SlideShare a Scribd company logo
IDM/IAM
  Identity & Access
    Management




    Tell me and I’ll forget
                                    Sigal Russin ,
Show me and I may remember       VP & Senior Analyst
Involve me and I’ll understand
Is it identity?




                                                                                                                      2
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Identity and Access Management
       Access                                          Identity                                                          Directory
       Control                                       Administration                                                      Services
 Strong Authentication                          Identity & Organization
    & Authorization                                     Lifecycle                                                       Virtualization
  Risk Based Access                                 Administration
         Control                                  Enterprise Role Mng                                               Synchronization
     Single Sign-On                                 Provisioning &
       Federation                                   Reconciliation                                                            Storage
 Web Services Security                          Compliance Automation

                                            Audit & Compliance
Audit Data     Attestation                    Fraud Detection                            Segregation of Duties                      Controls

                                                       Management
             Service Levels Risk Analysis Forensics Configuration
                            Performance Automation

                                                                                                                                          3
              Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Where to start ?!




                                                                                                                      4
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Explosion of IDs

# of                                                                                                             Business                Partners
Digital IDs                                                                                                      Automation              (B2B)
                                                                                              Company
                                                                                              (B2E)


                                                                                                                                              Customers
                                                                                                                                              (B2C)

                                                                                                                              Mobility


                                                                                    Internet


                                        Client Server

              Mainframe



              Pre 1980’s                          1980’s                            1990’s                          2000’s          Time
                                                                                                                                                    5
              Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
“Identity Chaos”



                    Lots of users                                   Multiple
                    and systems                                   repositories
                     required to                                   of identity
                    do business                                  information;


                  Decentralized
                                                                Multiple user
                  management
                                                                IDs, multiple
                  , ad hoc data
                                                                 passwords
                     sharing



                                                                                                                      6
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
IDM – Identity Management




                                                                                                                      7
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
5 Core Elements of ID Management




                                                                     Federated
                                                                      Identity



                                                                                                                      8
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
5 Core Elements of ID Management




                                                                                                                      9
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
5 Core Elements of ID Management




                                                                                                                      10
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
What’s next…




                                                                                                                      11
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Before Implementing Access Management




                                                                                                                      12
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
After Implementing Access Management




                                                                                                                      13
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Trends Impacting IAM and privacy management sectors


Tactical identity
• IAM projects will generally be limited in scope and schedule to
  help ensure success.

Identity assurance
• Demands for stronger authentication and more mature
  identity provider infrastructures will raised.
• You need to know which providers you are trusting, why, and
  for what.



                               Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London
                                                                                                                              14
        Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Trends Impacting IAM and privacy management sectors


The identity bridge
• A new architectural component is needed to manage the flow
  of identity information between cooperating organizations.
• The edge of the organization is to look inward and outward
  simultaneously.
Authorization
• It will grow more complex and more urgent due to continuing
  regulatory pressure.
• Authorization will assume a place as a first-class business
  function.

                               Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London                         15
        Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Trends Impacting IAM and privacy management sectors


The sea of tokens
• The new tokens-and-transformers architecture is more
  modular, more flexible and more loosely coupled.
Policy battles
• Privacy and identity theft are having a serious impact on
  business operations and viability.
• The business community, law enforcement and national
  security communities will continue to fight over identification,
  privacy laws and regulations.


                               Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London                         16
        Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Identity Management Market

Overlap without integration causes consternation and cost
  Around 60 vendors in IDM


              Directory                        Authentication
                                                         Password Management

            Access Management
                                                               Provisioning
                                                                                                     Meta-directory
        Appliances
                                            Virtual Directory


                                                                                                                              17
        Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
IAM's Biggest Concerns




       HP Research Report, Security & Risk Management Survey Conducted by Coleman Parkes
       Research, 2012
                                                                                                                      18
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Be Aware - Most of IDM projects failed


    • Allocating human resources for maintenance
1     IDM project

    • Project Leaders: HR with cooperation of IT
2

    • Support from organization's high management
3

    • Sharing and training of all organization
4     departments

                                                                                                                          19
    Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Most of IDM projects failed - Be Aware!


    • Data Cleansing: job definitions include user
5     authorizations


    • Mirroring to organization processes – workflows will
6     maximize ROI


    • If you choose a product make sure about the integration
7     to all organization systems -Learn the product!


    • Step by Step-integration special groups on AD with one
8     organizational system (SAP, billing, CRM etc.)


                                                                                                                          20
    Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Market Overview

Vendor                    Access                 ProvN                Passwd                     Meta                       AuthN
IBM

Novell

Oracle

CA

Microsoft

Netegrity

Oblix

RSA

Entrust

                                                                                                = Partner provided                  21
      Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Identity & Access Management
                                          - Israeli Market Positioning 1Q10-11

                     Estimated Technology
                          Penetration
                                                    Using this
                                                    technolog
                                                        y
                                                       27%
                Evaluating
                                                                                                                                                   IDMIAM
                Not using
Local Support




                   73%                                                                                                                             Player

                                                                                                                                                   Worldwide
                                                                             IBM                                                                   Leader
                                                                 CA                                                                                 Prominent
                                                                             Novell                                                                 WAM Player


                                                    Oracle-Sun
                                            SAP
                         Quest
                  BMC                                                                            This analysis should be used with its
                                                                                                 supporting documents
                Microsoft          Velo (OS)

                                                             Market Presence
                                                                                                                                                        22
                             Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
2012 World Leaders in Cloud Identity Management

                                                                     Market Presence




   Forrester Survey
                                                                                                                           23
     Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Centralize
                                                                    Security
                        Maintain
                                                                                                                 Enforce
                         Control
                                                                                                                  Audit
                        Over Data
                                                                                                                 Policies
                         Assets
                                                                    IDM
                                                                  Benefits
                        Automate
                                                                                                               Enhance
                         Auditing
                                                                                                               Visibility
                       Procedures
                                                                    Detect
                                                                   Security,
                                                                  Regulatory
                                                                                                                            24
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
2013 Will Change Enterprise IDM

    The rise of stateless identity
    ID standards
    Dissolving internal/external
    boundaries
    Identity assurance


   “It’s tough to pull your
   head up from the static
   world of on-premises user
   management to the more
   dynamic world.”
         2013 Planning Guide: Identity and Privacy, by Ian Glazer



                                                                                                                  25
          Sigal Russin’s work Copyright 2012 @STKI Do not remove November 14, 2012graphic or portion of graphic
                                    By UCStrategies Staff source or attribution from any
Recommendations
Organization should translate the business world into project
specification process

    Do not try to fit the IDM system to your organization

        Before starting – define SOW -> Consider alternatives->
        POC for business process

        Organization limits – try to start IDM inside the
        organization

    Matching expectations of project initiators, users and
    decision makers

Marketing the project to show the meanings and painful
problems
                                                                                                                          26
    Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Recommendations
Small steps such as Gradual connection to organization systems,
initial provisioning, role based access control etc.

    Standardization- you don’t need to update the system all
    the time

         Organization password policy can take a part on IDM
         project – SSO on the last stage

         Workflows- pay attention for duplication or conflict in
         organizational identities

    Organizational Tree - reflect the organizational structure in
    HR and IT

Each department has a manager (referant) who responsible for
management permissions to the same department            27
    Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Thank You!




                      Scan Me To Your Contacts:




                                                                                                                      28
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic

More Related Content

PDF
Digital Signatures for use by IDA Relying Parties v102
PDF
Comodo Overview Presentation Read Only
PDF
E12 Sox And Identity Management
PDF
Banking as a Service (download)
PDF
SharePoint as digital service platform
PPTX
Cleverlance Group
PDF
Identity access and privacy in the new hybrid enterprise slides
PDF
E-commerce Technology for Safe money transaction over the net
Digital Signatures for use by IDA Relying Parties v102
Comodo Overview Presentation Read Only
E12 Sox And Identity Management
Banking as a Service (download)
SharePoint as digital service platform
Cleverlance Group
Identity access and privacy in the new hybrid enterprise slides
E-commerce Technology for Safe money transaction over the net

What's hot (10)

PPT
Mobile Convention Amsterdam 2012 - Managing Mobile Chaos
PDF
Lets put the social back into social
PPTX
ASolutionforWomensLawWorkgroup
PPT
Mychurch File Upload
PDF
Visual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
PPT
Ecommerce Chap 08
PDF
GirnarSoft Profile
PDF
Girnar Soft Profile April 2011
PDF
GirnarSoft Profile
PDF
md UI spec demo
Mobile Convention Amsterdam 2012 - Managing Mobile Chaos
Lets put the social back into social
ASolutionforWomensLawWorkgroup
Mychurch File Upload
Visual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
Ecommerce Chap 08
GirnarSoft Profile
Girnar Soft Profile April 2011
GirnarSoft Profile
md UI spec demo
Ad

Viewers also liked (16)

