SAP Identity Management 7.2 Implementation

Slides:



Advertisements
Similar presentations
DELIVERING SHAREPOINT AS A SERVICE
Advertisements

Fahri BaturOctober 2013 SAP GRC AC ARA Access Risk Analysis Requirements Gathering Workshop.
ITIL: Service Transition
Agile development By Sam Chamberlain. First a bit of history..
Training of master Trainers Workshop 10 – 15 November 2012 e-Services Design and Delivery Module IIX Emilio Bugli Innocenti.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Chapter 5: Project Scope Management
ECM Project Roles and Responsibilities
Process, Communication, and Certification Padma Venkata
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Network security policy: best practices
Release & Deployment ITIL Version 3
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Business Processes and Workflow How to go from idea to implementation
Margin Management Tool (MMT) Recommended Approach 23-January-2014
Commonwealth of MA - ITIL Implementation Government Technology CTO Conference March 20, 2006 Bethann Pepoli, Deputy CIO.
The Evergreen, Background, Methodology and IT Service Management Model
Supporting tools in an IT Project & Portfolio Management environment Ann Van Belle -
Software Testing Life Cycle
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Bring Your Business into the 21 st Century : Part 1 WasteExpo 2011 Improving Your Financial Management System.
Roles and Responsibilities
University of Michigan MCommunity Project Liz Salley Product Manager, Michigan Administrative Information Services Luke Tracy
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
How To Build a Testing Project 1 Onyx Gabriel Rodriguez.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Petals SAP Point of Sale System M.Tech. Team SE 15 (Saturday) Team 08 5-Apr-2008.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Petals SAP Point of Sale System M.Tech. Team SE 15 (Saturday) Team Aug-2008.
© Mahindra Satyam 2009 Configuration Management QMS Training.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Microsoft Office Project 2003: Selling EPM in your Organization Matt Wilson Business Solutions Specialist LMR Solutions.
The Development of BPR Pertemuan 6 Matakuliah: M0734-Business Process Reenginering Tahun: 2010.
Core Banking Transformation: A Roadmap to a Successful Core Banking Product Implementation - PMI Virtual Library | | © 2008 Kannan S. Ramakrishnan.
Novell Compliance Management Platform Update CMP & CMP Extension for SAP Environments Leo Castro Product Marketing Manager Patrick Gookin.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
44222: Information Systems Development
Installation and Maintenance of Health IT Systems Unit 8a Troubleshooting; Maintenance and Upgrades; and Interaction with Vendors, Developers, and Users.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
ONLINE KNOWLEDGE PRODUCT OF SAP GRC Online | classroom| Corporate Training | certifications | placements| support CONTACT US: MAGNIFIC TRAINING INDIA
Project Life Presented by Chuck Ray, PMP ITS Project Manager.
Patricia Alafaireet Patricia E. Alafaireet, PhD Director of Applied Health Informatics University of Missouri-School of Medicine Department of Health.
ITIL® Service Asset & Configuration Management Foundations Service Transition Thatcher Deane 02/17/2010.
SAP GRC(Governance Risk and Compliance)/SECURITY ONLINE TRAINING  Magnific Name : SAP GRC/SECURITY 24*7 Technical support  faculty : Real time Experience.
Building and Implementing An Identity Management Roadmap John Taylor Manager, IT Security & Service Continuity Phil Hall Security Consultant Apologies.
1 DEPLOYMENT AND OPERATIONS MODULE 23 ECM SPECIALIST COURSE 1 Copyright AIIM.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
SAP MDG (Master Data Governance) online training Online | classroom| Corporate Training | certifications | placements| support CONTACT US: MAGNIFIC TRAINING.
Planning the Digital Transformation Readiness Check for SAP S/4HANA
Review of IT General Controls
ITIL: Service Transition
SAP GRC(Governance Risk and Compliance) online tutorial
ITIL SERVICE LIFECYCLE
ServiceNow Business Offerings
BIM 360 Glue Migration to BIM 360 Account Administration (HQ)
SAP GRC(Governance Risk and Compliance)/SECURITY ONLINE TRAINING UK
SAP Value Assurance plan and safeguard service package for SAP SuccessFactors HCM Suite Business Needs Need to follow leading practices and reduce risk.
Security. Audit. Compliance
SOFT-TECH Enterprises LLC
Project Charter General Information Project Title Date
Lecture # 3 Software Development Project Management
IT and Development support services
Is Cloud Identity Management Ready
What are IAM Key Processes.
BI Tools Service – Framework Design Planning Reporting as a service
Presentation transcript:

SAP Identity Management 7.2 Implementation Road-map SAP Identity Management 7.2 Implementation

Implementation plan index Scope Get to know auditory and stakeholders Plan your time Consider current ITSM environment for implementation Harmonization program for User ID naming Convection Build Connections Testing Train the users Go-live

What is sap identity management? Central management of identities throughout system landscape. Rule-driven workflow and approval process Extensive audit trail, logging and reporting functionality. Governance trough centralized and auditable identity data. Compliance trough integration with SAP Access Control. Compliant and integrated identity management solution to mitigate segregation-of-duties risks. SAP Identity Management SAP applications SAP SCM SAP ERP HCM SAP ERP JAVA SAP HANA Successfactors Non-SAP applications Database E-mail Legacy Web-app OS … SAP Access Control

Identity life-cycle Relationship Start Relationship End Provisioning Routine User Management User Support & Self Service De-provisioning Re-engage Creating accounts Gaining access Relationship Start Relationship End Turn key Remove all access

IDM Connection approach SuccessFactors Integration with SAP Business Suite and Successfactos SAP Identity Management SAP Access Control SAP applications Non-SAP applications SAP ERP HCM Identity virtualization and identity as a service Compliance checks Central identity store Approval workflows Web-based single sing-on and identity federation Reporting Provisioning to SAP and non-SAP systems Password management

1. Scope Build a clear strategy of Identity Management – decide which systems needs to be connected. Vision should cover whole landscape which will deliver the implementation of SAP Netweaver Identity Management. Include into your strategy which and when those systems needs to be included. Strategy should include as a key point SAP GRC Access Control and SAP Single Sign- On Integration. Present the vision and strategy to top management. Project Sign-off.

2. Get to know auditory and stakeholders Get to know which people, from which parts of company needs to be involved in the project. Early stakeholders involvement. All stakeholders have to be involved in project planning to be aware and to sign before the implementation starts. Adjust the system and project to business processes and prepare to roll out to the organization.

3. Plan your time Be sure that you have enough of resources and people have right skill-set. Consider your budget, that you have to pay for each phase. How long will it take to reach each phases in your implementation. Consider buffer in your estimations. Plan your time in order to current ITIL environment

4. Itsm environment Use change management tool for each scope phase and changes within Consider that some change requests will take more time than the other. Make sure that you will prioritize using standard connectors. Custom connectors will take more effort and time. Be sure to take the right approach from change management perspective. Identity Management is a powerful toolbox, which is able to provide a lot – but not everything.

5. Harmonization program for User ID naming convention Define and implement consistent user ID naming convention throughout all systems. Consider SAP HCM, Active Directory, SAP, OIM Create mapping table for each of a system Define master system for creating ID’s (master attributes) Ensure that you will get high quality data from the master system

6. build At this point all business processes should be clear and well known to the implementer. Define and create accordingly User Interfaces (like Password reset tool, Security team project tools, user management tools). According to business processes define which users should maintain which attributes. Creating first build of IDM system design. Due to requirements create reporting functionalities.

7. Connections Creating technical design for attribute mapping between various systems which are in scope. Adding and creating connections between IDM and scope systems. Testing the connection. Do notification extensions for UI workflows. Testing build version in order to current connections/business processes.

8. Testing The most important part is to test standard connectors (the ones which will be used most frequently). Try to reduce the customization of enhanced framework. Involve Security team in functionality testing. Get a proper sign-off for this phase.

9. Train the users First training needs to be delivered for 2 members of IDM administrators who will be able for solution handover. Deliver a training for each of member of Security team. Make sure that they are able to use all functionality and tools that IDM provides. World-wide training for end users. Make sure that everything is documented. Good documentation for end users will reduce the number of incoming incidents significantly.

10. go-live Don’t start go-live with a big bang. Divide go-live in 3 groups and 3 phases. Go-live for IDM team members. Phase where all systems in scope and stakeholders of those systems are aware that you are live in current solution. Go- live should take about a week. Go-live for Security team members. Phase where all functionalities for Security team are being used for project related actions, daily basis management. This go-live is mainly for hyper-care reasons. Main go-live for Sec. Team and all end users. Main hyper-care takes about 6 months.