 Nulli Secundus/HVL 2001 Innovative Solutions Integrating NetPoint With PeopleSoft Derek Small, President, Nulli Secundus Inc. Guy Huntington, President,

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Secure Single Sign-On Across Security Domains
We have developed CV easy management (CVem) a fast and effective fully automated software solution for effective and rapid management of all personnel.
HRMS 8.9 Upgrade Person Model. Introduction One of the significant changes to HRMS with the upgrade to 8.9 is the new Person Model. This course provides.
Which server is right for you? Get in Contact with us
Inter-Institutional Registration UNC Cause December 4, 2007.
 HVL/Nulli Secundus 2001 Designing a Single Sign On Strategy Guy Huntington, President HVL Derek Small, President Nulli Secundus.
Microsoft Excel 2003 Illustrated Complete Excel Files and Incorporating Web Information Sharing.
 HVL/Nulli Secundus 2001 Securing e-Business Enabling Growth While Managing Risk Guy Huntington, President HVL Derek Small, President Nulli Secundus.
Prepared by Dept. of Information Technology & Telecommunication, May 1, 2015 DoITT Identity Management Security, Provisioning, Authentication.
 Nulli Secundus/HVL 2001 The Value Proposition Derek Small, President, Nulli Secundus Guy Huntington, President, HVL Integrating Human Resources Enterprise.
 HVL/Nulli Secundus 2001 Identity Management Guy Huntington, President HVL Derek Small, President Nulli Secundus.
Kantara: From IRM to Context. The World of Access Keeps Expanding App sourcing and hosting User populations App access channels SasS apps Apps in public.
Internet, Intranet and Extranets
DEPARTMENT OBJECTIVES 1. To Identify and deploy information technology to meet business objective at CKPL. 2.To Provide support to users for systems usage.
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Active Directory: Final Solution to Enterprise System Integration
Directory services in Nextra - experiences and future plans Kari Marvik, Nextra AS
Understanding Active Directory
Report Distribution Report Distribution in PeopleTools 8.4 Doug Ostler & Eric Knapp 7264.
Knowledge Portals and Knowledge Management Tools
Understanding Active Directory
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
INTRANETS DEFINITION (from Cambridge International Dictionary of English) intra- Combining form used to form adjectives meaning 'within' (the stated place.
Midwest Documentum User Group Harley-Davidson Documentum WCM 10/10/2006.
Welcome to the Minnesota SharePoint User Group. Introductions / Overview Project Tracking / Management / Collaboration via SharePoint Multiple Audiences.
Managing Client Access
Knowledge Management and Technology for Today’s Legal Professional L. Keith Lipman, Esquire Director, Advanced Technology Solutions.
The Internetworked E-Business Enterprise
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Electronically approve and create Suppliers in Oracle Financials using a combination of APEX and Oracle Workflow. NZOUG Conference 2010 Brad Sayer Team.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Web Services (Part 1) Service-Oriented Architecture Overview ITEC 625 Web Development Fall 2006 Reference: Web Services and Service-Oriented Architectures.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
 HVL 2001 Password Management Using Directories to Cut Costs, Improve Productivity and Reduce Risk Guy Huntington, President HVL Derek Small, President.
Totally Automated Security (TAS) Mark Nichols Louisiana Department of Education (LDOE) March 6, 2007.
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
Developing Applications for SSO Justen Stepka Authentisoft, LLC
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
Configuring Directory Certificate Services Lesson 13.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
1 Emergency Alerts as RSS Feeds with Interdomain Authorization Filippo Gioachin 1, Ravinder Shankesi 1, Michael J. May 1,2, Carl A. Gunter 1, Wook Shin.
Riva Managed Identity Integration for Active Directory and Novell ® GroupWise ® Aldo Zanoni CEO, Managing Director Omni Technology Solutions
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
IPortal Bringing your company and your business partners together through customized WEB-based portal software. SanSueB Software Presents iPortal.
Delivering Fixed Content to Oracle Portal Doug Daniels & Ken Barrette Quest Software.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Enterprise Service Desk (ESD) Enterprise Service Desk for Notification / Knowledge Article Authors.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
SharePoint 2007 Business Intelligence October 23 th, 2008 Neil Iversen - Inetium.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Introduction to Terra Dotta Applications Integration with Campus Data Systems for institutions beginning their software implementation.
Enterprise Resource Planning - PeopleSoft. An ERP system is a business support system that maintains in a single database the data needed for a variety.
Portals and CRM: what, When, Why, and How
SP Business Suite Deployment Kick-off
Secure Single Sign-On Across Security Domains
Stop Those Prying Eyes Getting to Your Data
Data and Applications Security Developments and Directions
Prime Service Catalog 12.0 SAML 2.0 Single Sign-On Support
Novell BrainShare 2002 Success in the City: Implementing Novell Solutions at the City of Los Angeles Bob Gillette Information Systems Manager City of Los.
Collaborative Business Solutions
Presentation transcript:

 Nulli Secundus/HVL 2001 Innovative Solutions Integrating NetPoint With PeopleSoft Derek Small, President, Nulli Secundus Inc. Guy Huntington, President, HVL

 Nulli Secundus/HVL 2001 Background Today’s operating environment requires information to be securely and rapidly interchanged between customers, employees, contractors and business partners via tightly integrated systems operating to web standards That creates many challenges…

 Nulli Secundus/HVL 2001 Challenges Most systems weren’t designed with tight integration in mind Some of the information to be exchanged is highly sensitive There’s a lack of security standards and streamlined security processes between internal and external systems

 Nulli Secundus/HVL 2001 Identity Information These challenges are especially noticeable in managing information about identities Many enterprises have come to the conclusion there needs to be some kind of high level identity coordinating hub within their enterprise and between enterprises

 Nulli Secundus/HVL 2001 Examples of Need Coordinating high level or summarized CRM customer information with other systems Personalizing a customer, employee, business partner or vendor experience with a portal or web site Managing and using a company phone directory Coordinating company Finding office locations and floor plans

 Nulli Secundus/HVL 2001 Managing identities in network management Determining employee positions Creating organization charts Managing contractor information Managing vendor and/or supplier information Finding general contact numbers/contacts Managing security identity cards Examples of Need

 Nulli Secundus/HVL 2001 Enter LDAP Directories Many enterprises determine that use of Lightweight Directory Access Protocol (LDAP) directories is desirable to act as that coordinating identity hub PeopleSoft users often raise a number of questions at this point…

 Nulli Secundus/HVL 2001 Key Question Instead of a directory, why not use the PeopleSoft HRMS product to store and support all this data?

 Nulli Secundus/HVL 2001 Non-HRMS Data You could use the PeopleSoft HRMS database since it supports a few of the fields normally found in a directory The information required to support phone directories is scattered amongst a variety of tables and would also need to be augmented with additional “people” data not really required by the HRMS application

 Nulli Secundus/HVL 2001 Non-HRMS Data This means modifying or customizing your PeopleSoft application that probably has too many modifications already!

 Nulli Secundus/HVL 2001 Contractors However, the biggest concern many people have is the fact that most contractors are not in the PeopleSoft HRMS or Financials systems as users of the applications Maintenance of the identity information in the PeopleSoft specific security tables is very costly to perform and better managed by the LDAP directory which now talks to PeopleSoft

 Nulli Secundus/HVL 2001 High Speed Access HRMS applications normally reside in Oracle, DB2 or other such enterprise databases, which are not geared to high- speed accesses required of phone directories and authentication processes Additionally, many applications such as network/application specific security and single sign-on require similar access to this data in a non-proprietary format that is fast to retrieve over IP

 Nulli Secundus/HVL 2001 Authoritative Source That’s why most enterprises are developing a strategy of using the HRMS as the authoritative source of employee data and then updating or publishing this data to the enterprise LDAP directory or directories for general consumption

 Nulli Secundus/HVL 2001 Authoritative Source The addition of contractor information and other data related to pass cards and such are then maintained in web-based LDAP applications such as Oblix’s NetPoint

 Nulli Secundus/HVL 2001 Portal Security? Why not use PeopleSoft security to manage the portal(s)?

 Nulli Secundus/HVL 2001 Portal Access Security Access to PeopleSoft applications via the portal is very secure Accessing the portal via the Internet is not secured via PeopleSoft’s application, as you have to be in the Portal to invoke the security layer Also, other non-PeopleSoft applications invoked from the Portal do not fall under the PeopleSoft security layer

 Nulli Secundus/HVL 2001 Portal Policy Manager Thus the need for a policy manager that securely provides control to and from other applications in the Portal and to the Portal itself This is what Oblix’s NetPoint provides

 Nulli Secundus/HVL 2001 Oblix NetPoint By using the content of the LDAP directory to store policy for authentication and authorization, you provide a centralized control point prior to the user accessing the web-page or back-end non-web application NetPoint helps with the synchronization of identity information found in the directory and used by other applications

 Nulli Secundus/HVL 2001 PeopleSoft vs. NetPoint? How do PeopleSoft and Oblix NetPoint differ?

 Nulli Secundus/HVL 2001 PeopleSoft vs. NetPoint Beyond the obvious of one being an HRMS and one being a LDAP based provisioning and web- security application, they differ a lot In common, they both have data about employees, with the HRMS being the authoritative source for this data But beyond that, NetPoint is a better repository of data about groups of employees and non- employees together

 Nulli Secundus/HVL 2001 Coordinating Hub The key here is that you can maintain all “people” data and object data such as offices and floor plans associated with people in NetPoint for general consumption by the enterprise, NetPoint can support authentication schemes that provide differing methods of knowing who a person is in a variety of roles or circumstances e.g. certificates, username/password, smartcards, tokens, biometrics, etc.

 Nulli Secundus/HVL 2001 Single Sign On? Our enterprise wants to move to a single sign on solution for most applications. How do PeopleSoft and NetPoint fit into this?

 Nulli Secundus/HVL 2001 Easy to Configure! NetPoint is easily configurable for single sign on out of the box This includes setting it up for use in multiple domains, different types of encryption and, as mentioned before, for different types of authentication

 Nulli Secundus/HVL 2001 Post Authentication After central authentication, PeopleSoft will accept the authentication from NetPoint and proceed with it’s own authorization With NetPoint, it’s also easy to configure it to send enough information after authentication to other applications such that the user doesn’t have to sign on again

 Nulli Secundus/HVL 2001 Reduce Costs NetPoint can provide easy and current view of all “people” data without having to maintain costly security profiles for PeopleSoft Information is available over the IP network, thus you can use the Internet for use in controlling access to your web-based applications as well as your non-web-based applications through NetPoint

 Nulli Secundus/HVL 2001 Non-PeopleSoft Authorization? PeopleSoft will handle it’s own authorization for single sign on to PeopleSoft applications. However, a lot of my other non-PeopleSoft applications are older and have poor or little authorization. Also, I want network and ids established or expired as employees come and go. Can NetPoint help?

 Nulli Secundus/HVL 2001 Yes! Authorization rules can be easily built and applied to other applications and/or web resources using NetPoint It’s not uncommon to leverage the use of roles and positions from the PeopleSoft HRMS to do this

 Nulli Secundus/HVL 2001 Leveraging PeopleSoft The HR module becomes the authoritative source for the employee’s position or role which is then replicated out to the directory NetPoint then uses this information to see if the employee’s role or position meets the authorization requirements for a non- PeopleSoft application or resource

 Nulli Secundus/HVL 2001 Identity Lookups? Finding people, their contact information and position in an org chart is expensive to manage, time consuming, often out of date and frustrating How do I use PeopleSoft and NetPoint to do identity lookups of employees, contractors, business partners’ employees, etc?

 Nulli Secundus/HVL 2001 Solution! NetPoint uses easy to configure and install drop down search boxes that can be easily integrated into your intranet or extranets The search boxes take the information, query the directory and then display it in the intranet or extranet browser

 Nulli Secundus/HVL 2001 Solution! The information being displayed from the directory is filtered by NetPoint as to who the administrators determine can view it PeopleSoft is usually the authoritative source for the employee information displayed Other applications may be the directory’s authoritative source for contractor, business partners’ employees or customers’ information

 Nulli Secundus/HVL 2001 Solution! NetPoint can provide dynamic online org charts drawn from the PeopleSoft information such as name, title/position, direct and indirect reports

 Nulli Secundus/HVL 2001 Position Management? Is using PeopleSoft Position Management key to using both PeopleSoft and NetPoint?

 Nulli Secundus/HVL 2001 Position Management No, it’s not really the key to success of such a combination In many cases you can employee differing approaches to derive reporting relationships, roles, routings and access rights based on a number of different data sources other then position Obviously using Position IDs and descriptions makes life considerably simpler, but it isn’t a requirement of successfully implementing the integration

 Nulli Secundus/HVL 2001 Important Note! Having no reporting or structural information in PeopleSoft is very cumbersome for PeopleSoft and really limits how well you can employ a enterprise directory We can help you with evaluating this type of assessment So far we have only found one client in our years of experience that didn’t maintain any reporting structures in PeopleSoft. They eventually changed this when they started their upgrade to version 8.

 Nulli Secundus/HVL 2001 Corporate Directory Issues? If I invest in the NetPoint application for my “corporate white pages” prior to the implementation of our enterprise directory, will I have to re-implement when my enterprise directory is moved to production?

 Nulli Secundus/HVL 2001 Easy Integration No. The directory implementation is readily modified, just like a relational database can be re- modelled as an application grows The schema employed by Oblix “out of the box” is a compendium of best practice data most Fortune 500 enterprises utilize today. It’s no different from buying the PeopleSoft application and using their relational database data model out of the box and then later applying your own changes or modifications.

 Nulli Secundus/HVL 2001 Directory Consumer In many instances, the directory used by NetPoint becomes a consumer of the data found in the authoritative LDAP enterprise directory This is just one option of many to consider There will always be re-work of a schema for the directory, but the effort initially taken to put in place the “phone book” and contact type data is the core foundation to most enterprise directories and thus forms a solid building block for moving forward in the enterprise directory

 Nulli Secundus/HVL 2001 Examples of HRMS to Directory Employee Identifier used in the HRMS and on Identity cards Employee work location – City, State, Building, Floor, Office Employee payroll location – ditto Employee Position Title Employee Job Title if different from Position Employee Department Description Reports to Position Reports to Manager Identifier

 Nulli Secundus/HVL 2001 Examples of HRMS to Directory Indirect Reports Departments that report to the employee Employee status – (Active, Leave, Terminated, Retired etc.) Employment Type – (Contractor, Temp Part-time, Full-time, Temp Full-time etc.) Emergency Contact Information – (Spouse, sibling, brother sister etc.) Home Address Information

 Nulli Secundus/HVL 2001 Examples of Directory to HRMS address Phone Numbers – Home, Office other Address Information Work Location Reports to Information Indirect reports Information Administrator (secretary)

 Nulli Secundus/HVL 2001 Pre-Version 8? What if we are not going onto version 8 PeopleSoft in the near future? How do we keep the HRMS changes to our employee population synchronized to the LDAP directory for use by NetPoint and other network applications?

 Nulli Secundus/HVL 2001 It’s Not a Problem! Nulli Secundus Inc. has provide PeopleSoft 7.x clients with a smooth and reliable method of updating your LDAP directory based on changes occurring in the PeopleSoft HRMS Based on the number of types of updates and the timeliness of the updating desired such an implementation normally takes about 3-6 weeks to design and implement

 Nulli Secundus/HVL 2001 Complexity? Complexity comes into play when you want to draw data from a mixture of authoritative sources, such as Exchange for or when you want to publish to applications such as Exchange as people are added or deleted from the directory We’d be happy to meet with you and scope out the extent of such an integration process

 Nulli Secundus/HVL 2001 Multiple Directories? Can the soon to be released PeopleSoft Directory Integration module be used to update multiple directories?

 Nulli Secundus/HVL 2001 No Problem! Yes! You can update “n” different directories simultaneously from the PeopleSoft version 8 HRMS application We’d be happy to talk to you about how this achieved in more detail upon meeting with you at your site.

 Nulli Secundus/HVL 2001 Groups and Distribution Lists? Can NetPoint be used to develop and maintain groups and distribution lists?

 Nulli Secundus/HVL 2001 Yes! Yes it can! NetPoint 5.0 makes it easy to configure groups and distribution lists We’d be happy to demonstrate this capability for you at your site

 Nulli Secundus/HVL 2001 XML? We’re expanding our use of XML at the moment How does NetPoint and PeopleSoft fit into this?

 Nulli Secundus/HVL 2001 OASIS Netpoint 5 is XML based already Oblix is part of the OASIS group’s efforts to create XML standards for authentication and authorization known as “SAML” As these standards emerge NetPoint will adopt them into their protocols

 Nulli Secundus/HVL 2001 I’d Like to Learn More! Derek Small, Nulli Secundus (ext 20) Guy Huntington, HVL: