1 IAM Assembly Line. 2 Overview. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
|
|
- Kathryn Long
- 5 years ago
- Views:
Transcription
1 1 IAM Assembly Line Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Evolving from hand-assembled to "factory-built" IAM systems. Idan Shoham CTO, Hitachi ID Systems Overview In the past, IAM deployments were very customized. aborted or truncated projects. This led to cost overruns, missed deadlines and We present a standardized approach to IAM implementations that significantly lowers cost, shortens timelines and reduces risk Hitachi ID Systems, Inc. All rights reserved. 1
2 3 What we ll cover Past problems Risk Cost overruns Schedule overruns Rolled back deliverables Root cause analysis Solution Real world examples 4 What kind of IAM? Everyone has a different idea of what IAM means. What kind of IAM will we discuss here? The kind that creates new identities, manages them, assigns and revokes entitlements and ultimately deletes them. a.k.a. "user provisioning" or "access governance." Including: Create/delete accounts. Move/enable/disable/rename. Assign and revoke group memberships. Reset forgotten passwords and clear lockouts. With automation for: HR-driven processes. Request-driven processes. Approvals workflow. Periodic recertification and remediation. 5 Past problems 2014 Hitachi ID Systems, Inc. All rights reserved. 2
3 5.1 By category Cost Timelines Deliverables Risk Major cost overruns. Deployments running from $1M to $10M. Years in deployment. Teams of 3 or more consultants. Promised the world. Actually deployed few processes, few connectors. Often with no user-facing UI. Stop early due to high cost / long delay. Management sometimes pulled the plug entirely. 6 Root cause analysis 6.1 Is it really this complicated? Every medium to large organization needs IAM processes. Why should automating this stuff be so hard? 2014 Hitachi ID Systems, Inc. All rights reserved. 3
4 6.2 Process complexity There is almost fractal detail to some processes. Onboarding, transfers: Composing, reserving unique IDs. Assets (homedirs, mail folders), permissions. Deactivation: Scheduled vs. immediate. Advance warning, disable, undo, archive, delete. Retain records, detect returnees. Are roles the answer? Only helpful when many users need the same thing. Role management can be very costly. Automation from an HR feed? HR are not willing participants in this. Data may be late, coarse grained or obsolete. 6.3 Project/program management Executive sponsor? Lots of stake-holders. Someone has to make decisions. Unrealistic promises: Promise a feast, budget for a snack. They lose patience when time/money runs out and results are still small. Some of this stuff looks like business process re-engineering : (run for the hills!) If you can t do it quickly, sometimes you shouldn t do it at all Hitachi ID Systems, Inc. All rights reserved. 4
5 6.4 Where did the time and money go? Implementation eats up 5x to 10x as much cost as software and runtime platform. All those consultants are expensive. Some integrators try to park consultants on-site, indefinitely. 6.5 Technical and usability challenges Users don t know what/how to request. Roles sound good until you have to define/assign them! Users forget their password in awkward situations. Off-site, where they can t get to your password reset system. Pre-boot, where they don t even have an OS running yet. The IT landscape keeps changing. You can t just deploy this stuff and go home. New apps, upgrades, SaaS constant churn! 7 Solution 2014 Hitachi ID Systems, Inc. All rights reserved. 5
6 7.1 Problem analogy Imagine that you want to buy a car... But there are no industrial auto makers! You have to define requirements, put out an RFP and hire someone to build a one-off car just for you! This is the state of the IAM business. Built by craftsmen using technology frameworks. Not standard products put together on an assembly line. Leads to cost, risk and delay. 7.2 But we re special! Your organization has its own: Business processes. Systems and applications. Surely you need a custom-fit solution? 2014 Hitachi ID Systems, Inc. All rights reserved. 6
7 7.3 Maybe not so unique If you are a corporation... Does your recruitment work so differently than everyone else s? Do you terminate people in a really weird way? Are moves and transfers uniquely your own? Maybe all that special process is just an accident of history. Maybe using standardized processes wouldn t cause any harm. Or not a corporation... Higher education. Hospitals. Partner web portals. Consumer enrollment. Maybe you should use processes that organizations resembling yours all share? 7.4 Reference builds A reference build is a pre-configured IAM system. It should fit every organization in a category: Corporations. Higher education. Hospitals. etc. You can tweak it if you have to. The idea is to start with a fully functional, complete system and make minor adjustments. Don t build everything from scratch. 7.5 A trade-off Give... Throw away your old processes, which are just a historical accident anyways. Adopt best practices from your category of business.... and take Implement a fully featured IAM system in weeks. Improve SLA, security, user service Hitachi ID Systems, Inc. All rights reserved. 7
8 7.6 Obvious questions Is this the only way to build an IAM system? What about IAMaaS (move it to the cloud)? Does this mean that Hitachi ID only does "cookie cutter" IAM deployments? No, special-built solutions remain possible. Even if needs are exotic, it s more cost effective to start with a reference implementation than to start from scratch. Where the IAM system is installed makes little difference. IAMaaS vendors will want to push a standard model too. Zero on-premise footprint is a pipe dream you need a proxy for integration to your on-premise systems/apps. No, but we recommend them wherever possible. This is a serious effort to minimize customer TCO. 8 Real world examples 8.1 Specialized per style of organization Corporate Intranet-facing. 50,000 users Employees. Contractors. Vendors. HR SoR. AD/Windows/Exchange. Thousands of users. B2B Extranet-facing partners 100,000 users No SoR. Single LDAP. Infrequent users. Delegated admin. B2C Extranet-facing. 1,000,000+ users No SoR. Single LDAP. Infrequent users. Pure self-service admin Hitachi ID Systems, Inc. All rights reserved. 8
9 8.2 Corporate reference build: details Integrations: SQL-based HR SoR. AD domain Exchange domain (mailboxes) Windows filesystem (homedirs) Entitlements: Login IDs. Group memberships. Roles. User communities: Employees. Contractors/other. Configuration: Based on user classes, rules tables and lookup tables. Near-zero script logic. Automation: Onboard/deactivate based on SoR. Identity attribute propagation. Self-service: Password, security question management. Update to contact info. Request for application, share, folder access. Delegated admin: Same as self-service, plus recert. Approval workflows: IT security (global rights). HR/managers (approve for each-other). Recertification: Scheduled. Ad-hoc. 8.3 Corporate reference: complex cases Transfer: New user: Scheduled term: New user: Authorization: Move mailbox, home directory. Invite old, new managers to recertify entitlements. Automatically detect, block accidental rehires. Provide separate reactivate process for allowed returnees. Early warning to manager. Allow manager, HR to defer term date. Disable on term date. Reassign, archive resources (homedir, mail folder). Cleanup accounts, etc. after N days. First login PII acquired during onboarding. Force new users to enroll security questions, set first password. Require user to read, accept AUP before first login. Detect if the requester matches valid authorizers. Route requests back to requester for auto-approval Hitachi ID Systems, Inc. All rights reserved. 9
10 8.4 Customer experience - corporate reference build Time to deploy Return on investment Real world examples 1 month to 4 months. Depends on process complexity and change approval. Automate the most common, complex access requests. Better SLA for new hires. Reliable deactivation for departed users. Multi-national energy company: 30 days effort / 2 months calendar to deploy. Automated 2,500 changes/month. Mid-size operator of retirement homes: 20 days effort / 8 months calendar to deploy (lots of delays). Automated 100 changes/month. 9 How does it look? 9.1 View Org Chart Data 2014 Hitachi ID Systems, Inc. All rights reserved. 10
11 9.2 User Profile Screen 9.3 Advanced Search 2014 Hitachi ID Systems, Inc. All rights reserved. 11
12 9.4 Create a New User 9.5 Compare User Profiles 2014 Hitachi ID Systems, Inc. All rights reserved. 12
13 9.6 Intercepting an Access Denied Error 9.7 User Details 2014 Hitachi ID Systems, Inc. All rights reserved. 13
14 9.8 New Password 9.9 Define a Relationship 2014 Hitachi ID Systems, Inc. All rights reserved. 14
15 9.10 Authorization Policy 10 Summary 10.1 Available now Hitachi ID offers IAM reference builds for corporate, B2B and B2C. Other patterns coming soon. Implementation and modest customization take just days of work. Visit us at hitachi-id.com or at our booth at Gartner IAM to learn more. Questions? Be sure to stop by our session on Enterprise Compliance and Risk Mitigation Senior IAM Specialist, Bruce Macdonald Thursday 10am - Augustus III. Visit booth #204 in the Octavius Ballroom. 500, Street SE, Calgary AB Canada T2G 2J3 Tel: Fax: sales@hitachi-id.com Date: December 5, 2014 File: PRCS:pres
1 Corporate Reference Build. 2 Overview. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Corporate Reference Build Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Expediting IAM deployment and minimizing TCO by adopting best practices. 2 Overview 2018 Hitachi
More information1 IAM Program Launch. 2 Agenda. 3 Introductions. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 IAM Program Launch Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Kickstart an IAM program with discovery of business and IT requirements 2 Agenda Who? Introductions. Why?
More information1 Hitachi ID Suite. 2 Agenda. 3 Corporate. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Suite Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Administration and governance of Identities, entitlements and credentials. 2 Agenda Corporate Hitachi ID
More information1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
More information1 Introduction to Identity Management. 2 Access needs evolve. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Introduction to Identity Management Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications An overview of business drivers and technology solutions. 2 Access needs evolve Digital
More information1 Hitachi ID Privileged Access Manager. 2 Overview. 3 HiPAM 9.0. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Privileged Access Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Privileged Access Manager 10.0 Features and Technology. 2 Overview Hitachi ID Suite 9.0
More information1 Modular architecture
1 Modular architecture UI customization IIS ID assignment Authorizer selection HTML/CSS/JS HTML/CSS/JS skin skin API User module Admin module Attribute validation Resource assignment Escalation / delegation
More information1 Hitachi ID Group Manager. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Group Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Full lifecycle management of groups and memberships. 2 Agenda Introductions. Hitachi ID corporate
More information1 Hitachi ID Access Certifier. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Access Certifier Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Periodic review and cleanup of security entitlements. 2 Agenda Hitachi ID corporate overview.
More informationService Offering: Outsourced IdM Administrator Service
Service Offering: Outsourced IdM Administrator Service 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 The Outsourced IdM Administrator Service 1 2.1 Hitachi ID Systems and
More information1 Hitachi ID Mobile Access. 2 The BYOD challenge. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Mobile Access Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Secure Access to On-Premise IAM from Devices. 2 The BYOD challenge Users Want to access everything
More information1 Hitachi ID / ServiceNow. 2 Self-service security. IT Service Management (ITSM). Asset management. Process orchestration.
1 Hitachi ID / ServiceNow ServiceNow IT Service Management (ITSM). Asset management. Process orchestration. Hitachi ID Password management. Identity and access management. Privileged access management.
More information1 Hitachi ID Suite. 2 Overview. 3 Hitachi ID Direction. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Suite Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Hitachi ID Suite 10.0 Features and Technology. 2 Overview Corporate direction Hitachi ID view of market evolution.
More information1 Maximizing Value. 2 Economics of self-service. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Maximizing Value Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Getting value from Hitachi ID Password Manager by improving user adoption. 2 Economics of self-service 2019
More information2 Me. 3 The Problem. Speaker. Company. Ed Breay Sr. Sales Engineer, Hitachi ID Systems.
1 2 Me Speaker Ed Breay Sr. Sales Engineer, Hitachi ID Systems. Company Hitachi, Ltd.: a 100 year old Fortune 100 conglomerate. Hitachi ID Systems, Inc.: a 19 year old IAM software subsidiary. Headquarters
More informationManaged Administration Service (MAS): Hitachi ID Password Manager
Managed Administration Service (MAS): Hitachi ID Password Manager 2018 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Managed Administration Service (MAS) 1 2.1 Hitachi ID Systems
More informationIntegrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2016 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
More information1 Hitachi ID Suite. 2 High level roadmap (all products) Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Suite Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Hitachi ID Suite 10.0 Features and Technology. 2 High level roadmap (all products) Three industry-leading
More informationIntegrating Password Management with Enterprise Single Sign-On
Integrating Password Management with Enterprise Single Sign-On 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Background: one problem, two solutions 2 2.1 The Problem.............................................
More information1 Hitachi ID Password Manager
1 Hitachi ID Password Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Integrated credential management: Passwords, security questions, certificates, tokens, smart cards
More informationRunning Effective Projects In Office 365. June 1, 2017
Running Effective Projects In Office 365 June 1, 2017 Peter Carson President, Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com http://blog.petercarson.ca
More informationOffice 365 External Sharing Webinar November 7, 2017
Office 365 External Sharing Webinar November 7, 2017 Introductions Peter Carson President, Extranet User Manager and Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com
More informationUser Lifecycle. 1 Service Desk Express and Hitachi ID Password Manager (P-Synch) 2 Hitachi ID / BMC Partnership. Managing The User Lifecycle
1 Service Desk Express and Hitachi ID Password Manager (P-Synch) MANAGE profiles and rights Managing The User Lifecycle HIRE employees contractors User Lifecycle SUPPORT access problems With The Hitachi
More information1 Hitachi ID Suite. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Suite Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Administration and Governance of Identities, Entitlements and Credentials. 2 Agenda Hitachi ID corporate
More informationRegulatory Compliance Using Identity Management
Regulatory Compliance Using Identity Management 2016 Hitachi ID Systems, Inc. All rights reserved. Regulations such as Sarbanes-Oxley, FDA 21-CFR-11 and HSPD-12 require stronger security, to protect sensitive
More informationDefine Your Office 365 External Sharing Strategy
Define Your Office 365 External Sharing Strategy Tuesday, April 24, 2018 12:00-1:00 PM Peter Carson President, Extranet User Manager and Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com
More informationSharePoint 2019 and Extranet User Manager
SharePoint 2019 and Extranet User Manager Tuesday, June 5, 2018 12:00-1:00 PM http://eum.co (#) Agenda Introductions SharePoint 2019 Announcements SharePoint On Premises Extranets EUM Features and Licensing
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationBEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE
BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.
More informationPassword Management Project Roadmap
2016 Hitachi ID Systems, Inc. All rights reserved. This document will guide you through the entire life of a successful password management project, including: A needs analysis. Who to involve in the project.
More information1 Hitachi ID Collaboration
1 Hitachi ID Collaboration Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Introduction to Hitachi ID solutions, existing integrations and roadmap. 2014-03-10 2 Hitachi ID
More information2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,
2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered
More informationIAM Project Overview & Milestones
IAM Project Overview & Milestones TABLE OF CONTENTS IAM PROJECT SUCCESS FACTORS 3 PROJECT SCOPE 3 IN SCOPE 3 OUT OF SCOPE 4 IAM NOW VS. FUTURE 5 IAM NOW 5 IAM IN THE FUTURE 7 IAM PROJECT END STATE 8 ACCESS
More informationFRONT USER GUIDE Getting Started with Front
USER GUIDE USER GUIDE Getting Started with Front ESSENTIALS Teams That Use Front How To Roll Out Front Quick Start Productivity Tips Downloading Front Adding Your Team Inbox Add Your Own Work Email Update
More informationAccess Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions
Access Governance in a Cloudy Environment Nabeel Nizar VP Worldwide Solutions Engineering @nabeelnizar Nabeel.Nizar@saviynt.com How do I manage multiple cloud instances from a single place? Is my sensitive
More informationSAP Security in a Hybrid World. Kiran Kola
SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal
More informationExternal Collaboration with Office 365 Project Sites. September 16, 2015
External Collaboration with Office 365 Project Sites September 16, 2015 Peter Carson President, Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com http://blog.petercarson.ca
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationBeyond Roles: A Practical Approach to Enterprise User Provisioning
Beyond Roles: A Practical Approach to Enterprise User Provisioning 2016 Hitachi ID Systems, Inc. All rights reserved. Enterprise-scale organizations employ large numbers of internal users, with different
More informationManaging Identity Lifecycles at Scale
Microsoft Azure Active Directory Deployment Guide for Retail Industry Customers Abstract This guide helps you deploy a unified identity and access management solution with Microsoft Azure Active Directory.
More informationCrash course in Azure Active Directory
Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.
More informationA HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage
A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION Establish Create Use Manage SIMPLE. SECURE. SMART. ALL FROM A SINGLE SOURCE. As the ways to access your organization and its sensitive data increase,
More informationThe Old is New Again Engineering Security in the Age of Data Access from Anywhere
The Old is New Again Engineering Security in the Age of Data Access from Anywhere Paul de Graaff Chief Strategy Officer Vanguard Integrity Professionals March 10, 2014 Session 14971 AGENDA History 1 This
More informationQuo vadis? System Center Configuration Manager Full managed desktop. Mobile device management Light managed device policies, inventory,
Quo vadis? System Center Configuration Manager Full managed desktop Mobile device management Light managed device policies, inventory, Hybrid management One pane of glass Integration of mobile device management
More informationThank You Sponsors! GOLD SILVER BRONZE / PRIZES
BRONZE / PRIZES SILVER GOLD Thank You Sponsors! Peter Carson President, Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter@envisionit.com http://blog.petercarson.ca www.envisionit.com Twitter
More informationWHITEPAPER A Selection Guide to Binary Tree s Directory Synchronization Software
WHITEPAPER A Selection Guide to Binary Tree s Directory Synchronization Software Table of Contents Introduction... 3 Binary Tree Directory Synchronization Software Products... 4 Directory Sync Pro... 4
More informationApple OS Deployment Guide for the Enterprise
Apple OS Deployment Guide for the Enterprise So your organization is about to deploy Mac, iphone, ipad and/or Apple TV to your users and you re not sure where to start? That s where the Apple management
More informationIBM Tivoli Identity Manager V5.1 Fundamentals
IBM Tivoli Identity Manager V5.1 Fundamentals Number: 000-038 Passing Score: 600 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ IBM 000-038 IBM Tivoli Identity Manager V5.1 Fundamentals
More informationExpertise that goes beyond experience.
Pre-Conference Training and Certification Expertise that goes beyond experience. OKTANE18.COM Monday, May 21 - Tuesday, May 22 ARIA Resort & Casino, Las Vegas Contents 03 04 05 Okta Education Services
More informationVendor: Microsoft. Exam Code: MB Exam Name: Microsoft Dynamics CRM Online Deployment. Version: Demo
Vendor: Microsoft Exam Code: MB2-715 Exam Name: Microsoft Dynamics CRM Online Deployment Version: Demo Exam A QUESTION 1 You are a systems support specialist for your company. A sales manager is currently
More informationStep by Step process to activate guest access in Microsoft Teams.
Step by Step process to activate guest access in Microsoft Teams. External access with Microsoft Teams Microsoft Teams has started allowing guest access in organization to collaborate or communicate with
More informationWhy is Office 365 the right choice?
Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply
More informationSailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities
SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust
More informationRequest for Proposal (RFP) Toolkit
RFPToolkit Request for Proposal (RFP) Toolkit Table of Contents RFP Checklist......................................................... 2 6 Tips for Writing an RFP..............................................
More informationOffice 365 Adoption eguide
Office 365 Adoption eguide Identity and Mobility Challenges Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 info@okta.com I 1-888-722-7871 Mind the Identity Gap Executive Summary Microsoft
More informationGuidelines on the use of G Suite provided by ELSA
G Suite Guidelines Guidelines on the use of G Suite provided by ELSA Why do we use G Suite? Information Technology (read more on page 30 of the ICMDB) continues to be a very important dimension in the
More informationManaging the Risk of Privileged Accounts and Passwords
Managing the Risk of Privileged Accounts and Passwords Definition: Privileged Account Privileged Management Obviously accounts with special or elevated permissions Windows Every workstation and server
More informationWhite Paper. RingCentral. Professional Services Implementation & Onboarding Methodology
White Paper RingCentral Professional Services Implementation & Onboarding Methodology RingCentral Professional Services Implementation & Onboarding Methodology Any technology transition can be challenging;
More informationData Governance Quick Start
Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry
More informationI m Im going to try the recording feature as well.
6 Feb 2012 My apologies on the announcement error. Please connect using the online audio if possible. I ve not used Go-to Meeting before, it ll be an adventure for all of us. I m Im going to try the recording
More informationOffice 365: Modern Workplace
Office 365: Modern Workplace November 8, 2018 Bruce Ward, VP of Business Strategy Helping you grow your business with scalable IT services & solutions for today s challenges & tomorrow s vision. 2018 Peters
More informationOnline Demo Guide. Barracuda PST Enterprise. Introduction (Start of Demo) Logging into the PST Enterprise
Online Demo Guide Barracuda PST Enterprise This script provides an overview of the main features of PST Enterprise, covering: 1. Logging in to PST Enterprise 2. Client Configuration 3. Global Configuration
More informationFor Volunteers An Elvanto Guide
For Volunteers An Elvanto Guide www.elvanto.com Volunteers are what keep churches running! This guide is for volunteers who use Elvanto. If you re in charge of volunteers, why not check out our Volunteer
More informationAutomating the Software-Defined Data Center with vcloud Automation Center
Automating the Software-Defined Data Center with vcloud Automation Center 10 June 2014 Chris Alleaume Senior Systems Engineer 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of
More informationLocking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationAdmin Table is oftr Caoto ntr e s U ntsser Guide Table of Contents Introduction Accessing the Portal
Administrator s Table of Contents User Guide Table of Contents Introduction 3 Accessing the Portal 3 Create User Accounts 4 Enable / Disable User Accounts 5 Manage Users from an LDAP Server 5 User Roles
More informationBYOD... or CYOD? 2 BILLION 5 BILLION. The Choice is Yours MOBILE DEVICES WORLDWIDE BY 2015 MOBILE DEVICES WORLDWIDE BY 2020
BYOD... or CYOD? The Choice is Yours We love our mobile devices. We love them so much that we need them no matter where we are or what we re doing. We want to use our smartphone to answer email while at
More informationA guide for assembling your Jira Data Center team
A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices
More informationQ&A Session for Connect with Remedy - CMDB Best Practices Coffee Break
Q&A Session for Connect with Remedy - CMDB Best Practices Coffee Break Date: Thursday, March 05, 2015 Q: When going to Asset Management Console and making an update on there, does that go to a sandbox
More informationBenefits of Extending your Datacenters with Amazon Web Services
Benefits of Extending your Datacenters with Amazon Web Services Xavier Prélat Business Development Manager @aws_actus How did Amazon.. get into cloud computing? What is AWS? Amazon Web Services offers
More informationTable of Contents. Table of Contents 3
User Guide for Administrators EPiServer 7 CMS Revision A, 2012 Table of Contents 3 Table of Contents Table of Contents 3 Introduction 5 About this Documentation 5 Accessing EPiServer Help System 5 Online
More informationHitachi ID Password Manager Telephony Integration
Hitachi ID Password Manager Telephony Integration 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................
More informationIAM Problems with managing identities and access of University Guests
IAM Problems with managing identities and access of University Guests Agenda IAM Background / Goals / Status Problem with managing guests accounts Possible solutions IAM Project Success Factors Establishing
More informationThe Root Cause of Unstructured Data Problems is Not What You Think
The Root Cause of Unstructured Data Problems is Not What You Think PRESENTATION TITLE GOES HERE Bruce Thompson, CEO Action Information Systems www.expeditefile.com What is this presentation all about?
More informationNHSmail Migration Communications Plan Template
NHSmail Migration Communications Plan Template June 2018 Version 2 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationIBM Security Identity Manager Version Administration Topics
IBM Security Identity Manager Version 6.0.0.5 Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics ii IBM Security Identity Manager Version 6.0.0.5: Administration
More informationIdentity & Access Management: Changes for FAS and Beyond. May 6, p.m. FAS Standing Committee on IT Barker Center Plimpton Room
Identity & Access Management: Changes for FAS and Beyond May 6, 2015 12 p.m. FAS Standing Committee on IT Barker Center Plimpton Room Agenda The Vision for Harvard Identity & Access Management Business
More informationExtranets in SharePoint and Office 365 May 17, 2017
Extranets in SharePoint and Office 365 May 17, 2017 Peter Carson President, Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com http://blog.petercarson.ca www.envisionit.com
More informationThe Idiot s Guide to Quashing MicroServices. Hani Suleiman
The Idiot s Guide to Quashing MicroServices Hani Suleiman The Promised Land Welcome to Reality Logging HA/DR Monitoring Provisioning Security Debugging Enterprise frameworks Don t Panic WHOAMI I wrote
More informationUMD: UTAH MASTER DIRECTORY
UMD: UTAH MASTER DIRECTORY EXECUTIVE SUMMARY The Utah Master Directory (UMD) is an identity management system for all State of Utah employees and approved citizens. It is the touchstone for all applications
More informationApple Device Management
A COMPREHENSIVE GUIDE Apple Device Management FOR SMALL AND MEDIUM BUSINESSES With a renewed focus on mobile devices in the work environment, Apple has become the device of choice in small and medium businesses.
More informationTREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide
TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide February 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator
More informationLSP O365 Hands-on Training Planet Technologies. 1
LSP O365 Hands-on Training 2016 Planet Technologies. 1 Agenda for today Intro IT Update/ Ground Rules O365 Overview Break Outlook and OWA Mobile Device Lunch Skype for Business FAQ Tips and Issues Evolve
More informationAutomating the Software-Defined Data Center with vcloud Automation Center
Automating the Software-Defined Data Center with vcloud Automation Center Alex Tanner EM Specialist SE July 2014 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of Business The
More informationMigrating application users and passwords with Password Manager
Migrating application users and passwords with Password Manager 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Migrating Users 1 3 Initializing Passwords 2 4 Maintaining
More informationTHREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017
THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 An IT Architect s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy As the consumerization
More informationWhat is orbac? ability to group several authorizations in to profiles to easily add/remove a set of authorizations to an employee
What is orbac? orbac orbac (opns Role Based Access Control) is a IT security solution that enables a structured, centralized, hierarchical and delegated management of IT privileges. orbac is based on the
More informationWho am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB
@markmorow Who am I? Identity Product Group, CXP Team Premier Field Engineer SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB Active Directory Domain Services On-premises App Server Validate credentials
More informationHitachi ID Identity and Access Management Suite TRIAL USE LICENSE AGREEMENT. between
between Hitachi ID Systems, Inc. (hereinafter referred to as "HIDS", "we" and/or "us") and LICENSEE (see below) (hereinafter referred to as "LICENSEE" and/or "you".) (Please complete ALL fields below by
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationWhy Microsoft s head is in the clouds and what it means to you.
Why Microsoft s head is in the clouds and what it means to you http://www.windowsitpro.com/blogcontent/tony-redmonds-exchange-unwashed-50 Agenda Where next for Exchange Office 365 Cloud deployments Where
More informationCloud Bursting: Top Reasons Your Organization will Benefit. Scott Jeschonek Director of Cloud Products Avere Systems
Cloud Bursting: Top Reasons Your Organization will Benefit Scott Jeschonek Director of Cloud Products Avere Systems Agenda Define Cloud Bursting Benefits of using Cloud Bursting Identify Cloud Bursting
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More information3-Part Guide to Developing a BYOD Strategy
An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)
More informationThe Journey of a Senior System Center Consultant Implementing BSM
November 2014 The Journey of a Senior System Center Consultant Implementing BSM AUTHOR: APPROVED CONSULTING, JONAS LENNTUN Amsterdam - New York Ottawa - Dallas www.savision.com sales@savision.com 1.1 How
More informationUnderstanding ArcGIS Online - why organizations should embrace the cloud now
Understanding ArcGIS Online - why organizations should embrace the cloud now Presented to: GeoAlberta - workshop Presented by: David Parry September 25, 2013 Today s Agenda Introduction - Why the Cloud?
More informationADDENDUM A 02/20/2018. Questions received from proposers along with answers are attached.
Finance Department Purchasing Division REQUEST FOR PROPOSALS (RFP) Specification No. 17-11152-C FOR OFFICE 365 EXCHANGE MIGRATION AND ONE DRIVE IMPLEMENTATION PROPOSALS WILL NOT BE OPENED AND READ PUBLICLY
More informationAdministrator s Guide
Administrator s Guide (January 2017) Welcome! You have been invited to manage the subscriber community who will be using this videoconferencing service within your organization. This guide will provide
More information