SlideShare uma empresa Scribd logo
1 de 23
Kuppinger & Cole Webinar 21.04.2010 One Entitlement Management for all – How to Manage all Users, Services, and Service Providers Consistently
ENTITLEMENT MANAGEMENTBrief from Kuppinger & Cole to market the event One Entitlement Management for all – How to Manage all Users, Services, and Service Providers Consistently As IT is becoming more and more hybrid, we will discuss in this webinar the trends, the changes, and approaches for a holistic entitlement management across different types of applications. Entitlement Management, e.g. the management of who is allowed to do what, is a key topic for any organization today. It is about managing entitlements and access in a consistent way. However, most approaches today are mainly targeting internal users, internal services and systems, and internal service providers. There are some few others which focus on managing the external world – only.  However, the reality of IT infrastructures and the business context is increasingly hybrid. There are internal and external users, customers as well as suppliers and partners. There are internal and external services, like SaaS applications. These application are run internally and externally.  Entitlement Management up to Access Governance, e.g. the management and control of entitlements in IT organizations, has to adopt to these changes and to support any use case. Martin Kuppinger of KuppingerCole will talk about the changing world of IT, becoming increasingly hybrid. He will discuss the trends, the changes, and approaches for a holistic entitlement management across different types of applications. From the KuppingerCole perspective, a consistent approach is mandatory to really being able to manage entitlements in a consistent way and to mitigate risks. Afterwards, Christian Sundell of RM5 Software will describe an approach for an integrated entitlement management for different use cases, not only with respect to internal and external users, services, and providers, but as well with focus on how to integrate a business process view with the IT view of this environment. He will describe requirements, best practices, an illustrate this based on customer use cases which are using such approaches today.
BUSINESS ENTITLEMENT MANAGEMENTBusiness challenge How to manage entitlements? Enterprise domain SUPPORT Enterprise Resource Planning Human Resources Finance & Accounting Lifecycle domain Who  has  Access to  What? Enterprise Data, Content  & Asset Management Value chain domain Customer Relationship Management Supplier Relationship Management Palveluita  tarjoava organisaatio CUSTOMERS SUPPLIERS Input Output Logistics Collaborative Infrastructure Automation Product Lifecycle Management Business domain DESIGN Information system PRODUCTION Source: TopQuadrant, 2004, modified by RM5 All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENT Solution: Centralized Entitlement Management for Internal and External Organizations application e-service database Circle of Trust repository Entitlement Management Who has access to what? physical resource process asset system non-it service All rights reserved RM5 Software Oy
Internal users ENTITLEMENT MANAGEMENTFocus on internal users? INTERNAL SERVICES SINGLE BUSINESS SERVICE PROVIDER INTERNAL USERS Business external organization All rights reserved RM5 Software Oy
Internal users external organization external organization ENTITLEMENT MANAGEMENTFocus on external users? INTERNAL SERVICES SINGLE BUSINESS SERVICE PROVIDER EXTERNAL USERS Business External users external organization All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENTLarge corporation or industry cluster business case? SHARED SERVICES MULTIPLE BUSINESS SERVICE PROVIDERS SHARED USERS All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENT Hybrid environment needs a hybrid solution model ENTITLEMENT MANAGEMENT MARKET EXISTING OFFERING Software as a Service delivery model NEW OFFERING AUTHORIZATION FOR SaaS/CLOUD SERVICES EXISTING OFFERING AUTHORIZATION FOR INTERNAL SERVICES EXISTING OFFERING On-Premise  delivery model Internal services External services All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENT Value proposition RM5 ENTITLEMENT MANAGEMENT OFFERING Procure Entitlement Management  as a Service Create new business by offering  Entitlement Management  