identity management 20/01/2005 abhai chaudhary. facts today, many organizations routinely create and...
TRANSCRIPT
FactsFacts
Today, many organizations routinely Today, many organizations routinely create and manage user identities and create and manage user identities and access privileges in 25 or more access privileges in 25 or more individual applications and systems.individual applications and systems.
One industry analyst claims that it One industry analyst claims that it takes 28 hours to set up a single user takes 28 hours to set up a single user account.account.
FactsFacts
In one financial services firm, RSA In one financial services firm, RSA security found more than 100 security found more than 100 application-specific authentication application-specific authentication systems.systems.
Most users are forced to remember Most users are forced to remember upwards of 20 passwords for access to upwards of 20 passwords for access to various systems and applicationsvarious systems and applications..
FactsFacts
Some industry analysts estimate that Some industry analysts estimate that as much as 60 percent of help desk as much as 60 percent of help desk calls are password-related.calls are password-related.
Password resets are estimated by Password resets are estimated by analysts to cost between $30 and $60 analysts to cost between $30 and $60 per callper call..
FactsFacts
According to the U.S. Federal trade According to the U.S. Federal trade commission, reported incidents of commission, reported incidents of identity theft increased 73 percent from identity theft increased 73 percent from 2001 to 2002.2001 to 2002.
Business processes are becoming Business processes are becoming more and more complex in nature with more and more complex in nature with multiple entities are involved in multiple entities are involved in decision makingdecision making
Key DriversKey Drivers
ProductivityProductivity
ManageabilityManageability
SecuritySecurity
Cost effectivenessCost effectiveness
ConsistencyConsistency
Compliance with standards Compliance with standards – HIPPA (HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT)HIPPA (HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT)
– ARTICLE 29ARTICLE 29
Identity AttributesIdentity Attributes
CertificateCertificatePAN numberPAN numberPassport numberPassport numberSSNSSNDriving license numberDriving license numberGroup membershipsGroup membershipsRolesRolesDepartment within an organization etc Department within an organization etc
Identity ManagementIdentity Management
A solution which provides combination of A solution which provides combination of processes and technologies to manage processes and technologies to manage and secure access to the information and and secure access to the information and resources of an organizationresources of an organization
ScopeScope
Define Identity (Person, place or things)Define Identity (Person, place or things)
Store related information securelyStore related information securely
Making Identity information available to Making Identity information available to authorized personauthorized person
Manage relation between Identity and Manage relation between Identity and resourceresource
PeopleSoft®
Oracle® Windows2000®
Sales
Help desk
Employee
Partners B2B Customers
Extended Enterprise resources
Identity Management
Your BusinessResources and
Services
Customers
Trading PartnersEmployees
Prospects/Guests
CRM
Industry Alliances
Marketing Channels Government Bodies
The Big PictureThe Big Picture
One InfrastructureOne Infrastructure
ApplicationGenerators
IdentityApplications
Directories
ProvisioningSolution
ManagementProcess
Global Sign On
BusinessApplications
SecurityInfrastructure
PersonalIdentifiers
Cross Enterprise Sign OnCross Enterprise Sign On
AuthenticationData source
AuthenticationData source
A B
Trust relation
SAML
Key DriversKey Drivers
ProductivityProductivity– Reduced resource allocation timeReduced resource allocation time
ManageabilityManageability– User data synchronizationUser data synchronization– Centralized data repositoryCentralized data repository
SecuritySecurity– Real time record updatesReal time record updates– No orphan accountsNo orphan accounts
Cost effectivenessCost effectiveness– ROIROI
Some ExamplesSome Examples
IMS IMS ( ( www.courion.comwww.courion.com ) )
PivotPath [Jamcracker Inc] PivotPath [Jamcracker Inc] ( ( www.jamcracker.comwww.jamcracker.com ) )
Oblix Oblix ( ( www.oblix.comwww.oblix.com ) )
Tivoli Tivoli ( ( http://www-306.ibm.com/software/tivoli/http://www-306.ibm.com/software/tivoli/ ) )
Dot Net Passport Dot Net Passport ( ( www.passport.netwww.passport.net ) )
Liberty alliance Liberty alliance ((www.projectliberty.orgwww.projectliberty.org))
Netegrity Netegrity ( ( www.netegrity.comwww.netegrity.com ) )
Case Study [ Provisioning ]:Case Study [ Provisioning ]:GRIC Communications IncGRIC Communications Inc
Provides managed broadband service toProvides managed broadband service to– Branch officesBranch offices– Roaming usersRoaming users– Tele workersTele workers
More than 50,000 Access points across 40 More than 50,000 Access points across 40 countriescountries
Case Study [ Provisioning ]: Case Study [ Provisioning ]: GRIC Communications IncGRIC Communications Inc
Workflow tasksWorkflow tasks– ManualManual– AutomaticAutomatic– Semi AutomaticSemi Automatic
Intra department communicationIntra department communication
Unknown third party involvementUnknown third party involvement
15 Different applications15 Different applications