SlideShare a Scribd company logo
Integrating Novell Access Governance
                                   ®



Suite with Novell Identity Manager


Steve Lewis
Identity Compliance Specialist
Novell, Inc. /slewis1@novell.com
Agenda

              Access Governance Suite Overview
                    –   Certification Manager
                    –   Role Manager
              Roles Based Provisioning Manager Overview
                    –   The 3 R's of Provisioning
              Access Governance Suite/ Roles Based Provisioning
              Module Integration
              Demo




2   © Novell, Inc. All rights reserved.
Access Governance Suite
                Overview
Novell Access Governance Suite
                            ®


    (AGS)

                                           Business-driven
                                accountability, visibility and certification


                                                                      Compliance
                                                                      Certification
                                                                       Manager




     Roles Lifecycle
        Manager




4   © Novell, Inc. All rights reserved.
Effective Governance of Access
    Requires a Dynamic, Ongoing Process

                                                            Regular Review and
                 Analytics for                              Certification of User
                 Decision Support                           Access



                                                                    Change Management
                                                                    for User Access
           Discovery and
           Collection of
           User Access
           Information

                                                                  Orchestration of
                                                                  Controls to Remediate
                                                                  Inappropriate Access
                                          Role Design and
                                          Maintenance



5   © Novell, Inc. All rights reserved.
Novell Access Governance Suite
                            ®


    Enabling Access Certification

    •   Business-oriented certification process
         –   Provides business context with insightful analytics
         –   Highly personalized business dashboards
    •   Continuous, business-event-driven, or cyclical
        frequency
    •   Process to initiate remediation of inappropriate access
    •   Auditable evidence of access compliance




6   © Novell, Inc. All rights reserved.
Novell Access Governance Suite
                            ®


    Delivering Role Lifecycle Management

    •   Effective, flexible model for defining enterprise roles
         –   Role discovery, business role modeling and change
             management (top-down and bottom-up)
         –   Mapping of business roles to IT roles
         –   Collaborative review, design and approval of roles
    •   Continuous process for role lifecycle management
         –   Analytics provide insightful decision support information
    •   Roles capability and comprehensive reporting provide
        sustainable compliance



7   © Novell, Inc. All rights reserved.
Role Based Positioning Module (RBPM)
                             Overview
A Balanced Approach to Provisioning
    Novell provides:
                ®
                                                           Role Based
    Easiest to define and maintain
    Most integrated governance                             Provisioning
    Integrated monitoring
    Least expensive                                     Heavy implementation
    Most coverage                                       and maintenance effort



                                                     Optimum effectiveness
                                                         and efficiency


                                              Rules-based              Request-based
                                              Provisioning              Provisioning
                                          Difficulty in Governance   Operational Nightmare




      An integrated provisioning approach usually provides the best all-around
                    results for security, efficiency and flexibility
9   © Novell, Inc. All rights reserved.
Roles Based Provisioning Module
     (RBPM)

     •   Roles Module for Novell Identity Manager (IDM)
                                                ®




          –   An RBAC/Compliance solution, nicely integrated with Novell's
              product line, and open to accommodating
              specialized/custom/best-of-breed solutions
          –   Addresses the most common customer use cases:
               >   Role-based assignment of resources and permissions
               >   Runtime enforcement of compliance rules, including separation of duties
                   (SoD)
               >   Management of the compliance process (reporting, review of authorizations,
                   re certification business process, etc.)




10   © Novell, Inc. All rights reserved.
Integrated Roles Infrastructure

     •   Built into the infrastructure of the Novell Identity and       ®



         Security product line
          –   Role objects located within the Identity Vault
               >   available to be leveraged across the product line and beyond
          –   Accessible via the Identity Manager User Application portal and
              iManager
               >   administration and end-user interfaces are already familiar
          –   Leverages the Identity Manager approval workflow system
               >   unified method of requesting and re-certifying resources
          –   Ties into Identity Manager event system and services
               >   immediate policy enforcement




11   © Novell, Inc. All rights reserved.
IDM/RBPM and AGS Integration
Integration

     •   Role Engineering
          –   Collect Roles from RBPM/IDM
          –   Collect Entitlements from RBPM/IDM
          –   Model Roles with RBPM/IDM entitlements
          –   Publish Roles with RBPM/IDM entitlements to AGS
          –   Use Roles for Provisioning and De-provisioning
     •   Certification Reviews
          –   Revocation of Role memberships in AGS will flow to RBPM
          –   All entitlements associated with the Roles will be
              De-provisioned



13   © Novell, Inc. All rights reserved.
Demo
Integrating Novell Access Governance Suite with Novell Identity Manager
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

More Related Content

PDF
Конфигурация и соответствие: две половины единого целого.
PPTX
Become A Best Run Inecom Client - Remote Services Platform
PDF
BMC - Automation
PDF
What's New in Novell Identity Manager 4.0
PDF
All That Jazz
PDF
JBoss Health Check
PDF
IT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
PDF
[Salta] IBM PureSystems - Sebastián Manassero
Конфигурация и соответствие: две половины единого целого.
Become A Best Run Inecom Client - Remote Services Platform
BMC - Automation
What's New in Novell Identity Manager 4.0
All That Jazz
JBoss Health Check
IT and Business Alignment - Mapping the Physical, Virtual and Business Worlds
[Salta] IBM PureSystems - Sebastián Manassero

What's hot (20)

PPTX
PS Spectrum
PDF
Requirements Management Office - Strata
PDF
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
PDF
Moving Beyond Project Level SOA
PDF
BSM201.pdf
PPTX
Astute @ Quest Midwest Conference 2011 - At A CrossRoads with PeopleSoft
PPTX
TrueMBO Demo
PDF
S-CUBE LP: Online Testing for Proactive Adaptation
PDF
An approach to extract the business value from soa services
PDF
Linkroad Corporate Snapshot
PDF
Defining and Evaluating the Usability of CMS - Saurabh Kudesia
PDF
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
PPTX
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
PPTX
Introducing syspro (shareslide)
PDF
Flevy.com - Feasibility Study Template for Electronic Software Distribution
PDF
Checking the health of your active directory enviornment
PDF
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
PDF
Az Managed Exchange Services(1)
PDF
GForce2011 Brochure
PPTX
Astute Business Solutions - Fast Track Impact Analysis for PeopleSoft 9.2 Upg...
PS Spectrum
Requirements Management Office - Strata
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
Moving Beyond Project Level SOA
BSM201.pdf
Astute @ Quest Midwest Conference 2011 - At A CrossRoads with PeopleSoft
TrueMBO Demo
S-CUBE LP: Online Testing for Proactive Adaptation
An approach to extract the business value from soa services
Linkroad Corporate Snapshot
Defining and Evaluating the Usability of CMS - Saurabh Kudesia
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
Introducing syspro (shareslide)
Flevy.com - Feasibility Study Template for Electronic Software Distribution
Checking the health of your active directory enviornment
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Az Managed Exchange Services(1)
GForce2011 Brochure
Astute Business Solutions - Fast Track Impact Analysis for PeopleSoft 9.2 Upg...
Ad

Similar to Integrating Novell Access Governance Suite with Novell Identity Manager (20)

PDF
Overview of Identity and Access Management Product Line
PDF
Implementing Process Controls and Risk Management with Novell Compliance Mana...
PDF
Implementing Process Controls and Risk Management with Novell Compliance Mana...
PPTX
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
PDF
An Identity-focused Approach to Compliance
PDF
An Identity-focused Approach to Compliance
PDF
Novell Tour Europe and South Africa 2012
PDF
Novell Access Governance Suite
PDF
Implementing and Proving Compliance Tactics with Novell Compliance Management...
PDF
Business Service Management Made Easy!
PDF
Applying Novell Identity Manager to Your Everyday Problems
PDF
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
PDF
OIA administration
PDF
The Novell Collaboration Strategy
PDF
IDC Says, Don't Move To The Cloud
PDF
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
PDF
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
PPTX
SANS Institute Product Review of Oracle Identity Manager
PDF
Rules, Rules, Rules: Proactively Automate Management of the Service Infrastru...
PDF
Aberdeen ppt-iam integrated-db-06 20120412
Overview of Identity and Access Management Product Line
Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
An Identity-focused Approach to Compliance
An Identity-focused Approach to Compliance
Novell Tour Europe and South Africa 2012
Novell Access Governance Suite
Implementing and Proving Compliance Tactics with Novell Compliance Management...
Business Service Management Made Easy!
Applying Novell Identity Manager to Your Everyday Problems
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
OIA administration
The Novell Collaboration Strategy
IDC Says, Don't Move To The Cloud
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
SANS Institute Product Review of Oracle Identity Manager
Rules, Rules, Rules: Proactively Automate Management of the Service Infrastru...
Aberdeen ppt-iam integrated-db-06 20120412
Ad

More from Novell (20)

PDF
Filr white paper
PDF
Social media class 4 v2
PDF
Social media class 3
PDF
Social media class 2
PDF
Social media class 1
PDF
Social media class 2 v2
PDF
LinkedIn training presentation
PDF
Twitter training presentation
PDF
Getting started with social media
PDF
Strategies for sharing and commenting in social media
PPT
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
PPT
Workload iq final
PDF
The Identity-infused Enterprise
PDF
Shining the Enterprise Light on Shades of Social
PDF
Accelerate to the Cloud
PDF
The New Business Value of Today’s Collaboration Trends
PDF
Preventing The Next Data Breach Through Log Management
PDF
Iaas for a demanding business
PDF
Workload IQ: A Differentiated Approach
PDF
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Filr white paper
Social media class 4 v2
Social media class 3
Social media class 2
Social media class 1
Social media class 2 v2
LinkedIn training presentation
Twitter training presentation
Getting started with social media
Strategies for sharing and commenting in social media
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Workload iq final
The Identity-infused Enterprise
Shining the Enterprise Light on Shades of Social
Accelerate to the Cloud
The New Business Value of Today’s Collaboration Trends
Preventing The Next Data Breach Through Log Management
Iaas for a demanding business
Workload IQ: A Differentiated Approach
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...

Integrating Novell Access Governance Suite with Novell Identity Manager

  • 1. Integrating Novell Access Governance ® Suite with Novell Identity Manager Steve Lewis Identity Compliance Specialist Novell, Inc. /slewis1@novell.com
  • 2. Agenda Access Governance Suite Overview – Certification Manager – Role Manager Roles Based Provisioning Manager Overview – The 3 R's of Provisioning Access Governance Suite/ Roles Based Provisioning Module Integration Demo 2 © Novell, Inc. All rights reserved.
  • 4. Novell Access Governance Suite ® (AGS) Business-driven accountability, visibility and certification Compliance Certification Manager Roles Lifecycle Manager 4 © Novell, Inc. All rights reserved.
  • 5. Effective Governance of Access Requires a Dynamic, Ongoing Process Regular Review and Analytics for Certification of User Decision Support Access Change Management for User Access Discovery and Collection of User Access Information Orchestration of Controls to Remediate Inappropriate Access Role Design and Maintenance 5 © Novell, Inc. All rights reserved.
  • 6. Novell Access Governance Suite ® Enabling Access Certification • Business-oriented certification process – Provides business context with insightful analytics – Highly personalized business dashboards • Continuous, business-event-driven, or cyclical frequency • Process to initiate remediation of inappropriate access • Auditable evidence of access compliance 6 © Novell, Inc. All rights reserved.
  • 7. Novell Access Governance Suite ® Delivering Role Lifecycle Management • Effective, flexible model for defining enterprise roles – Role discovery, business role modeling and change management (top-down and bottom-up) – Mapping of business roles to IT roles – Collaborative review, design and approval of roles • Continuous process for role lifecycle management – Analytics provide insightful decision support information • Roles capability and comprehensive reporting provide sustainable compliance 7 © Novell, Inc. All rights reserved.
  • 8. Role Based Positioning Module (RBPM) Overview
  • 9. A Balanced Approach to Provisioning Novell provides: ® Role Based Easiest to define and maintain Most integrated governance Provisioning Integrated monitoring Least expensive Heavy implementation Most coverage and maintenance effort Optimum effectiveness and efficiency Rules-based Request-based Provisioning Provisioning Difficulty in Governance Operational Nightmare An integrated provisioning approach usually provides the best all-around results for security, efficiency and flexibility 9 © Novell, Inc. All rights reserved.
  • 10. Roles Based Provisioning Module (RBPM) • Roles Module for Novell Identity Manager (IDM) ® – An RBAC/Compliance solution, nicely integrated with Novell's product line, and open to accommodating specialized/custom/best-of-breed solutions – Addresses the most common customer use cases: > Role-based assignment of resources and permissions > Runtime enforcement of compliance rules, including separation of duties (SoD) > Management of the compliance process (reporting, review of authorizations, re certification business process, etc.) 10 © Novell, Inc. All rights reserved.
  • 11. Integrated Roles Infrastructure • Built into the infrastructure of the Novell Identity and ® Security product line – Role objects located within the Identity Vault > available to be leveraged across the product line and beyond – Accessible via the Identity Manager User Application portal and iManager > administration and end-user interfaces are already familiar – Leverages the Identity Manager approval workflow system > unified method of requesting and re-certifying resources – Ties into Identity Manager event system and services > immediate policy enforcement 11 © Novell, Inc. All rights reserved.
  • 12. IDM/RBPM and AGS Integration
  • 13. Integration • Role Engineering – Collect Roles from RBPM/IDM – Collect Entitlements from RBPM/IDM – Model Roles with RBPM/IDM entitlements – Publish Roles with RBPM/IDM entitlements to AGS – Use Roles for Provisioning and De-provisioning • Certification Reviews – Revocation of Role memberships in AGS will flow to RBPM – All entitlements associated with the Roles will be De-provisioned 13 © Novell, Inc. All rights reserved.
  • 14. Demo
  • 16. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.