as a Service EXISTING Software as a Service delivery model Manage GRC Improve IAM productivity  Enable business EXISTING On-Premise  delivery model Customers Managed Service Providers GRC= Access Governance, Risk Management and Compliance IAM = Identity and Access Management All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENTCore processes in internal usage scenario HR process Entitlement Management process System resource use  process All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENTEntitlement governance level – internal users HR process Traditional IDM view Entitlement Management process System resource use  process All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENTSimplified life-cycles – internal scenario HUMAN RESOURCE MANAGEMENT TERMINATE EMPLOYMENT ASSIGN JOB  ROLE & COST UNIT POSITION START EMPLOYMENT CHANGE JOB  ROLE ENTITLEMENT  MANAGEMENT  SYSTEM TERMINATE ENTITLEMENTS ASSIGN ENTITLEMENTS CREATE PERSON CHANGE ENTITLEMENTS TARGET SYSTEM TERMINATE ACCESS CREATE ACCESS  UPDATE ACCESS  All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENTCore processes in external usage scenario Sub-contractor process Supplier process Channel partner process Stakeholder process Customer process EM process System resource use  process All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENTEntitlement governance levels – external scenario Sub-contractor process Supplier process Channel partner process Stakeholder process Customer process EM process System resource use  process All rights reserved RM5 Software Oy Business-centric view
ENTITLEMENT MANAGEMENTSimplified life-cycles – external scenario CUSTOMER RELATIONSHIP MANAGEMENT TERMINATE CUSTOMERSHIP SELECT SERVICES DEFINE CUSTOMERSHIP CHANGE CUSTOMERSHIP ENTITLEMENT  MANAGEMENT  SYSTEM TERMINATE ENTITLEMENTS CREATE USERS  AND ASSIGN ENTITLEMENTS CREATE SERVICE AGREEMENT CHANGE ENTITLEMENTS TARGET SERVICE TERMINATE ACCESS CREATE ACCESS  UPDATE ACCESS  All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENTCore processes in internal & external scenario Supplier process Supplier process HR process Partner process Stakeholder process Customer process EM process System resource use  process All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENTNew application development process Supplier process Supplier process HR process Partner process Stakeholder process Customer process EM process System development  process System resource use  process All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENTNew application sourcing process Supplier process Supplier process HR process Partner process Stakeholder process Customer process EM process System development  process System resource use  process System sourcing process All rights reserved RM5 Software Oy
Entitlement  policy modeling MANUAL E-mail feed for manual operation  Entitlement service configuration and parametrization STATIC Provisioning to  middleware or target systems Base data import and source system  data feed DYNAMIC Policy information service for  run-time authorization ENTITLEMENT MANAGEMENTKey functionality Entitlement request and approval process ENTITLEMENT INFORMATION DISTRIBUTION ENTITLEMENT SERVICE  MODELING Entitlement service administration Reporting and auditing All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENT Business Centric Approach Advanced external users management Model based Process driven Service  providers Service customers Service Agreement Business roles Services Entitlements RM5 IdM Resources Users Enable delegated administration Model based Software as a Service All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENT Entitlement Model Organisation  or person Service  Provider Service Customer Service Agreement Service Business  Role Service role Entitlement All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENT Extending model with Access Object Entitlements Organisation  or Person Service  Provider Service  Customer Service Agreement Service Owner Business  Role Access object Service Role Entitlement All rights reserved RM5 Software Oy
ENTITLEMENT MANAGEMENT Extending model with Power of Attorney Organisation  or person Principal Agent Power of Attorney Service  Provider Service  Customer Service Agreement Service Business  Role Access object Service Role Entitlement All rights reserved RM5 Software Oy

Mais conteúdo relacionado

Mais procurados

Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Shaunak Gujjewar
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachFemi Ashaye
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersAndrew Ames
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIINextLabs, Inc.
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented ArchitectureRobert Sim
 
Case Study: McKesson
Case Study: McKessonCase Study: McKesson
Case Study: McKessonForgeRock
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation Delivery Centric
 
McKesson - Business Process Redesign
McKesson - Business Process RedesignMcKesson - Business Process Redesign
McKesson - Business Process RedesignBhavik Doshi
 
Demystifying Robotic Process Automation (RPA) & Automation Testing
Demystifying Robotic Process Automation (RPA) & Automation TestingDemystifying Robotic Process Automation (RPA) & Automation Testing
Demystifying Robotic Process Automation (RPA) & Automation TestingCitiusTech
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIINextLabs, Inc.
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIINextLabs, Inc.
 
QCDR or QR (Selecting the Correct Reporting Mechanism)
QCDR or QR (Selecting the Correct Reporting Mechanism)QCDR or QR (Selecting the Correct Reporting Mechanism)
QCDR or QR (Selecting the Correct Reporting Mechanism)CitiusTech
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...IBM Security
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Oracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via IdmOracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via Idmedwinlorenzana
 
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_finalSso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_finalGrant Reveal
 

Mais procurados (20)

Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 
Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1Core optimization methodology_benefit ver 1.1
Core optimization methodology_benefit ver 1.1
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of III
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
 
Case Study: McKesson
Case Study: McKessonCase Study: McKesson
Case Study: McKesson
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
McKesson - Business Process Redesign
McKesson - Business Process RedesignMcKesson - Business Process Redesign
McKesson - Business Process Redesign
 
Demystifying Robotic Process Automation (RPA) & Automation Testing
Demystifying Robotic Process Automation (RPA) & Automation TestingDemystifying Robotic Process Automation (RPA) & Automation Testing
Demystifying Robotic Process Automation (RPA) & Automation Testing
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of III
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
 
QCDR or QR (Selecting the Correct Reporting Mechanism)
QCDR or QR (Selecting the Correct Reporting Mechanism)QCDR or QR (Selecting the Correct Reporting Mechanism)
QCDR or QR (Selecting the Correct Reporting Mechanism)
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Oracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via IdmOracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via Idm
 
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_finalSso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
 

Semelhante a RM5 IdM, Centralized Entitlement Management

Innovatively Managing the Business Process to Create Excellence
Innovatively Managing the Business Process to Create ExcellenceInnovatively Managing the Business Process to Create Excellence
Innovatively Managing the Business Process to Create ExcellenceTata Consultancy Services
 
The Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyThe Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyCA Technologies
 
Dynamics CRM - Contact Center
Dynamics CRM - Contact CenterDynamics CRM - Contact Center
Dynamics CRM - Contact Centerrobandre
 
How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...ManageEngine
 
Crm State Of The Market 2008 & Beyond
Crm State Of The Market 2008 & BeyondCrm State Of The Market 2008 & Beyond
Crm State Of The Market 2008 & BeyondPaul Greenberg
 
Soln deck business operations support services_final
Soln deck business operations support services_finalSoln deck business operations support services_final
Soln deck business operations support services_finalAdobe
 
Transform your Company through Modern Process Applications
Transform your Company through Modern Process ApplicationsTransform your Company through Modern Process Applications
Transform your Company through Modern Process ApplicationsAIIM International
 
Sales Strategy
Sales StrategySales Strategy
Sales Strategykktv
 
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...CA Technologies
 
Ascent overview deck_sep_25_2013
Ascent overview deck_sep_25_2013Ascent overview deck_sep_25_2013
Ascent overview deck_sep_25_2013Bindu Rathore
 
X Change Keynote Kaplan Presentation V02 12 10
X Change Keynote Kaplan Presentation V02 12 10X Change Keynote Kaplan Presentation V02 12 10
X Change Keynote Kaplan Presentation V02 12 10Jeffrey Kaplan
 
Channel Ecm Sales Ppt
Channel Ecm   Sales PptChannel Ecm   Sales Ppt
Channel Ecm Sales PptRahul Bhatia
 
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...HfS Research
 
Digital Reference Architecture- A FOCUS ON MIDDLEWARE “THE KILLER APP”
Digital Reference Architecture-  A FOCUS ON MIDDLEWARE “THE KILLER APP”Digital Reference Architecture-  A FOCUS ON MIDDLEWARE “THE KILLER APP”
Digital Reference Architecture- A FOCUS ON MIDDLEWARE “THE KILLER APP”Kellton Tech Solutions Ltd
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Right time to Outsource your healthcare services to Avantha Business Solutions
Right time to Outsource your healthcare services to Avantha Business SolutionsRight time to Outsource your healthcare services to Avantha Business Solutions
Right time to Outsource your healthcare services to Avantha Business Solutionsavanthabsl
 
Bpms, Putting Business In The Driver’S Seat
Bpms, Putting Business In The Driver’S SeatBpms, Putting Business In The Driver’S Seat
Bpms, Putting Business In The Driver’S Seathanshantson
 
