IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

Whos the Architect? Credential Provisioning Network Access Directory Services Authentication, Authorization and Accounting Federation Single.
An Overview of the Federal Segment Architecture Methodology
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Excellence in Service and Programming Writing Group: Kim Arrendell, Lisa Blazer, Eric Cooper, Andrew Haring, Anne Jimenez, Jennifer Lilly, Bob Miller,
Engineering Leadership
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
The Changing Face of Higher Ed and the Role of IT as a Strategic Enabler Dave Wallace Chief Information Officer University of Waterloo December 4, 2012.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
© 2012 Autodesk BIM Collaboration Siva Koppula Technical Consultant.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
International City/County Management Association, 2001 September 23, 2001 Develop new models of how things work. Reinvent service delivery from the customer.
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
© 2006 Carnegie Mellon University Establishing a Network Centric Capability: Implications for Acquisition and Engineering Dennis Smith Complex System Symposium.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Enterprise Architecture The Arkansas Approach. Key Areas What is enterprise architecture? Why is it important? How you can participate Current status.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
The Executive’s Guide to Strategic C H A N G E Leadership.
Identity Management, what does it solve By Gautham Mudra.
Office of Information Technology (OIT) PROJECT INITIATION DOCUMENTS - BUSINESS CASE, ALTERNATIVE ANALYSIS AND STATEMENT OF WORK (SOW)
Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management.
Getting Smarter with Information An Information Agenda Approach
Identity and Access Management Business Ready Security Solutions.
Project Management COE Helen Schmitz, Chief IT Architect (Acting)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Identity and Access Management PM COP Forum May 20, 2014Tuesday10100 AMLamont Library.
Information Technology Master Plan
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Roles and Responsibilities
Ministry of Transport, Information Technology and Communications
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
NIEM Domain Awareness June 2011 Establishing a Domain within NIEM.
COMPDIRS NATHAN DORS APRIL 16, AGENDA  IAM – who we are, what we do  HRP Modernization & Workday  What’s new in IAM?  Identity.UW soft.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Windows Server ® 2008 R2 Remote Desktop Services Infrastructure Planning and Design Published: November 2009.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
Assessing the influence on processes when evolving the software architecture By Larsson S, Wall A, Wallin P Parul Patel.
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
University of Washington Identity and Access Management IEEAF – RENU Network Design Workshop Seattle - 29 Nov 2007 Lori Stevens, Director, Distributed.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
Microsoft ® Forefront ™ Identity Manager 2010 Infrastructure Planning and Design Published: June 2010.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1. You Are Making A Difference World Finance: Companies Cope with Declining Dollar Feb 13 th, 2008 Australia Braces For Rate Increases To Curb Inflation.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
b2access.eudat.eu B2ACCESS The simple and secure authorisation and authentication platform of EUDAT This work is licensed under the Creative.
IAM VISION OUR CREATIVE INSPIRATION IAM STRATEGY & ROADMAP TEAM JUNE 3, 2015.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
Long Range Technology Plan, Student Device Standards Secondary Device Recommendation.
Managing Enterprise Architecture
IT Strategic Plan Project Consultation with Web Advisory Committee 19 December 2012.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
W3C eGovernment TPAC 2010 This is just a generic slide set. Should be adapted, reviewed, possibly with slides removed, for a specific event. Rule of thumb:
Identity & Access Management Services
Update from the Faster Payments Task Force
Data and Applications Security Developments and Directions
Future Ideas: Federation and Integration
V6.2 Draft uWaterloo IT Community Together, we Enable
Harvard CRM Service Strategy
ESA Single Sign On (SSO) and Federated Identity Management
Introduction to Enterprise Architecture
Replace with Application Image
The Path to IAM Maturity
Baseline Expectations for Trust in Federation
Azure AD Simon May Technical Evangelist.
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015

AGENDA  What is IAM?  Vision & mission  Evolution: the why behind “bricks”  Practice: making “bricks”  Discussion, reflection, etc. TOPICS DISCUSSED

WHAT IS IAM? “Identity and access management is a security, risk management, and business discipline that ensures the right individuals have the right access to the right resources at the right time for the right reasons.” (Source: Gartner, Inc.) DEFINITION

WHAT IS IAM? A team? At the UW, IAM is an organizational unit with these responsibilities: Identity registration & administration Account & password management Access management Authentication & Authorization Non-person identity management Federation & trust

WHAT IS IAM? A set of services. We offer these IAM services through the central IT service catalog: UW NetID Access Management Authentication Directory Services UW Windows Infrastructure

WHAT IS IAM? A set of capabilities. The essential work of our IAM team is coordinating these IAM processes and activities with our diverse customers and stakeholders.

IDENTITY REGISTRATION & ADMINISTRATION “Help me register people affiliated with the university to participate in online activities.” CUSTOMER ASKS:

ACCOUNT & CREDENTIAL MANAGEMENT “Give me and my users trustworthy identification to use online.” CUSTOMER ASKS:

ACCESS GOVERNANCE & ADMINISTRATION “Help me manage how I enable and disable access to my resources.” CUSTOMER ASKS:

PROVISIONING & INTEGRATION “Help me integrate with identity services and orchestrate processes to provision data and access.” CUSTOMER ASKS:

ACCESS CONTROL “Help me authenticate and authorize users as they access my resources and make online transactions.” CUSTOMER ASKS:

REPORTING & ANALYTICS “Give me reports and activity data I can analyze to make decisions and manage risk.” CUSTOMER ASKS:

IAM VISION “Trusted online identities enriched with the attributes of the UW.” INSPIRES OUR WORK & CREATIVITY

IAM MISSION “To help our community apply IAM solutions in ways that promote trust, privacy, collaboration, and innovation in research and education.” GIVES OUR WORK PURPOSE & DIRECTION

REFERENCE ARCHITECURES  Help us manage complexity in an evolving ecosystem  Help us develop situational awareness  Help us provide guidance  Help us communicate consistently  Help us identify costs of decisions PURPOSE

IAM REFERENCE BRICKS A “brick” describes the status of technical standards, protocols, service options, and other technologies used for identity and access management (IAM) within the IT environment at the University of Washington. PURPOSE

IAM REFERENCE BRICKS Each “brick” focuses on a set of IAM technologies from the same functional area and uses the same set of designations to describe the lifecycle status of individual options coming into or exiting from the environment. WHAT

IAM REFERENCE BRICKS Each “brick” focuses on a set of IAM technologies from the same functional area and uses the same set of designations to describe the lifecycle status of individual options coming into or exiting from the environment. WHAT

BRICKS TEMPLATE The template describes the designations used within a brick to categorize technology options according lifecycle status, related customer risk, investment levels, support, adoption, etc. HOW

BRICKS TEMPLATE HOW

BRICKS PRACTICE

BRICKS PRACTICE: STRATEGY MAP

BRICKS TEMPLATE HOW, CONT.

BRICKS PRACTICE