Sierra Systems itSMF Development Days Presentation March 4 th, 2014 Colin James Assyst Implementation Specialist.

Slides:



Advertisements
Similar presentations
Towards a simpler and more efficient BR June 19, 2007 ICES-III Montréal (QC)
Advertisements

THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Mutual OATH HOTP Variants 65th IETF - Dallas, TX March 2006.
By Eva Freund, The IV&V Group, Inc.
Functional component terminology - thoughts C. Tilton.
Workflow & Event Derivation Workshop
Dr. Julian Lo Consulting Director ITIL v3 Expert
Systems Engineering in a System of Systems Context
Federated Identity Management for Research Communities (FIM4R) David Kelsey (STFC-RAL) EGI TF, AAI workshop 19 Sep 2012.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
Understanding Active Directory
Keystone Technology Plan Presentation to Chesapeake Bay Program Information Management Subcommittee May 19, 2004 Nancie L. Imler Chief Information Officer.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Peter Deutsch Director, I&IT Systems July 12, 2005
Workflow & Event Derivation Workshop
BUSINESS DRIVEN TECHNOLOGY
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
Lecture 7 Access Control
1 Data Strategy Overview Keith Wilson Session 15.
Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Digital Identity: Federation, Integration and Deployment of Trusted Identity Solutions Ryan Fox : JULY 19, 2014.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Test Organization and Management
Commercial-in-Confidence 1 Managing eBusiness - Operational Challenges of an Online Business Model.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
© Synergetics Portfolio Security Aspecten.
KUALI IDENTITY MANAGEMENT Provides services for Identity and Access Management in Kuali Integrated Reference Implementations User Interfaces An “integration.
March 2014 Basic Content Management Tuffolo Group Perspective TUFFOLO.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
EdReNe, 2nd Strategic Seminar (Lisbon, June 2008) (c) 2008, Daniel Weiler, Centre of Technology of Education Luxembourg’s Educational Portal Enabling Connected.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
7 th FIM 4 R meeting April 2014 ESRIN Frascati.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
National Information Exchange Model (NIEM) Executive Introduction November 29, 2006 Thomas O’Reilly NIEM Program Management Office.
Imagining a Community Source Student Services System Leo Fernig Richard Spencer SOA Workshop Vancouver March 24, 2006.
KIM: Kuali Abstraction Layer for Identities, Groups, Roles, and Permissions.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
Shibboleth for Middle Schools James Burger -
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
DOCUMENT #:GSC15-PLEN-27 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.4 CONTACT(S): Amardeo Sarma, ISG INS Chair Identity & Access Management activities.
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
University of Southern California Identity and Access Management (IAM)
Identity and Access Management
Identity Management (IdM)
Using E-Business Suite Attachments
Overview of MDM Site Hub
Federated IdM Across Heterogeneous Clouding Environment
Tokens & Proofing De-Mystified
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
ESA Single Sign On (SSO) and Federated Identity Management
University of Southern California Identity and Access Management (IAM)
UK Access Management Federation
December 2007 Dave Anderson IT Services
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Sierra Systems itSMF Development Days Presentation March 4 th, 2014 Colin James Assyst Implementation Specialist

Introduction  IT putting more focus on the Business Perspective  Companies putting more emphasis on Service Management  Identity Management becoming more important to support ITSM

Agenda  What is Identify Management (IdM)  Importance of Federation to IdM  IdM Challenges  How IdM Supports ITSM Page 3

What is Identity Management Identity Management (IdM) as a process focuses on granting authorised users the right to use a service, while preventing access to non-authorised users Identity management involves three areas:  The Management of identities  User Authentication  User Services

What is Identity Management Management of Identities Identity Management deals primarily with the people component of the IT environment  Identities represent “The user community” (internal and external)  Identity attributes (Location, Organization, Contact Details, Roles)

What is Identity Management User Authentication  Authentication: Verification that an entity is who/what it claims to be using a password.  Authorization: Managing authorization information that defines what operations an entity can perform in the context of a specific application.  Roles: Roles are groups of operations and/or other roles. Users are granted roles often related to a particular job or job function.

What is Identity Management User Services A system that delivers personalized, role- based, online, on-demand, multimedia (content), presence-based services to users and their devices.  Services provisioned continue to expand  IdM becoming more critical for accessing Services  Services requiring more Identity details

Importance of Federation to IdM Federation brings capabilities to IdM.  It permits the management of identity data within an enterprise  Data that may reside in multiple diverse sources such as network directories, application and management systems.  It also permits management of identities across domains  Facilitates integration between independent parties  Allows responsible groups to retain control of authoritative data sources

IdM Challenges  Federated Integration  Unique Identification of “Identity”  How much information is sufficient  External “Identities”

IdM Challenges Federated Integration  Linking Identities across multiple sources  Establishing “System of Record” (SOR)  SOR exist for entire community?  Complete end to end Identity life cycling  Timeliness of information updates

IdM Challenges Unique Identification of “Identity”  Linking Identities across multiple sources  Internal Keys (GUID) not useful with multiple sources  Name based identification not always static  Staff Id could have “Privacy” implications

IdM Challenges How much information is sufficient  What Information (Location, Organization, /Phone#, Staff Id)  Level of Detail, increases complexity –Location Information need to be “Desk”? –Organization need to be “Project”?  Privacy Considerations

IdM Challenges External “Identities”  Does “SOR” exist for external clients  Level of detail and timeliness of data  Needs to be flexible

IdM Support for ITSM  Access and Authentication  Service Desk  Incident and Problem Management  Change, Release and Configuration Management

IdM Support for ITSM Access and Authentication  Establish “Digital” Identity – Authentication  Establish “Permissions” – Authorization  Establish “Capabilities” - Roles

IdM Support for ITSM Service Desk Consolidated User view to Service Desk  User Entitlement  User Role  Status of Entitled Services  Source of Support Page 16

IdM Support for ITSM Incident and Problem Management  Identity Management information available to Support Technicians  Access to User Asset and Configuration Information  Ancillary information supports root cause analysis

IdM Support for ITSM Change, Release and Configuration Identity Information is especially important in Change Management, Release Management and Configuration Management.  Change Authorizations  Change Notifications  User Provisioning  Standard Configuration Enforcement

Conclusion More focus on “IdM” required to support  IT “Business Perspective”  Companies “Service Management”  Federated “Client” Information  ITSM access to “Client” Information

Questions? Colin James | assyst Implementation Specialist Sierra Systems (C): (T): x 275 (F): Laurier Avenue West, Suite 800 Ottawa, Ontario, K1P 5Z9 Management Consulting | Project Implementation | Managed Services website: