SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
www.techdemocracy.com
IDENTITY
Date
Version
25 March 2022
Case Study v.6
C A S E S T U D Y
- By Ravindra Neriyanuri
Implementing Identity & Access Management in
Higher Education
Higher education accounts for 17 per cent of all reported data breaches. It
is highly essential to protect an academic institution from cybersecurity
threats. Not doing so puts at risk information systems, databases
of libraries, e-mail, grade portals, and various resources for learning
management tools in jeopardy.
ACCESS
MANAGEMENT
(IAM)
www.techdemocracy.com
Implementing Identity & Access
Management in Higher Education
Identity and Access Management (IAM) is essential to ensuring sufficient, precise and safe access to
information, resources and systems and can directly affect both the integrity of the institution and its
ability to adapt to today’s fluid and frequently unpredictable requirements of educational institutions.
In the Higher education be it a High School, College
or University, it is very needed for every student,
staff or employees to access information in the
campus or remotely with a seamless experience.
It becomes imperative for the Higher Educational
institutions to provide a secure and easy to use
interface experience when they access the systems,
applications and information.
With the new students joining and some old
students leaving or getting transferred, it’s very
critical to ensure onboarding or de-provisioning
of students and managing faculty or staff based
on their roles is done securely as per regulations.
Typically, any Higher Ed (University / School /
College) begins with seeking for an overall strategy
and roadmap for the evolution of an Identity
and Access Management program within the
institution. Some of the key business drivers are
enhancing user experience, managing risk and
compliance, improving automation and efficiency,
federation, replacing legacy technology, and
scalability etc.
It is recommended to go with a streamlined
approach like building foundation architecture
then transitioning the existing services and
downstream applications/systems in a new
environment to address the key limitations in the
current state while implementing a successful IAM
program. The other phase could include adding
new functionality, enhancements and automation
etc.
As part of the implementation, TechDemocracy
has adopted a seasoned approach to meet the
implementation requirements in HigherEd in each
project phase.
www.techdemocracy.com
Implementing Identity & Access
Management in Higher Education
•	 Base installation and configuration of On-Premise components in
the agreed environments
	 a) Identity Management / Governance Solution
	 b) Configure Enterprise Active Directory as Centralized User 		
Directory solution
•	 Basic Validation of Oracle Identity Cloud Services
	 a) Single Sign-On
	 b) Identity Federation Services
	 c) Token Services
	 d) Reporting Services
Base Environment Set Up / Configuration
•	 Consolidation of identity repository from current AD domains into
existing Enterprise AD
•	 Configure required Connectors, ex: for HRMS, Office 365, Google
Apps etc.
•	 Develop and Configure connector for Black Board
•	 Configuring Provisioning policies
Identity Management / Access Governance (On-Premise)
•	 Identify, prioritize the “CORE” IAM business processes and deep-
dive to understand gaps w.r.t to people, technology and industry
standards
•	 Re-design IAM processes into scalable, agile, efficient, optimized
for single digital identity solution with the selected/proposed IAM
product Suite
•	 Profiling and prioritization of applications/systems to be integrated
with Hybrid IAM platform to meet business needs
Due Diligence / Planning Preparation
www.techdemocracy.com
Higher Education
Business Challenges
Maintain users who
register each semester
and their attendance
Monitoring staff and
lecturers
Maintain institutions
teaching materials and
stationery
Use the same username and
password in a single login to
login to different portals
Log in to various portals using
Facebook, Twitter or Gmail
Have distinct access to portals
on the basis of their location
Plugging multiple device to the
system and manage remote
login to applications
Safe & Secured portals from
hackers
CHALLENGES
www.techdemocracy.com
TechDemocracy Solution
About the Client
Business Challenge IT Challenge
The solution approach involved defining a multi-
phased implementation approach using the
IAM product to provision and de-provision user
accounts based on systems of record. Upgrading
Identity & Access management components to the
latest version, and utilize the latest features offered
in setting up role, responsibility and attribute-based
access control to Active Directory, Oracle E-Business
Suite, SMAX Application and Data Warehouse and
external applications like Google Apps.
Results
•	 Improved availability SLA for the IAM services
•	 Reduced password related Help desk calls
significantly;
•	 Improved Customer Service through fast and
automated account setup for Students, Staff
•	 Increased internal & external Customer
satisfaction.
The Business challenge was to provide systems
administration and identity & access management
services to school employees, contractors and
students.AsthiswillhelpthemoptimizeInformation
Technology (IT) resource utilization and thereby
improve systems availability and performance
and to ensure timely and secure access to various
enterprise systems, and also enable Parents to
register and securely access their child’s education
details and manage their identities.
There were a high number of Student Registrations,
School transfers and Staff roles to be managed
along with the challenge of integration with DW,
EBS, GAPPS, AD for seamless with Oracle Identity
Management.
One of the largest
public-school district
administrators of the
United States.
www.techdemocracy.com
About TDC Capability
TechDemocracy is a Cyber Security Services and
Product based company established in the year
2001 and celebrating its 20th anniversary this
year. It is a trusted, global cyber risk assurance
solutions provider whose DNA is rooted in cyber
advisory, managed and implementation services.
It is an advisor and integrator at heart, striving to
create centers of excellence globally to provide
cybersecurity services, analyzing and scoring
compliance, risk, security, and governance
situational awareness across any size enterprise.
TechDemocracy (TDC) is an ISO 27001:2013 and
ISO 9001:2015 certified, technology and Innovation
Company with a global footprint. TechDemocracy
has rich experience in catering to technology needs
of different business lines, viz. Higher Education,
Healthcare, State and Local Bodies, Utilities,
Financial Service. TechDemocracy is also positioned
as a Niche Player in the August 2020 Gartner Magic
Quadrant for IT Risk Management for its product
Intellicta.
Since its inception in 2000. TechDemocracy
is specialized in enterprise software products
that stand for progress. TechDemocracy with
innovation and value creation offers integrated
portfolio of services in Cybersecurity like Identity
and Access Management, Enterprise solutions,
TechDemocracy leverages its extensive global
offshore infrastructure and network of offices
to provide holistic, multi-service delivery in key
industry verticals including Public Sector, Higher
Education, Federal, State and Local, Financial
Services, Healthcare and Utilities. We have distilled
the best practices and methodologies that we
share with our customers. Our team works with
clients to advance the available IT infrastructures,
meet security and compliance challenges and
safeguard sensitive information and improve
their ROI. TechDemocracy offers a wide range of
provisioning connectors for cloud computing and
higher education such as Google Apps, Live@edu,
Sakai, Moodle, and Blackboard.
www.techdemocracy.com
For more information, visit www.techdemocracy.com, or
e-mail us @ info@techdemocracy.com / Marketing@techdemocracy.com
1 Corporate Place South,
Suite # 110, Piscataway,
NJ 08854.
Call Us : +1 732 404 8350
Fax : +1 732 549 7020
Address Contact

Mais conteúdo relacionado

Semelhante a Implementing IAM in Higher Ed

Choosing the Right Data Center Certification Program.pdf
Choosing the Right Data Center Certification Program.pdfChoosing the Right Data Center Certification Program.pdf
Choosing the Right Data Center Certification Program.pdfIDCA
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App DeliveryMighty Guides, Inc.
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsMercury Solutions Limited
 
BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsChris Farwell
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityWSO2
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
The Most Promising Content Services Platform Solution Providers 2020 October ...
The Most Promising Content Services Platform Solution Providers 2020 October ...The Most Promising Content Services Platform Solution Providers 2020 October ...
The Most Promising Content Services Platform Solution Providers 2020 October ...Merry D'souza
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
DianeOakleyResume20170130
DianeOakleyResume20170130DianeOakleyResume20170130
DianeOakleyResume20170130Diane Oakley
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprisehardik soni
 
Knowledge Network and GradfirstFirst
Knowledge Network and GradfirstFirstKnowledge Network and GradfirstFirst
Knowledge Network and GradfirstFirstMohan Singhal
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 

Semelhante a Implementing IAM in Higher Ed (20)

Choosing the Right Data Center Certification Program.pdf
Choosing the Right Data Center Certification Program.pdfChoosing the Right Data Center Certification Program.pdf
Choosing the Right Data Center Certification Program.pdf
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 Years
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos Identity
 
Resume
ResumeResume
Resume
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
The Most Promising Content Services Platform Solution Providers 2020 October ...
The Most Promising Content Services Platform Solution Providers 2020 October ...The Most Promising Content Services Platform Solution Providers 2020 October ...
The Most Promising Content Services Platform Solution Providers 2020 October ...
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
DianeOakleyResume20170130
DianeOakleyResume20170130DianeOakleyResume20170130
DianeOakleyResume20170130
 
Getting ready for the cloud sukhbir jasuja
Getting ready for the cloud sukhbir jasujaGetting ready for the cloud sukhbir jasuja
Getting ready for the cloud sukhbir jasuja
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 
Knowledge Network and GradfirstFirst
Knowledge Network and GradfirstFirstKnowledge Network and GradfirstFirst
Knowledge Network and GradfirstFirst
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 
99 oranges company profile
99 oranges company profile99 oranges company profile
99 oranges company profile
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Shadrack PM Resume
Shadrack PM ResumeShadrack PM Resume
Shadrack PM Resume
 

Último

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 

Último (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 

Implementing IAM in Higher Ed

  • 1. www.techdemocracy.com IDENTITY Date Version 25 March 2022 Case Study v.6 C A S E S T U D Y - By Ravindra Neriyanuri Implementing Identity & Access Management in Higher Education Higher education accounts for 17 per cent of all reported data breaches. It is highly essential to protect an academic institution from cybersecurity threats. Not doing so puts at risk information systems, databases of libraries, e-mail, grade portals, and various resources for learning management tools in jeopardy. ACCESS MANAGEMENT (IAM)
  • 2. www.techdemocracy.com Implementing Identity & Access Management in Higher Education Identity and Access Management (IAM) is essential to ensuring sufficient, precise and safe access to information, resources and systems and can directly affect both the integrity of the institution and its ability to adapt to today’s fluid and frequently unpredictable requirements of educational institutions. In the Higher education be it a High School, College or University, it is very needed for every student, staff or employees to access information in the campus or remotely with a seamless experience. It becomes imperative for the Higher Educational institutions to provide a secure and easy to use interface experience when they access the systems, applications and information. With the new students joining and some old students leaving or getting transferred, it’s very critical to ensure onboarding or de-provisioning of students and managing faculty or staff based on their roles is done securely as per regulations. Typically, any Higher Ed (University / School / College) begins with seeking for an overall strategy and roadmap for the evolution of an Identity and Access Management program within the institution. Some of the key business drivers are enhancing user experience, managing risk and compliance, improving automation and efficiency, federation, replacing legacy technology, and scalability etc. It is recommended to go with a streamlined approach like building foundation architecture then transitioning the existing services and downstream applications/systems in a new environment to address the key limitations in the current state while implementing a successful IAM program. The other phase could include adding new functionality, enhancements and automation etc. As part of the implementation, TechDemocracy has adopted a seasoned approach to meet the implementation requirements in HigherEd in each project phase.
  • 3. www.techdemocracy.com Implementing Identity & Access Management in Higher Education • Base installation and configuration of On-Premise components in the agreed environments a) Identity Management / Governance Solution b) Configure Enterprise Active Directory as Centralized User Directory solution • Basic Validation of Oracle Identity Cloud Services a) Single Sign-On b) Identity Federation Services c) Token Services d) Reporting Services Base Environment Set Up / Configuration • Consolidation of identity repository from current AD domains into existing Enterprise AD • Configure required Connectors, ex: for HRMS, Office 365, Google Apps etc. • Develop and Configure connector for Black Board • Configuring Provisioning policies Identity Management / Access Governance (On-Premise) • Identify, prioritize the “CORE” IAM business processes and deep- dive to understand gaps w.r.t to people, technology and industry standards • Re-design IAM processes into scalable, agile, efficient, optimized for single digital identity solution with the selected/proposed IAM product Suite • Profiling and prioritization of applications/systems to be integrated with Hybrid IAM platform to meet business needs Due Diligence / Planning Preparation
  • 4. www.techdemocracy.com Higher Education Business Challenges Maintain users who register each semester and their attendance Monitoring staff and lecturers Maintain institutions teaching materials and stationery Use the same username and password in a single login to login to different portals Log in to various portals using Facebook, Twitter or Gmail Have distinct access to portals on the basis of their location Plugging multiple device to the system and manage remote login to applications Safe & Secured portals from hackers CHALLENGES
  • 5. www.techdemocracy.com TechDemocracy Solution About the Client Business Challenge IT Challenge The solution approach involved defining a multi- phased implementation approach using the IAM product to provision and de-provision user accounts based on systems of record. Upgrading Identity & Access management components to the latest version, and utilize the latest features offered in setting up role, responsibility and attribute-based access control to Active Directory, Oracle E-Business Suite, SMAX Application and Data Warehouse and external applications like Google Apps. Results • Improved availability SLA for the IAM services • Reduced password related Help desk calls significantly; • Improved Customer Service through fast and automated account setup for Students, Staff • Increased internal & external Customer satisfaction. The Business challenge was to provide systems administration and identity & access management services to school employees, contractors and students.AsthiswillhelpthemoptimizeInformation Technology (IT) resource utilization and thereby improve systems availability and performance and to ensure timely and secure access to various enterprise systems, and also enable Parents to register and securely access their child’s education details and manage their identities. There were a high number of Student Registrations, School transfers and Staff roles to be managed along with the challenge of integration with DW, EBS, GAPPS, AD for seamless with Oracle Identity Management. One of the largest public-school district administrators of the United States.
  • 6. www.techdemocracy.com About TDC Capability TechDemocracy is a Cyber Security Services and Product based company established in the year 2001 and celebrating its 20th anniversary this year. It is a trusted, global cyber risk assurance solutions provider whose DNA is rooted in cyber advisory, managed and implementation services. It is an advisor and integrator at heart, striving to create centers of excellence globally to provide cybersecurity services, analyzing and scoring compliance, risk, security, and governance situational awareness across any size enterprise. TechDemocracy (TDC) is an ISO 27001:2013 and ISO 9001:2015 certified, technology and Innovation Company with a global footprint. TechDemocracy has rich experience in catering to technology needs of different business lines, viz. Higher Education, Healthcare, State and Local Bodies, Utilities, Financial Service. TechDemocracy is also positioned as a Niche Player in the August 2020 Gartner Magic Quadrant for IT Risk Management for its product Intellicta. Since its inception in 2000. TechDemocracy is specialized in enterprise software products that stand for progress. TechDemocracy with innovation and value creation offers integrated portfolio of services in Cybersecurity like Identity and Access Management, Enterprise solutions, TechDemocracy leverages its extensive global offshore infrastructure and network of offices to provide holistic, multi-service delivery in key industry verticals including Public Sector, Higher Education, Federal, State and Local, Financial Services, Healthcare and Utilities. We have distilled the best practices and methodologies that we share with our customers. Our team works with clients to advance the available IT infrastructures, meet security and compliance challenges and safeguard sensitive information and improve their ROI. TechDemocracy offers a wide range of provisioning connectors for cloud computing and higher education such as Google Apps, Live@edu, Sakai, Moodle, and Blackboard.
  • 7. www.techdemocracy.com For more information, visit www.techdemocracy.com, or e-mail us @ info@techdemocracy.com / Marketing@techdemocracy.com 1 Corporate Place South, Suite # 110, Piscataway, NJ 08854. Call Us : +1 732 404 8350 Fax : +1 732 549 7020 Address Contact