identity management 20/01/2005 abhai chaudhary. facts today, many organizations routinely create and...

21
Identity Management Identity Management 20/01/2005 20/01/2005 Abhai Chaudhary Abhai Chaudhary

Upload: peregrine-palmer

Post on 31-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Identity ManagementIdentity Management20/01/200520/01/2005

Abhai ChaudharyAbhai Chaudhary

FactsFacts

Today, many organizations routinely Today, many organizations routinely create and manage user identities and create and manage user identities and access privileges in 25 or more access privileges in 25 or more individual applications and systems.individual applications and systems.

One industry analyst claims that it One industry analyst claims that it takes 28 hours to set up a single user takes 28 hours to set up a single user account.account.

FactsFacts

In one financial services firm, RSA In one financial services firm, RSA security found more than 100 security found more than 100 application-specific authentication application-specific authentication systems.systems.

Most users are forced to remember Most users are forced to remember upwards of 20 passwords for access to upwards of 20 passwords for access to various systems and applicationsvarious systems and applications..

FactsFacts

Some industry analysts estimate that Some industry analysts estimate that as much as 60 percent of help desk as much as 60 percent of help desk calls are password-related.calls are password-related.

Password resets are estimated by Password resets are estimated by analysts to cost between $30 and $60 analysts to cost between $30 and $60 per callper call..

FactsFacts

According to the U.S. Federal trade According to the U.S. Federal trade commission, reported incidents of commission, reported incidents of identity theft increased 73 percent from identity theft increased 73 percent from 2001 to 2002.2001 to 2002.

Business processes are becoming Business processes are becoming more and more complex in nature with more and more complex in nature with multiple entities are involved in multiple entities are involved in decision makingdecision making

Key DriversKey Drivers

ProductivityProductivity

ManageabilityManageability

SecuritySecurity

Cost effectivenessCost effectiveness

ConsistencyConsistency

Compliance with standards Compliance with standards – HIPPA (HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT)HIPPA (HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT)

– ARTICLE 29ARTICLE 29

IdentityIdentity

WhoWho you areyou are??

ContextContext

ProfileProfile

Identity AttributesIdentity Attributes

CertificateCertificatePAN numberPAN numberPassport numberPassport numberSSNSSNDriving license numberDriving license numberGroup membershipsGroup membershipsRolesRolesDepartment within an organization etc Department within an organization etc

Identity ManagementIdentity Management

A solution which provides combination of A solution which provides combination of processes and technologies to manage processes and technologies to manage and secure access to the information and and secure access to the information and resources of an organizationresources of an organization

ScopeScope

Define Identity (Person, place or things)Define Identity (Person, place or things)

Store related information securelyStore related information securely

Making Identity information available to Making Identity information available to authorized personauthorized person

Manage relation between Identity and Manage relation between Identity and resourceresource

GoalsGoals

One userOne user

One identityOne identity

One infrastructureOne infrastructure

GoalsGoals

PeopleSoft®

Oracle® Windows2000®

Sales

Help desk

Employee

Partners B2B Customers

Extended Enterprise resources

Identity Management

Your BusinessResources and

Services

Customers

Trading PartnersEmployees

Prospects/Guests

CRM

Industry Alliances

Marketing Channels Government Bodies

The Big PictureThe Big Picture

One InfrastructureOne Infrastructure

ApplicationGenerators

IdentityApplications

Directories

ProvisioningSolution

ManagementProcess

Global Sign On

BusinessApplications

SecurityInfrastructure

PersonalIdentifiers

Cross Enterprise Sign OnCross Enterprise Sign On

AuthenticationData source

AuthenticationData source

A B

Trust relation

SAML

Key DriversKey Drivers

ProductivityProductivity– Reduced resource allocation timeReduced resource allocation time

ManageabilityManageability– User data synchronizationUser data synchronization– Centralized data repositoryCentralized data repository

SecuritySecurity– Real time record updatesReal time record updates– No orphan accountsNo orphan accounts

Cost effectivenessCost effectiveness– ROIROI

Some ExamplesSome Examples

IMS IMS ( ( www.courion.comwww.courion.com ) )

PivotPath [Jamcracker Inc] PivotPath [Jamcracker Inc] ( ( www.jamcracker.comwww.jamcracker.com ) )

Oblix Oblix ( ( www.oblix.comwww.oblix.com ) )

Tivoli Tivoli ( ( http://www-306.ibm.com/software/tivoli/http://www-306.ibm.com/software/tivoli/ ) )

Dot Net Passport Dot Net Passport ( ( www.passport.netwww.passport.net ) )

Liberty alliance Liberty alliance ((www.projectliberty.orgwww.projectliberty.org))

Netegrity Netegrity ( ( www.netegrity.comwww.netegrity.com ) )

Case Study [ Provisioning ]:Case Study [ Provisioning ]:GRIC Communications IncGRIC Communications Inc

Provides managed broadband service toProvides managed broadband service to– Branch officesBranch offices– Roaming usersRoaming users– Tele workersTele workers

More than 50,000 Access points across 40 More than 50,000 Access points across 40 countriescountries

Case Study [ Provisioning ]: Case Study [ Provisioning ]: GRIC Communications IncGRIC Communications Inc

Workflow tasksWorkflow tasks– ManualManual– AutomaticAutomatic– Semi AutomaticSemi Automatic

Intra department communicationIntra department communication

Unknown third party involvementUnknown third party involvement

15 Different applications15 Different applications

Q&AQ&A