Transforming IT for Digital : Agility for Digital world
 
App roamer presentation
App roamer presentationApp roamer presentation
App roamer presentation
 
Step up authentication
Step up authenticationStep up authentication
Step up authentication
 
Workforce enterprise ppt
Workforce enterprise pptWorkforce enterprise ppt
Workforce enterprise ppt
 
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdfMulti_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
 
Zenith Online Presentation
Zenith  Online  PresentationZenith  Online  Presentation
Zenith Online Presentation
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor Authentication
 
Final user provisioning webinar draft 2
Final user provisioning webinar   draft 2Final user provisioning webinar   draft 2
Final user provisioning webinar draft 2
 

Último

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 

Último (20)

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 

What does it mean to optimize the user lifecycle ?

  • 1. Inventy What does it mean to OPTIMIZE the user lifecycle? INVENTY April 2015 – SAP Security 360° Service
  • 2. Have you ever had serious difficulties in obtaining computer rights ?
  • 4. Application Form Search for permissions and accounts Add to the request Validate request Provisioning and details Monitoring request and notifications Operational accounts and permissions EASY! A simple 7 step process… Requesting IT access rights for a normal user ?
  • 5. But reality is oftendifferent … Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions
  • 6. Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation Each step requires coordination of unclear sub processes involving multiple actors ...
  • 7. At Inventy, we OPTIMIZE and SECURE the user lifecycle Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation Optimization Zone
  • 8. S S S S C C S S S S S C C S with SAP Identity & Access Governance, each step is modeled and automated in IDM & GRC … S C Simple automated action . Complex action natively integrated Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation
  • 9. …integrated data flows accelerate AUDITS and reduce maintenance costs Integrated data flow . I I I I I I I I I Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation I I I
  • 10. Add to the request Provisioning and details Operational accounts and permissions By profiles and by users Return code from target applications Initial password change Connection validation Person in charge validation Our commitment ? A simple user experience A COMPLIANT process with a low cost Application form Search for permissions and accounts Validate request Monitoring request and notifications Adding partial roles Requests by user copy Automatic additions by HR Profile Manager validation Provisioning Security Validation / Authorization catalog exposure Compliance validation User email
  • 11. April 2015 Inventy François Michel – francois.michel@inventy.ca - 514-804-2333 Odette Scully – odette.scully@inventy.ca – 514-972-7245 www.inventy.com Contact us to learn more We would love to hear more from you!