PDF
Introduction to IDM
PPTX
Profitcratie EPISODE 1
PDF
Acera.pdf My Most Memorable Moment In My life
PDF
Common IDM How-To's
PDF
Case study using idm and a web portal as a gateway to the cloud june 2012
PPTX
Dell Password Manager Architecture - Components
PPTX
IAM Cloud
PPTX
Identity Manager OpenSource OpenIDM - introduction
PPTX
IAM Password
PPTX
IDM Introduction
PPTX
Identity Manager Opensource OpenIDM Architecture
PDF
Bài 1 TỔNG QUAN VỀ CÔNG NGHỆ THÔNG TIN
PPTX
Dell Password Manager Introduction
PPTX
Dell Quest TPAM Privileged Access Control
DOCX
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
PDF
Identity and Access Management 101
Introduction to IDM
Profitcratie EPISODE 1
Acera.pdf My Most Memorable Moment In My life
Common IDM How-To's
Case study using idm and a web portal as a gateway to the cloud june 2012
Dell Password Manager Architecture - Components
IAM Cloud
Identity Manager OpenSource OpenIDM - introduction
IAM Password
IDM Introduction
Identity Manager Opensource OpenIDM Architecture
Bài 1 TỔNG QUAN VỀ CÔNG NGHỆ THÔNG TIN
Dell Password Manager Introduction
Dell Quest TPAM Privileged Access Control
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Identity and Access Management 101
Ad

Similar to IDM & IAM 2012 (20)

PDF
Identity Insights: Social, Local and Mobile Identity
PPTX
Kappa data corporate preso v2 luxembourg 2013
PDF
Cryptocard Next Generation Authentication
PDF
20071204 Arc Ready Software + Services
PDF
Summit 2011 trends in information security
PDF
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
PPT
StrikeIron IronCloud API Web Service Publishing Platform SAAS
PPTX
Presentatie peter vink back to the future, TASS technology solutions
PPTX
AIIM Cloud Webinar - EMC Corporation
PPTX
Splunk Overview
PDF
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
PDF
Guard Era Corp Brochure 2008
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PDF
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
PPTX
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
PDF
Cisco tec chris young - security intelligence operations
PDF
MS TechDays 2011 - Cloud Computing with the Windows Azure Platform
PDF
Day 3 p2 - security
PDF
Day 3 p2 - security
PDF
SYMCAnnual
Identity Insights: Social, Local and Mobile Identity
Kappa data corporate preso v2 luxembourg 2013
Cryptocard Next Generation Authentication
20071204 Arc Ready Software + Services
Summit 2011 trends in information security
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
StrikeIron IronCloud API Web Service Publishing Platform SAAS
Presentatie peter vink back to the future, TASS technology solutions
AIIM Cloud Webinar - EMC Corporation
Splunk Overview
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
Guard Era Corp Brochure 2008
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Cisco tec chris young - security intelligence operations
MS TechDays 2011 - Cloud Computing with the Windows Azure Platform
Day 3 p2 - security
Day 3 p2 - security
SYMCAnnual

More from Ariel Evans (20)

PDF
infra 2015 delivery
PDF
Risk mngt gov compliance security cyber
PDF
2015 positioning security & networking
PPTX
Secure development 2014
PDF
CONTACT CENTER TRENDS 2014
PPTX
contact center trends 2014
PDF
Printing om 2014
PDF
Contact Center infrastructure 2014
PPTX
Secure develpment 2014
PDF
DLP Data leak prevention
PDF
Positioning+trends sigal summit 2014
PDF
Sigal summit 2014 final
PDF
Pini sigal Summit 2014 final
PPTX
Output management 2013
PDF
Stki summit2013 infra_pini sigaltechnologies_v5 final
PDF
Cyber security 2013
PDF
Stki summit2013 ratios
PDF
Cloud cc security
PDF
Stki summit2013 infra_pini sigal_mega_v10 final
PDF
Mdm byod survey results 2013
infra 2015 delivery
Risk mngt gov compliance security cyber
2015 positioning security & networking
Secure development 2014
CONTACT CENTER TRENDS 2014
contact center trends 2014
Printing om 2014
Contact Center infrastructure 2014
Secure develpment 2014
DLP Data leak prevention
Positioning+trends sigal summit 2014
Sigal summit 2014 final
Pini sigal Summit 2014 final
Output management 2013
Stki summit2013 infra_pini sigaltechnologies_v5 final
Cyber security 2013
Stki summit2013 ratios
Cloud cc security
Stki summit2013 infra_pini sigal_mega_v10 final
Mdm byod survey results 2013