Becoming A Digital Business
Becoming A Digital BusinessBecoming A Digital Business
Becoming A Digital BusinessKen Polotan
 

Semelhante a RM5 IdM, Centralized Entitlement Management (20)

Innovatively Managing the Business Process to Create Excellence
Innovatively Managing the Business Process to Create ExcellenceInnovatively Managing the Business Process to Create Excellence
Innovatively Managing the Business Process to Create Excellence
 
The Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyThe Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case Study
 
Dynamics CRM - Contact Center
Dynamics CRM - Contact CenterDynamics CRM - Contact Center
Dynamics CRM - Contact Center
 
How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...
 
Crm State Of The Market 2008 & Beyond
Crm State Of The Market 2008 & BeyondCrm State Of The Market 2008 & Beyond
Crm State Of The Market 2008 & Beyond
 
Soln deck business operations support services_final
Soln deck business operations support services_finalSoln deck business operations support services_final
Soln deck business operations support services_final
 
Transform your Company through Modern Process Applications
Transform your Company through Modern Process ApplicationsTransform your Company through Modern Process Applications
Transform your Company through Modern Process Applications
 
Sales Strategy
Sales StrategySales Strategy
Sales Strategy
 
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
 
Tvmc Saa S Solutions Briefing 2008
Tvmc Saa S Solutions Briefing 2008Tvmc Saa S Solutions Briefing 2008
Tvmc Saa S Solutions Briefing 2008
 
Ascent overview deck_sep_25_2013
Ascent overview deck_sep_25_2013Ascent overview deck_sep_25_2013
Ascent overview deck_sep_25_2013
 
X Change Keynote Kaplan Presentation V02 12 10
X Change Keynote Kaplan Presentation V02 12 10X Change Keynote Kaplan Presentation V02 12 10
X Change Keynote Kaplan Presentation V02 12 10
 
Channel Ecm Sales Ppt
Channel Ecm   Sales PptChannel Ecm   Sales Ppt
Channel Ecm Sales Ppt
 
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...
HfS Webinar Slides: Standard Bank Case Discussion - Improving Customer Experi...
 
Digital Reference Architecture- A FOCUS ON MIDDLEWARE “THE KILLER APP”
Digital Reference Architecture-  A FOCUS ON MIDDLEWARE “THE KILLER APP”Digital Reference Architecture-  A FOCUS ON MIDDLEWARE “THE KILLER APP”
Digital Reference Architecture- A FOCUS ON MIDDLEWARE “THE KILLER APP”
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Right time to Outsource your healthcare services to Avantha Business Solutions
Right time to Outsource your healthcare services to Avantha Business SolutionsRight time to Outsource your healthcare services to Avantha Business Solutions
Right time to Outsource your healthcare services to Avantha Business Solutions
 
Bpms, Putting Business In The Driver’S Seat
Bpms, Putting Business In The Driver’S SeatBpms, Putting Business In The Driver’S Seat
Bpms, Putting Business In The Driver’S Seat
 
Becoming A Digital Business
Becoming A Digital BusinessBecoming A Digital Business
Becoming A Digital Business
 
Redefining Business Collaboration
Redefining Business CollaborationRedefining Business Collaboration
Redefining Business Collaboration
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

RM5 IdM, Centralized Entitlement Management

  • 1. Kuppinger & Cole Webinar 21.04.2010 One Entitlement Management for all – How to Manage all Users, Services, and Service Providers Consistently
  • 2. ENTITLEMENT MANAGEMENTBrief from Kuppinger & Cole to market the event One Entitlement Management for all – How to Manage all Users, Services, and Service Providers Consistently As IT is becoming more and more hybrid, we will discuss in this webinar the trends, the changes, and approaches for a holistic entitlement management across different types of applications. Entitlement Management, e.g. the management of who is allowed to do what, is a key topic for any organization today. It is about managing entitlements and access in a consistent way. However, most approaches today are mainly targeting internal users, internal services and systems, and internal service providers. There are some few others which focus on managing the external world – only. However, the reality of IT infrastructures and the business context is increasingly hybrid. There are internal and external users, customers as well as suppliers and partners. There are internal and external services, like SaaS applications. These application are run internally and externally. Entitlement Management up to Access Governance, e.g. the management and control of entitlements in IT organizations, has to adopt to these changes and to support any use case. Martin Kuppinger of KuppingerCole will talk about the changing world of IT, becoming increasingly hybrid. He will discuss the trends, the changes, and approaches for a holistic entitlement management across different types of applications. From the KuppingerCole perspective, a consistent approach is mandatory to really being able to manage entitlements in a consistent way and to mitigate risks. Afterwards, Christian Sundell of RM5 Software will describe an approach for an integrated entitlement management for different use cases, not only with respect to internal and external users, services, and providers, but as well with focus on how to integrate a business process view with the IT view of this environment. He will describe requirements, best practices, an illustrate this based on customer use cases which are using such approaches today.
  • 3. BUSINESS ENTITLEMENT MANAGEMENTBusiness challenge How to manage entitlements? Enterprise domain SUPPORT Enterprise Resource Planning Human Resources Finance & Accounting Lifecycle domain Who has Access to What? Enterprise Data, Content & Asset Management Value chain domain Customer Relationship Management Supplier Relationship Management Palveluita tarjoava organisaatio CUSTOMERS SUPPLIERS Input Output Logistics Collaborative Infrastructure Automation Product Lifecycle Management Business domain DESIGN Information system PRODUCTION Source: TopQuadrant, 2004, modified by RM5 All rights reserved RM5 Software Oy
  • 4. ENTITLEMENT MANAGEMENT Solution: Centralized Entitlement Management for Internal and External Organizations application e-service database Circle of Trust repository Entitlement Management Who has access to what? physical resource process asset system non-it service All rights reserved RM5 Software Oy
  • 5. Internal users ENTITLEMENT MANAGEMENTFocus on internal users? INTERNAL SERVICES SINGLE BUSINESS SERVICE PROVIDER INTERNAL USERS Business external organization All rights reserved RM5 Software Oy
  • 6. Internal users external organization external organization ENTITLEMENT MANAGEMENTFocus on external users? INTERNAL SERVICES SINGLE BUSINESS SERVICE PROVIDER EXTERNAL USERS Business External users external organization All rights reserved RM5 Software Oy
  • 7. ENTITLEMENT MANAGEMENTLarge corporation or industry cluster business case? SHARED SERVICES MULTIPLE BUSINESS SERVICE PROVIDERS SHARED USERS All rights reserved RM5 Software Oy
  • 8. ENTITLEMENT MANAGEMENT Hybrid environment needs a hybrid solution model ENTITLEMENT MANAGEMENT MARKET EXISTING OFFERING Software as a Service delivery model NEW OFFERING AUTHORIZATION FOR SaaS/CLOUD SERVICES EXISTING OFFERING AUTHORIZATION FOR INTERNAL SERVICES EXISTING OFFERING On-Premise delivery model Internal services External services All rights reserved RM5 Software Oy
  • 9. ENTITLEMENT MANAGEMENT Value proposition RM5 ENTITLEMENT MANAGEMENT OFFERING Procure Entitlement Management as a Service Create new business by offering Entitlement Management as a Service EXISTING Software as a Service delivery model Manage GRC Improve IAM productivity Enable business EXISTING On-Premise delivery model Customers Managed Service Providers GRC= Access Governance, Risk Management and Compliance IAM = Identity and Access Management All rights reserved RM5 Software Oy
  • 10. ENTITLEMENT MANAGEMENTCore processes in internal usage scenario HR process Entitlement Management process System resource use process All rights reserved RM5 Software Oy
  • 11. ENTITLEMENT MANAGEMENTEntitlement governance level – internal users HR process Traditional IDM view Entitlement Management process System resource use process All rights reserved RM5 Software Oy
  • 12. ENTITLEMENT MANAGEMENTSimplified life-cycles – internal scenario HUMAN RESOURCE MANAGEMENT TERMINATE EMPLOYMENT ASSIGN JOB ROLE & COST UNIT POSITION START EMPLOYMENT CHANGE JOB ROLE ENTITLEMENT MANAGEMENT SYSTEM TERMINATE ENTITLEMENTS ASSIGN ENTITLEMENTS CREATE PERSON CHANGE ENTITLEMENTS TARGET SYSTEM TERMINATE ACCESS CREATE ACCESS UPDATE ACCESS All rights reserved RM5 Software Oy
  • 13. ENTITLEMENT MANAGEMENTCore processes in external usage scenario Sub-contractor process Supplier process Channel partner process Stakeholder process Customer process EM process System resource use process All rights reserved RM5 Software Oy
  • 14. ENTITLEMENT MANAGEMENTEntitlement governance levels – external scenario Sub-contractor process Supplier process Channel partner process Stakeholder process Customer process EM process System resource use process All rights reserved RM5 Software Oy Business-centric view
  • 15. ENTITLEMENT MANAGEMENTSimplified life-cycles – external scenario CUSTOMER RELATIONSHIP MANAGEMENT TERMINATE CUSTOMERSHIP SELECT SERVICES DEFINE CUSTOMERSHIP CHANGE CUSTOMERSHIP ENTITLEMENT MANAGEMENT SYSTEM TERMINATE ENTITLEMENTS CREATE USERS AND ASSIGN ENTITLEMENTS CREATE SERVICE AGREEMENT CHANGE ENTITLEMENTS TARGET SERVICE TERMINATE ACCESS CREATE ACCESS UPDATE ACCESS All rights reserved RM5 Software Oy
  • 16. ENTITLEMENT MANAGEMENTCore processes in internal & external scenario Supplier process Supplier process HR process Partner process Stakeholder process Customer process EM process System resource use process All rights reserved RM5 Software Oy
  • 17. ENTITLEMENT MANAGEMENTNew application development process Supplier process Supplier process HR process Partner process Stakeholder process Customer process EM process System development process System resource use process All rights reserved RM5 Software Oy
  • 18. ENTITLEMENT MANAGEMENTNew application sourcing process Supplier process Supplier process HR process Partner process Stakeholder process Customer process EM process System development process System resource use process System sourcing process All rights reserved RM5 Software Oy
  • 19. Entitlement policy modeling MANUAL E-mail feed for manual operation Entitlement service configuration and parametrization STATIC Provisioning to middleware or target systems Base data import and source system data feed DYNAMIC Policy information service for run-time authorization ENTITLEMENT MANAGEMENTKey functionality Entitlement request and approval process ENTITLEMENT INFORMATION DISTRIBUTION ENTITLEMENT SERVICE MODELING Entitlement service administration Reporting and auditing All rights reserved RM5 Software Oy
  • 20. ENTITLEMENT MANAGEMENT Business Centric Approach Advanced external users management Model based Process driven Service providers Service customers Service Agreement Business roles Services Entitlements RM5 IdM Resources Users Enable delegated administration Model based Software as a Service All rights reserved RM5 Software Oy
  • 21. ENTITLEMENT MANAGEMENT Entitlement Model Organisation or person Service Provider Service Customer Service Agreement Service Business Role Service role Entitlement All rights reserved RM5 Software Oy
  • 22. ENTITLEMENT MANAGEMENT Extending model with Access Object Entitlements Organisation or Person Service Provider Service Customer Service Agreement Service Owner Business Role Access object Service Role Entitlement All rights reserved RM5 Software Oy
  • 23. ENTITLEMENT MANAGEMENT Extending model with Power of Attorney Organisation or person Principal Agent Power of Attorney Service Provider Service Customer Service Agreement Service Business Role Access object Service Role Entitlement All rights reserved RM5 Software Oy
  • 24. Q & A RM5 Software Oy ID 2137580-5 Hämeentie 135 A FI 00560 Helsinki Finland www.rm5software.com Mr. Markku Montonen Chairman & CEO Phone: +358 400 612 213 email: markku.montonen@rm5software.com PRODUCT MARKETING & SALES Mr. Christian Sundell VP, Sales & Marketing Phone: +358 40 1966 577 email: christian.sundell@rm5software.com Thank you!

Notas do Editor

  1. -Avataan keskitetyn hallinnan edut ja miksi se on toimiva ratkaisu.
  2. -Kerrotaan RM5:n ratkaisun perusteet. Mitä sillä voidaan tehdä.