Understanding ADAM Version 2.0 ADAM Training Session.

Slides:



Advertisements
Similar presentations
Michigan Electronic Grants System Plus
Advertisements

Copyright © 2006 Help Desk Systems, Inc. All rights reserved. Overview of Help Desk Systems Inc. (HDSI) HDSI offers a hosted, web based trouble ticket.
EAuthentication Before accessing the Delphi eInvoicing System, you must be an authenticated user. This authentication process is called eAuthentication.
Working with Delegations Version 2.0 ADAM Training Session.
CareCentrix Direct Training.
SAJAYA ® PARTNERSHIP… PARTNERING FOR SUCCESS. SAJAYA ® APPLICATIONS... SAJAYA ® is a new era in the world of software applications targeted for the Middle.
SESSION TWO SECURITY AND GROUP PERMISSIONS Security and Group Permissions.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Online Submission and Management Information -- Authors
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
07/15/2007 eCAF SAA User Guide Slide 1 SAA User Guide for eCAF.
Online Reading Lists at Loughborough University Gary Brewerton, Library Systems Manager.
Electronic Status Reporting for Lenders FSA Guaranteed Loan System.
ViewTrip White Label Sales Presentation. What is ViewTrip White Label? >ViewTrip White Label is a version of our web based ViewTrip product that enables.
Understanding E-Agreements Version 2.0 ADAM Training Session.
Manager Desktop & Supervisor ID UL Meeting December 15, 2006.
Online Access Request Process June 20, 2007 University of Michigan Administrative Information Services Online Access Request Process Amie Robison Presented.
1 Introduction to OBIEE: Learning to Access, Navigate, and Find Data in the SWIFT Data Warehouse Lesson 2: Logging in and out of OBIEE This course, Introduction.
EmpowHR EmpowHR Security Overview. 2 Application Security Administration Permission List Roles User Profiles Row level security Distributed Security Administration.
FMMI Overview October 2014.
California Assessment of Student Performance and Progress (CAASPP) Online Reporting System Guidelines for the 2014 California Smarter Balanced Field Test.
Welcome to the Minnesota SharePoint User Group. Introductions / Overview Project Tracking / Management / Collaboration via SharePoint Multiple Audiences.
Lieberman Software Random Password Manager & Workflow Delegation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ONLINE TECHNICAL REPORT SYSTEM Team Crash Course Ryan Ashe, Eileen Balci, James Kirk, Taylor Paschal.
Trimble Connected Community
NAMS Account Activation Training. 2 What is NAMS? The NASA Account Management System is NASA’s centralized process for requesting and maintaining accounts.
Classroom User Training June 29, 2005 Presented by:
SakhiCertifier Aim big, Achieve higher.
ILearnNYC Platform Session Objectives Provide an understanding of overall platform components, how they fit together and associated timelines Explain.
Jeff Shiley. Start Point System Environment User Experience Our “Unique” Requirements Solution System Evaluation & Prototype Single Sign-on Component.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
Division of AIDS Data Interchange. Division of AIDS Data Interchange Agenda.
Security Planning and Administrative Delegation Lesson 6.
Council of Research Associate Deans January 20, 2011.
AESuniversity Read Only Permissions. Permission Setup What is Read Only Permission? Using Organization consent levels vs. Group consent levels How to.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
FQHC Look-Alike Registration for Implementation of Electronic Information Systems June 16, 2010 Twyla Adams, MHS, Branch Chief Anil Bommakanti, Consultant.
Institutional Considerations
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
RAILINC I ACACSO
MSA Science Online Testing MAG Conference November 16, 2006.
National Oceanic and Atmospheric Administration Grants Online Grantee Roll-out Conference Call.
Working with Authorizations Version 2.0 ADAM Training Session.
The Nuts and Bolts of OTISS Brian Swiger Operations Consultant & OTISS Administrator.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Division of AIDS Data Interchange DAIDS Adverse Experience Reporting System (DAERS) New User Introductory Training Teleconferencing Details: US Toll Free:
Introduction to Clear Path: School Admin 1 Welcome to Clear Path! Your school has elected to use the Clear Path resiliency assessments to measure the.
HR Information System Upgrade ONLINE ENGAGEMENT & ONBOARDING.
Kate Herron – Research Development & Training Specialist Bonnie Wright – Psychology Dept. Grants Specialist Team Leader Trey Bauer – Sponsored Research.
FDOT Database Training #2 May 3, 2010 Presented by Erica Hughes & Michael Faraone Bridge Software Institute University of Florida.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
Entrepreneurial Competences for School Leadership Teams Bucharest 4 th March 2015.
OAKS Online Last updated: 08/20/09. Oaks Online Understand the role and purpose of OAKS in supporting student success and achievement. Use the OAKS Online.
HRMS Implementation Project HRMS Security Overview Module.
How EPA/ORD Moved to Drupal 7 Jessica Dearie U.S. EPA, Office of Research and Development Office of Science Information Management.
Copyright © 2010 Pearson Education, inc. or its affiliates. All rights reserved. Texas Assessment Management System.
HIOS Portal Release Issuer Training.  Provide an Overview of HIOS Portal Release 20 Enhancements  Outline CMS Portal UI Changes  Provide an Overview.
Capture This! PO105 James Green. Table of Contents Capture Overview Laserfiche Tools Case Scenarios Questions and Answers.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Oracle Pricing Security Information Age Applications Elizabeth M. Sousa Sr Solution Consultant Oracle Applications.
CollegeSource Security Application &
Welcome! To the ETS – Create Client Account & Maintenance
Testing Irregularities Web Application System (TIWAS)
Smart Net Total Care (SNTC) Deployment
Registration and Role Request for DAAs
“All About Me” Staff Development Day
OAKS Online Last updated: 08/20/09.
New Users Guide to NetDMR
Presentation transcript:

Understanding ADAM Version 2.0 ADAM Training Session

2.2 What is ADAM? Authority Delegation and Management (ADAM) MoFR web-based application Enables granting & managing of application access  Delegation of user access administration to select individuals  Efficient authorization of End Users for any MoFR web-based (Web-ADE) application

2.3 Authorization vs. Authentication Adam does NOT manage authentication Authentication is the process of determining you are who you say you are  Performed by authenticating source (IDIR or BCeID) ADAM does manage authorizations Authorizations are the functions a user can perform in an application  For example run reports, enter data, etc.

2.4 Why Implement ADAM? Before ADAMWith ADAM Custodian must submit one or more web forms which generate s to central agency. Delegated personnel (gov or no-gov) can grant application access to users (whom have a BCeID or IDIR ID). End user access available instantly. Users may require separate BCeIDs for each client on whose behalf they conduct business. Multiple BCeID User IDs not required. Difficult to determine who has access to a specific application. Application Admin. and Authorization Grantors can easily determine who can access applications. Technical staff responsible for granting access to applications. MoFR burdened with assoc. liabilities. Application Admin. can delegate granting capability. Electronic Agreements can be put in place.

2.5 Linking WebADE & ADAM WebADE is a framework  Allows the implementation of authorizations for enterprise level applications ADAM is the interface  User friendly interface to grant & manage application authorization  Distribution of authorization management to appropriate representatives The Web Application is responsible for implementing the Authorization (i.e. asking the right questions). ADAM is the management tool of the authorization.

2.6 Who Uses ADAM? ADAM is role specific You must have one of five “roles” to use ADAM:  ADAM Administrator  Application Administrator  Authorization Grantor  End User  Help Desk

2.7 ADAM Overview

2.8 Know the Structure

2.9 Finding Your Role in ADAM Key PersonnelADAM Roles Ministry Security ArchitectADAM Administrator Data CustodiansApplication Administrator Authorization Grantor Ministry/Org Unit Application Representatives Authorization Grantor Client Application RepresentativesAuthorization Grantor Application UsersEnd User Ministry BCeID Consultant Business Application Support Staff Help Desk

2.10 Terminology Delegation  The act of giving an appropriate representative the ability to manage user access to applications Authorization  The ability to perform specific actions within an application Organization  An organizational unit/company/community group/public institution/discrete entity/etc.

2.11 Terminology (cont.) Profile: Refers to one or more “Application Roles” Typically reflects a business function, rather than a specific application function Profiles can be associated with an organization Profiles can span applications  Note: This capability is available but implementation is still under consideration

2.12 Understanding the Profile/Org Link If a profile is not secured by organization then:  Application Administrators & Authorization Grantors can NOT select an organization during delegations/authorizations  End Users have access to the application based on the profile

2.13 Understanding the Profile/Org Link (cont.) If a profile is secured by organization then: Application Administrators may:  Select a specific organization for a delegation Auth Grantor can then authorize the profile for the specified organization End Users have access to the application based on the profile and on behalf of the organization

2.14 Understand Organizational Security

2.15 User Access Process

2.16 Organization Access Process

2.17 Demo Demonstration of:  ADAM Home Page  Online Help Guide Next Presentation: Working with Delegations