Joe Mandala, KBI CIO. Phase 1 – Network/Application Integration Solution assessment and deployment, IAM discovery (complete) Phase 2/3.1 – IAM Selection.

Slides:



Advertisements
Similar presentations
From Identity and Authentication ‘point solutions’ to SOA and ESB – ‘NZ Gov’ IdM Architectural Thinking: Five Years On.
Advertisements

THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.
Agenda AD to Windows Azure AD Sync Options Federation Architecture
Authentication solutions for Outlook and Office 365 Multi-factor authentication for Office 365 Outlook client futures.
Team: SuperBad Cats MSIT 458 – Dr. Chen Authentication through Password Protection.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
Eric Raff. Usergroup up
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
Insight Consulting Siemens Identity Management Survey Conducted April – June 2007 Info
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
IT can provide users with a common identity across on-premises or cloud- based services, leveraging Windows Server Active Directory and Azure Active.
Authentication via campus single sign-on 2012 VIVO Implementation Fest.
Information Technology Division Executive Office for Administration and Finance Shared Application Infrastructure (SAI) Program Overview.
KCJIS Conference Electronic Dispositions Leslie Moore (785) Kansas Bureau of Investigation June 2015.
Public Key Infrastructure from the Most Trusted Name in e-Security.
What’s New in WatchGuard SSL v3.1. WatchGuard Training 2 Ease-of-Use Security Scalability 1.Streamlined resource configuration 2.Centralized access rules.
U.S. ENVIRONMENTAL PROTECTION AGENCY Reusable Component Services RCS Update Presentation to Enterprise Architecture Team 09/11/2012 John Harman,
SAML-based Delegation in Shibboleth Scott Cantor Internet2/The Ohio State University.
Scenario covered in this presentation Separate credential from on- premises credential Authentication occurs via cloud directory service Does not.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.
Energy Ecosystem Overview David Miller Chief Security Officer.
Office 365 Potential Timeline Vision: Develop strategies and a roadmap to facilitate the migration of multiple on-premise services to Microsoft's SaaS.
Climate Sciences: Use Case and Vision Summary Philip Kershaw CEDA, RAL Space, STFC.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Copyright ©2012 Ping Identity Corporation. All rights reserved.1.
SUNY System Administration Federation Overview Gavin Hogan July 15th, 2009 A work in progress….
Identity Decision Tree Framework Quick Reference Guides.
FSU’s Portal Project Secure Login in Blackboard Jeff Bauer Office of Technology Integration 4/26/2005.
PRESENTATION | OBLIX CORPORATE OVERVIEW Oblix Introduction Securely Managing Business in a Connected World.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
CaGrid 2.0 Security Prototype 1. Goals Prototype some proposed security solutions – Ensure interoperability across programming models – Ensure interoperability.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
DRAFT EDMC Procedural Directives NOAA Environmental Data Management Committee 12/3/2015 1
On the Economic Viability of Network Architectures Roch Guerin, Kartik Hosanagar (University of Pennsylvania) Andrew Odlyzko, Zhi-Li Zhang (University.
Microsoft Office 365 Tenant Options - Project Status Dan Mercer WaTech Chief Technology Officer October 19, 2015watech.wa.gov.
Microsoft Office 365 Tenant Options - Project Status Dan Mercer WaTech Chief Technology Officer October 12, 2015watech.wa.gov.
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
Best Practices in Enterprise IAM Liza Lowery Massey Montana Government IT Conference December 6, 2007.
With ADFS and Azure Active Directory
IAM VISION OUR CREATIVE INSPIRATION IAM STRATEGY & ROADMAP TEAM JUNE 3, 2015.
Federated Wireless Network Authentication Kevin Miller Duke University Internet2 Joint Techs Salt Lake City February, 2005.
Slavko Kukrika MVP Connect Windows 10 to the Cloud – Cloud Join.
8a Certified. About Us  Headquarters in Vienna, VA  Service Disabled Veteran-owned Small Business  SBA 8(a) program participant  Small Disadvantaged.
THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services Identity Management Brief Presentation to.
Connected Identity & the role of the Identity Bus Prabath Siriwardena Director of Security Architecture WSO2.
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
RSA Security Practice January 2010 RSA SecurID Solution Design and Implementation (D&I) Services.
Identity & Access Management Services
Transforming business
Experiences to Date Faculty of Engineering April 2017
Changing the Game – A Vision for Transforming Administrative Services
SAML New Features and Standardization Status
HMA Identity Management Status
Public Key Infrastructure from the Most Trusted Name in e-Security
The Evolution of Secure Two Factor Authentication
Example Use Case for Attribute Authorities and Token Translation Services - the case for eduGAIN Andrea Biancini.
Remedy Integration Strategy Leverage the power of the industry’s leading service management solution via open APIs February 2018.
STR -11 What if Saas tools work together, what would this mean for IBM #engageug.
IT Transformation Strategic Plan and Pilot Project Closure
Presentation transcript:

Joe Mandala, KBI CIO

Phase 1 – Network/Application Integration Solution assessment and deployment, IAM discovery (complete) Phase 2/3.1 – IAM Selection and Deployment, Single Sign-On (SSO) Discovery and Planning (underway) Phase 4/3.2 – RSA alternatives Discovery, SSO Integration/Federation outward Phase 5/3.3 – Application Integration, SSO Integration/Internal Applications and SAML Phase 6 – Leveraging new architecture (secure e- mail/storage, regional/local federation, etc.)

Phase 1 – Not very much of the phase 1 work is visible; mostly nuts-and-bolts work Phase 2/3.1 – KACIS replacement, vision for single- point user management (2015) Phase 4/3.2 – Potential alternative to token, federation, some single-sign-on (2016) Phase 5/3.3 – Application Integration, SSO Integration/Internal Applications and SAML (2017) Phase 6 – Leveraging new architecture (secure e- mail/storage, regional/local federation, etc.) (2018)

Usability Make it easier for KCJIS Users Make it easier to add services Increase Flexibility Multiple methods of access More ways to integrate with KCJIS Increase Options Give agencies more choices in authentication Give agencies more control in developing technology strategies

Joe Mandala Chief Information Officer Kansas Bureau of Investigation (785)