SlideShare a Scribd company logo
IDENTITY
MANAGEMENT
CONTENT
 LTS Secure Identity Management
 Features and Benefits
 Role-based Provisioning
 REST API
 Flexible Data Model
 Password Management
 Cloud SaaS Connectors
 Synchronization and Reconciliation
 Data Model Visualization
 Shared Services
 Self-Service & Profile Management
 Social Registration & Authentication
 Workflow Engine
 OpenICF Connector Framework
LTS SECURE IDENTITY
MANAGEMENT
 Ensure that all cloud apps, On Premise Applications, IoT Devices and
on Mobile leverage a single identity store. LTS Secure Identity
Management is an administrative area that deals with identifying
individuals in a system (an enterprise) and controlling their access to
resources within that system by associating user rights and restrictions
with the established identity.
 LTS Secure Identity Management allows you to comprehensively and
securely manage the complete identity life cycle of users, devices, and
things. From identity to device registration, provisioning,
synchronization, reconciliation, and more, your users and customers can
feel safe as they move between devices and service. Along with LTS
Secure Access Management, LTS Secure Identify Management has the
potential to provide greater access to organizations, which can drive
productivity, satisfaction and, ultimately, revenue. At the same time, it
keeps a record of the identity of every individual in order track his
activity and check who is misusing his/her access related privileges
FEATURES AND BENEFITS
 Role-based Provisioning - Create and manage roles assigned to users
based on organizational need and structure such as job function, title, geo, etc.
Assign and remove entitlements and resources consistently and rapidly.
 REST API - Comprehensive and simple Restful interfaces provide an API for
managing all core functions of user admin, sync & reconciliation, and the
decoupled UI enables custom-tailored solutions with sample configurations for
scalable user administration
Pluggable server-side scripting engine provides Javascript and product-wide
Groovy support out of the box for extensibility and customization.
 Flexible Data Model - Supports choice of data model to meet the needs of
your deployment – either a data full model for current data or data sparse
model for faster access. The object-based model is not hard-coded and provides
flexibility to define many different schemas, objects, attributes, and relations.
 Password Management - Ensure consistency across all applications and
data stores, such as Active Directory and HR systems. Password policies
enforce access rights with rules that can specify strength, aging, reuse, and
attribute validation.
 Cloud SaaS Connectors - Simplifies connectivity to cloud-based SaaS
resources such as Salesforce, Microsoft and Google Apps with out-of-the-box
connectors
Centralized management of identity data across resources guarantees
consistency with ability to synchronize and reconcile bi-directionally, on-
demand or as a scheduled update
 Synchronization and Reconciliation - Synchronization delivery
guarantees enable roll-back if one or more remote systems are unavailable, for
both on-demand and scheduled resource comparisons.
Reconciliation discovers new, changed, deleted, or orphaned accounts to
determine user access privileges to detect and synchronize changes to
accounts, entitlements, and passwords, and perform user access remediation
tasks.
 Data Model Visualization – Visualize identity relationships through the
LTS Secure Identity Management, management console. Plus build
customized dashboards, integrated with Kibana, that include bar, line, scatter
plots, and pie charts that give shape to the data that LTS Secure Identity
Management is handling
 Shared Services - The Common Audit Framework provides a means to log
data consistently across the LTS Secure Identity Platform™, and enables you
to correlate events and transactions. Audit topics, such as access and activity,
can be configured independently delivering the data you want to the
appropriate business services. Includes handlers for CSV files, JDBC
connections, Syslog, JMS, and Elasticsearch (part of the ELK stack).
 Self-Service & Profile Management - User self-service significantly
reduces help desk costs and increases user productivity by automating
password reset and ensuring compliance with a secure, centralized password
policy
Allows end-users to create and manage profiles, configure privacy setting, and
give consent for data-sharing.
 Social Registration & Authentication – Accelerates registration and login
by using any social IDP that supports OpenID Connect or OAuth 2.0 such as
Facebook, Google, and LinkedIn to gain insight and build common user
profiles for a centralized single view of the customer
 Workflow Engine - Provides workflow-driven provisioning activities,
whether for self-service actions such as requests for access or for admin actions
such as updating entitlements, on/off boarding, bulk sunrise or sunset
enrolments, handling approvals with escalations, or performing maintenance.
The embedded Activity engine supports BPMN 2.0 for standards based
business focused management
 OpenICF Connector Framework - Leverages the new OpenICF 1.5
framework (Open Source Identity Connector Framework) for resource
connector development, including amongst others, a PowerShell Connector, a
Generic Scripted Connector that allows for integration with anything that
Groovy supports; REST, SOAP, JDBC, JSON etc.
THANK
YOU

More Related Content

PPTX
Identity Management
PDF
LTS Secure Identity Management
PPTX
PROACTEYE IDENTITY MANAGEMENT
PDF
White Paper : Powerful Health Care Information system
PPT
PDF
Design Pattern for Oracle Identity Provisioning
PPTX
Team9 presentation version 3(1)
PPTX
CadmiuCD Integrations
Identity Management
LTS Secure Identity Management
PROACTEYE IDENTITY MANAGEMENT
White Paper : Powerful Health Care Information system
Design Pattern for Oracle Identity Provisioning
Team9 presentation version 3(1)
CadmiuCD Integrations

What's hot (20)

PPTX
IDM Reconciliation
PPTX
Cloud introduction
PPTX
PROACTEYE ACCESS MANAGEMENT
PPT
Can IBM i play with SOA?
PPTX
Identiverse 2021 enterprise identity: What foundations
PDF
SAML Executive Overview
PPTX
Short Sales Overview of EmpowerID
PDF
Security Patterns with the WSO2 ESB
PPTX
Federation Services
PPTX
Connector Framework
PPTX
Azure Active Directory by Nikolay Mozgovoy
PDF
User Management, Enablement, Directory
PPTX
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
PDF
Bluedog white paper - Our WebObjects Web Security Model
PDF
Azure Just in Time Privileged Identity Management
PPTX
Truzztcar mvp
PPT
OWASPSanAntonio_2006_08_SingleSignOn.ppt
PPTX
Identity Manager OpenSource OpenIDM - introduction
PPTX
Shibboleth identity provider (idp) what it is, and why you should consider a ...
PPT
Web 2.0 Expo Presentation V4
IDM Reconciliation
Cloud introduction
PROACTEYE ACCESS MANAGEMENT
Can IBM i play with SOA?
Identiverse 2021 enterprise identity: What foundations
SAML Executive Overview
Short Sales Overview of EmpowerID
Security Patterns with the WSO2 ESB
Federation Services
Connector Framework
Azure Active Directory by Nikolay Mozgovoy
User Management, Enablement, Directory
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Bluedog white paper - Our WebObjects Web Security Model
Azure Just in Time Privileged Identity Management
Truzztcar mvp
OWASPSanAntonio_2006_08_SingleSignOn.ppt
Identity Manager OpenSource OpenIDM - introduction
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Web 2.0 Expo Presentation V4
Ad

Similar to LTS Secure Identity Management (20)

PPTX
Identity management
PPTX
How Active Directory Management Software Supports Growing Enterprises.pptx
PPTX
How Active Directory Management Software Supports Growing Enterprises.pptx
PDF
Active Directory Proposal
PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
PDF
ALTR Company Overview 2023
PDF
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
PDF
Power BI Security Best Practices.pdf
PDF
Symplified datasheet
PPTX
05-Empowering-Enterprise-Mobility-FR.pptx
PDF
SailPoint VS CyberArk.pdf
PDF
Identity Manager & AirWatch Cloud Mobile App - Infographic
PDF
MS Cloud Identity and Access Infographic 2015 (1)
PDF
Ms cloud identity and access infographic 2015
PDF
Open am and_radiantone
PDF
Protect your business with identity and access management in the cloud
PPTX
Agile IT EMS webinar series, session 1
PPTX
What is Authentication Active Directory_.pptx
PDF
IAM Cloud Datasheet plus Cloud Drive Mapper
Identity management
How Active Directory Management Software Supports Growing Enterprises.pptx
How Active Directory Management Software Supports Growing Enterprises.pptx
Active Directory Proposal
I am sharing 'unit 3' with youuuuuu.PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
ALTR Company Overview 2023
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
Power BI Security Best Practices.pdf
Symplified datasheet
05-Empowering-Enterprise-Mobility-FR.pptx
SailPoint VS CyberArk.pdf
Identity Manager & AirWatch Cloud Mobile App - Infographic
MS Cloud Identity and Access Infographic 2015 (1)
Ms cloud identity and access infographic 2015
Open am and_radiantone
Protect your business with identity and access management in the cloud
Agile IT EMS webinar series, session 1
What is Authentication Active Directory_.pptx
IAM Cloud Datasheet plus Cloud Drive Mapper
Ad

More from rver21 (13)

PPTX
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
PPTX
Priviledged identity management
PPTX
LTS Secure SOC as a Service
PPTX
Cyber security analytics for detect target attacks
PPTX
Priviledged Identity Management
PPTX
Intelligence driven SOC as a Service
PPTX
LTS Secure User Entity Behavior Analytics(ueba) boon to Cyber Security
PPTX
LTS Secure User Entity Behavior Analytics(UEBA) boon to Cyber Security
PPTX
LTS Cyber Security Analytics
PPTX
Priviledged Identity Management
PPTX
LTS Secure offers PIM User Activity Monitoring
PDF
LTS Secure intelligence driven security operation center
PDF
LTS Secure SIEM Features
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
Priviledged identity management
LTS Secure SOC as a Service
Cyber security analytics for detect target attacks
Priviledged Identity Management
Intelligence driven SOC as a Service
LTS Secure User Entity Behavior Analytics(ueba) boon to Cyber Security
LTS Secure User Entity Behavior Analytics(UEBA) boon to Cyber Security
LTS Cyber Security Analytics
Priviledged Identity Management
LTS Secure offers PIM User Activity Monitoring
LTS Secure intelligence driven security operation center
LTS Secure SIEM Features

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation theory and applications.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
Teaching material agriculture food technology
PDF
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
A Presentation on Artificial Intelligence
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Big Data Technologies - Introduction.pptx
Machine learning based COVID-19 study performance prediction
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Teaching material agriculture food technology
cuic standard and advanced reporting.pdf

LTS Secure Identity Management

  • 2. CONTENT  LTS Secure Identity Management  Features and Benefits  Role-based Provisioning  REST API  Flexible Data Model  Password Management  Cloud SaaS Connectors  Synchronization and Reconciliation  Data Model Visualization  Shared Services  Self-Service & Profile Management  Social Registration & Authentication  Workflow Engine  OpenICF Connector Framework
  • 3. LTS SECURE IDENTITY MANAGEMENT  Ensure that all cloud apps, On Premise Applications, IoT Devices and on Mobile leverage a single identity store. LTS Secure Identity Management is an administrative area that deals with identifying individuals in a system (an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.  LTS Secure Identity Management allows you to comprehensively and securely manage the complete identity life cycle of users, devices, and things. From identity to device registration, provisioning, synchronization, reconciliation, and more, your users and customers can feel safe as they move between devices and service. Along with LTS Secure Access Management, LTS Secure Identify Management has the potential to provide greater access to organizations, which can drive productivity, satisfaction and, ultimately, revenue. At the same time, it keeps a record of the identity of every individual in order track his activity and check who is misusing his/her access related privileges
  • 4. FEATURES AND BENEFITS  Role-based Provisioning - Create and manage roles assigned to users based on organizational need and structure such as job function, title, geo, etc. Assign and remove entitlements and resources consistently and rapidly.  REST API - Comprehensive and simple Restful interfaces provide an API for managing all core functions of user admin, sync & reconciliation, and the decoupled UI enables custom-tailored solutions with sample configurations for scalable user administration Pluggable server-side scripting engine provides Javascript and product-wide Groovy support out of the box for extensibility and customization.  Flexible Data Model - Supports choice of data model to meet the needs of your deployment – either a data full model for current data or data sparse model for faster access. The object-based model is not hard-coded and provides flexibility to define many different schemas, objects, attributes, and relations.
  • 5.  Password Management - Ensure consistency across all applications and data stores, such as Active Directory and HR systems. Password policies enforce access rights with rules that can specify strength, aging, reuse, and attribute validation.  Cloud SaaS Connectors - Simplifies connectivity to cloud-based SaaS resources such as Salesforce, Microsoft and Google Apps with out-of-the-box connectors Centralized management of identity data across resources guarantees consistency with ability to synchronize and reconcile bi-directionally, on- demand or as a scheduled update  Synchronization and Reconciliation - Synchronization delivery guarantees enable roll-back if one or more remote systems are unavailable, for both on-demand and scheduled resource comparisons. Reconciliation discovers new, changed, deleted, or orphaned accounts to determine user access privileges to detect and synchronize changes to accounts, entitlements, and passwords, and perform user access remediation tasks.
  • 6.  Data Model Visualization – Visualize identity relationships through the LTS Secure Identity Management, management console. Plus build customized dashboards, integrated with Kibana, that include bar, line, scatter plots, and pie charts that give shape to the data that LTS Secure Identity Management is handling  Shared Services - The Common Audit Framework provides a means to log data consistently across the LTS Secure Identity Platform™, and enables you to correlate events and transactions. Audit topics, such as access and activity, can be configured independently delivering the data you want to the appropriate business services. Includes handlers for CSV files, JDBC connections, Syslog, JMS, and Elasticsearch (part of the ELK stack).  Self-Service & Profile Management - User self-service significantly reduces help desk costs and increases user productivity by automating password reset and ensuring compliance with a secure, centralized password policy Allows end-users to create and manage profiles, configure privacy setting, and give consent for data-sharing.
  • 7.  Social Registration & Authentication – Accelerates registration and login by using any social IDP that supports OpenID Connect or OAuth 2.0 such as Facebook, Google, and LinkedIn to gain insight and build common user profiles for a centralized single view of the customer  Workflow Engine - Provides workflow-driven provisioning activities, whether for self-service actions such as requests for access or for admin actions such as updating entitlements, on/off boarding, bulk sunrise or sunset enrolments, handling approvals with escalations, or performing maintenance. The embedded Activity engine supports BPMN 2.0 for standards based business focused management  OpenICF Connector Framework - Leverages the new OpenICF 1.5 framework (Open Source Identity Connector Framework) for resource connector development, including amongst others, a PowerShell Connector, a Generic Scripted Connector that allows for integration with anything that Groovy supports; REST, SOAP, JDBC, JSON etc.