IDM & IAM 2012

  • 1. IDM/IAM Identity & Access Management Tell me and I’ll forget Sigal Russin , Show me and I may remember VP & Senior Analyst Involve me and I’ll understand
  • 2. Is it identity? 2 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 3. Identity and Access Management Access Identity Directory Control Administration Services Strong Authentication Identity & Organization & Authorization Lifecycle Virtualization Risk Based Access Administration Control Enterprise Role Mng Synchronization Single Sign-On Provisioning & Federation Reconciliation Storage Web Services Security Compliance Automation Audit & Compliance Audit Data Attestation Fraud Detection Segregation of Duties Controls Management Service Levels Risk Analysis Forensics Configuration Performance Automation 3 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 4. Where to start ?! 4 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 5. Explosion of IDs # of Business Partners Digital IDs Automation (B2B) Company (B2E) Customers (B2C) Mobility Internet Client Server Mainframe Pre 1980’s 1980’s 1990’s 2000’s Time 5 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 6. “Identity Chaos” Lots of users Multiple and systems repositories required to of identity do business information; Decentralized Multiple user management IDs, multiple , ad hoc data passwords sharing 6 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 7. IDM – Identity Management 7 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 8. 5 Core Elements of ID Management Federated Identity 8 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 9. 5 Core Elements of ID Management 9 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 10. 5 Core Elements of ID Management 10 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 11. What’s next… 11 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 12. Before Implementing Access Management 12 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 13. After Implementing Access Management 13 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 14. Trends Impacting IAM and privacy management sectors Tactical identity • IAM projects will generally be limited in scope and schedule to help ensure success. Identity assurance • Demands for stronger authentication and more mature identity provider infrastructures will raised. • You need to know which providers you are trusting, why, and for what. Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London 14 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 15. Trends Impacting IAM and privacy management sectors The identity bridge • A new architectural component is needed to manage the flow of identity information between cooperating organizations. • The edge of the organization is to look inward and outward simultaneously. Authorization • It will grow more complex and more urgent due to continuing regulatory pressure. • Authorization will assume a place as a first-class business function. Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London 15 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 16. Trends Impacting IAM and privacy management sectors The sea of tokens • The new tokens-and-transformers architecture is more modular, more flexible and more loosely coupled. Policy battles • Privacy and identity theft are having a serious impact on business operations and viability. • The business community, law enforcement and national security communities will continue to fight over identification, privacy laws and regulations. Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London 16 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 17. Identity Management Market Overlap without integration causes consternation and cost Around 60 vendors in IDM Directory Authentication Password Management Access Management Provisioning Meta-directory Appliances Virtual Directory 17 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 18. IAM's Biggest Concerns HP Research Report, Security & Risk Management Survey Conducted by Coleman Parkes Research, 2012 18 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 19. Be Aware - Most of IDM projects failed • Allocating human resources for maintenance 1 IDM project • Project Leaders: HR with cooperation of IT 2 • Support from organization's high management 3 • Sharing and training of all organization 4 departments 19 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 20. Most of IDM projects failed - Be Aware! • Data Cleansing: job definitions include user 5 authorizations • Mirroring to organization processes – workflows will 6 maximize ROI • If you choose a product make sure about the integration 7 to all organization systems -Learn the product! • Step by Step-integration special groups on AD with one 8 organizational system (SAP, billing, CRM etc.) 20 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 21. Market Overview Vendor Access ProvN Passwd Meta AuthN IBM Novell Oracle CA Microsoft Netegrity Oblix RSA Entrust = Partner provided 21 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 22. Identity & Access Management - Israeli Market Positioning 1Q10-11 Estimated Technology Penetration Using this technolog y 27% Evaluating IDMIAM Not using Local Support 73% Player Worldwide IBM Leader CA Prominent Novell WAM Player Oracle-Sun SAP Quest BMC This analysis should be used with its supporting documents Microsoft Velo (OS) Market Presence 22 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 23. 2012 World Leaders in Cloud Identity Management Market Presence Forrester Survey 23 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 24. Centralize Security Maintain Enforce Control Audit Over Data Policies Assets IDM Benefits Automate Enhance Auditing Visibility Procedures Detect Security, Regulatory 24 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 25. 2013 Will Change Enterprise IDM The rise of stateless identity ID standards Dissolving internal/external boundaries Identity assurance “It’s tough to pull your head up from the static world of on-premises user management to the more dynamic world.” 2013 Planning Guide: Identity and Privacy, by Ian Glazer 25 Sigal Russin’s work Copyright 2012 @STKI Do not remove November 14, 2012graphic or portion of graphic By UCStrategies Staff source or attribution from any
  • 26. Recommendations Organization should translate the business world into project specification process Do not try to fit the IDM system to your organization Before starting – define SOW -> Consider alternatives-> POC for business process Organization limits – try to start IDM inside the organization Matching expectations of project initiators, users and decision makers Marketing the project to show the meanings and painful problems 26 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 27. Recommendations Small steps such as Gradual connection to organization systems, initial provisioning, role based access control etc. Standardization- you don’t need to update the system all the time Organization password policy can take a part on IDM project – SSO on the last stage Workflows- pay attention for duplication or conflict in organizational identities Organizational Tree - reflect the organizational structure in HR and IT Each department has a manager (referant) who responsible for management permissions to the same department 27 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 28. Thank You! Scan Me To Your Contacts: 28 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic