SlideShare a Scribd company logo
Telekom Security: Id Security
Automating ForgeRock Deployments to a Magenta Cloud
- Peter Weik -
Consumer
IAM (B2C)
Enterprise
IAM (B2E/B2B) Internet of
Things IAM (B2T)
User Centric
digital Identities
Social Logins &
User profiles
Domain Centric
Digital Identities
Identity & Access Gov.
B2B Federations with
Partners & Suppliers
Service Centric
Digital Identities
Non-Human Identities
& API Security
Three Disciplines of Today's Identity & Access Management
The Modern IAM Ecosystem
Identity & Access
Management
Things
Consumers
Employees
PArtners
Mobile
Workforce
Privileged
Users
Applications Data
Office
workspace
User
directory
On-Premise/PrivateCloud
Software
asaService
CloudPlatforms
&WebServices
Delivery Models for Cloud Based Identity & Access Mgmt
Identity as a Service
Multitenant IAM Offering delivered as Software as a
Service in a Public Cloud.
 Weak integration with existing IAM deployments in the
customer domain
 Focus on Single Sign-On and identity federation
 Limited functionality with regards to authentication and
identity management
 Operation and data storage typically in the US. Very few
providers operate in Germany as well
 Public pricing information available, usage or user based
pricing models.
Managed IAM Service
Application outsourcing of an IAM product within a
Private Cloud offered as managed service.
 Strong integration with existing IAM deployments in the
customer domain possible
 Full IAM functionality available (depending on IAM
product used).Focus on IdM customizations.
 Operation and data storage depends on customer
requirements and data center locations of the service
provider
 No public pricing information available; Time & material
based quotes are common
“Cloudification Grades” of IdentIty & access MGMt
Hosted
IAM Solution
HW HW HW
OS OS OS
IAMInstance1
IAMInstance2
IAMInstancex
…
One individual IAM Instance per
customer with dedicated IT
resources.
Multi-tenant
IAM as a Service
HW
OS
Tenant1
Tenant2
Tenantx
…
IAM Instance
One standard IAM SaaS instance
for all tenants in Public Cloud
VM(s)
Virtualized
IAM Instances
One individual IAM instance per
customer with virtualized IT
resources
VM 1 VM 2 VM x
HW
OS OS OS
IAMInstance1
IAMInstance2
IAMInstancex
…
Virtualized &
Containerized
IAM Services
Individual IAM instances per
customer with virtualized IT
resources and containerized IAM
VM(s( VM (s) VM (s)
HW
OS OS OS
Tenant1
Tenant2
Tenantx
…
IAM
Instance
IAM
Instance
IAM
Instance
Private Cloud Public Cloud
Managed Service Un-managed Service
Identity Protect Pro
“Cloudification Grade” of IdentIty Protect Pro
Hosted
IAM Solution
HW HW HW
OS OS OS
IAMInstance1
IAMInstance2
IAMInstancex
…
One individual IAM Instance per
customer with dedicated IT
resources.
Multi-tenant
IAM as a Service
HW
OS
Tenant1
Tenant2
Tenantx
…
IAM Instance
One standard IAM SaaS instance
for all tenants in Public Cloud
VM(s)
Virtualized
IAM Instances
One individual IAM instance per
customer with virtualized IT
resources
VM 1 VM 2 VM x
HW
OS OS OS
IAMInstance1
IAMInstance2
IAMInstancex
…
Virtualized &
Containerized
IAM Services
Individual IAM instances per
customer with virtualized IT
resources and containerized IAM
VM (s) VM(s) VM (s)
HW
OS OS OS
Tenant1
Tenant2
Tenantx
…
IAM
Instance
IAM
Instance
IAM
Instance
Identity Protect Pro
Identity Protect
Pro
Office 365
Identity Protect Pro
Identity & Access Management from the Cloud
powered by
IdentityManagement
Access Management
Applications Data
Office
workspace
User
directory
Enterprise a
Applications Data
Office
workspace
User
directory
Enterprise B
Partner
Nomadic
Worker
Google
Box
Private
Cloud
Salesforce
Identity
provisioning
Identity
Synchronization
User Self
Services
Identity Data
Management
Authentication
Service
Adaptive Risk
Evaluation
Identity
Federation
Single
Sign-On
Dashboard
Services
Social
Login
Identity Protect Pro: Functionalities
Identity Protect Pro: The IAM Software Instance
vApp IAM iNSTANCE
VM AS01
VM DB01
VM AS02
VM DB02
ApplicationLayerDatabaseLayer
vApp FW
vApp FW
OSFW
OSFW
AppNet Web-Frontend
AppNetOperation
OSFW
OSFW
Identity Protect Pro: A Managed IAM Service with Tooling
Remarks
Configuration management by means of Subversion for the
management of customer configurations within in a central
repository and support of lifecycle measures for existing customer
configurations that are already operational.
Deployment of standardized IAM software bundles (incl. required
middleware) by means of Docker.
A private Docker repository eases the provisioning of patches and
updates for all customer instances.
Usage of T-Systems DSI vCloud (vmWare based IaaS offering) for
the realization of virtual data centers for Identity Protect Pro.
IT automation and orchestration of deployments (software and
configurations) by means of Ansible.
Virtualized & Containerized
IAM Services
Individual IAM instances per
customer with virtualized IT
resources and containerized IAM
VM (s) VM (s) VM (s)
HW
OS OS OS
Tenant1
Config&Data
Tenant2
Config&Data
Tenantx
Config&Data
…
IAMInstance
(Containerized)
IAMInstance
(Containerrized)
IAMInstance
(Containerized)
Tools
ForgeRock’s Identity Platform supports the required separation of
IAM executables, IAM data and IAM configurations.
Peace of mind – now and future
Access to skilled IAM experts; compliance with
international standards; deployment of the
latest technologies and mechanisms.
Identity Protect Pro: Identity & Access Mgmt delivered as
Managed Service from a Magenta Cloud
availability
The solution is delivered from a high-
availability Telekom/T-Systems data center –
for minimum downtime.
protection of Investments
Identity Protect Pro complements your existing
IAM infrastructures, providing staff with secure
access to cloud applications.
convenience
Employees can request access rights via self-
service workflows and single sign-on increases
staff productivity.
Cost savings
Identity Protect Pro is charged on a demand-
driven basis – so you only pay for the
resources you actually need.
Cost-efficiency
Lower up-front investment compared to local
IAM solutions (OPEX replaces CAPEX).
security
Identity Protect Pro is operated in a highly
secure data center of Telekom/T-Systems in
line with German data protection legislation.
speed
The deployment of high-performance
hardware and broadband network connections
enables fast IAM transactions.
scalability
Identity Protect Pro can be tailored to meet
your specific day-to-day requirements (e.g.
number of employees).
WWW.TELEKOM.DE/IDENTITY-PROTECT-PRO

More Related Content

PPTX
Identity Live Sydney 2017 - Michael Dowling
PPTX
Identity Live Sydney 2017 - Daniel Raskin
PDF
Security On The Edge - A New Way To Think About Securing the Internet of Things
PPTX
Identity Live London 2017 | Daniel Raskin
PDF
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
PPTX
Identity Live London 2017 | Ashley Stevenson
PPTX
Securing Access to SaaS Apps with WSO2 Identity Server
PPTX
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Daniel Raskin
Security On The Edge - A New Way To Think About Securing the Internet of Things
Identity Live London 2017 | Daniel Raskin
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Identity Live London 2017 | Ashley Stevenson
Securing Access to SaaS Apps with WSO2 Identity Server
Webinar: ForgeRock Identity Platform Preview (Dec 2015)

What's hot (20)

PDF
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
PPTX
IdM vs. IDaaS
PDF
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
PPTX
Ping Identity
PDF
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
PDF
Pimping the ForgeRock Identity Platform for a Billion Users
PPTX
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
PDF
ForgeRock Platform Release - Summer 2016
PDF
Identity as a Service: a missing gap for moving enterprise applications in In...
PPTX
Identity Live Sydney 2017 - Ian Sorbello
PPTX
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
PPTX
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
PPTX
Identity Live Paris 2017 | Ian Sorbello, HSBC
PDF
Connected Car: Putting Digital Identity Behind the Wheel
PDF
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
PPTX
2015 Identity Summit - Stepping Up to New Data Protection Challenges
PPTX
9.35am robert humphrey
PPTX
Webinar: Identity Wars: The Unified Platform Awakens
PPTX
Identity Live Paris 2017 | Monetising Digital Customer Relationships
PPTX
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
IdM vs. IDaaS
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Ping Identity
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Pimping the ForgeRock Identity Platform for a Billion Users
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
ForgeRock Platform Release - Summer 2016
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity Live Sydney 2017 - Ian Sorbello
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Identity Live Paris 2017 | Ian Sorbello, HSBC
Connected Car: Putting Digital Identity Behind the Wheel
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
2015 Identity Summit - Stepping Up to New Data Protection Challenges
9.35am robert humphrey
Webinar: Identity Wars: The Unified Platform Awakens
Identity Live Paris 2017 | Monetising Digital Customer Relationships
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
Ad

Viewers also liked (19)

PDF
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
PDF
Winning with GDPR: How to Win Customer Loyalty and Trust
PPTX
Identity Live Sydney 2017 - Ashley Stevenson
PDF
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
PDF
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
PPTX
Identity Live Sydney 2017 - Andrew Latham
PPTX
OpenAM - An Introduction
PDF
Paradigmo. Rock Kit, the Rapid Deployment Toolkit for ForgeRock Identity Plat...
PPTX
Identity Live Sydney 2017 - Allan Foster & Eve Maler
PPTX
Identity Live London 2017 | Kenneth May
PPTX
Keynote: Tech, Trust, and Transformation - Paris Identity Summit 2016
PDF
Implications of GDPR in Conjunction with UMA
PPTX
Analyst Keynote: Putting Customers First Requires Innovation and Identity - P...
PPTX
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
PPTX
OpenAM: An Introduction
PDF
DevOps Unleashed: Strategies that Speed Deployments
PDF
The digital pains of retail
PPTX
Identity Live London 2017 | Marko Orenius
PPTX
A Backstage Tour of Identity - Paris Identity Summit 2016
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
Winning with GDPR: How to Win Customer Loyalty and Trust
Identity Live Sydney 2017 - Ashley Stevenson
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration Flow
Identity Live Sydney 2017 - Andrew Latham
OpenAM - An Introduction
Paradigmo. Rock Kit, the Rapid Deployment Toolkit for ForgeRock Identity Plat...
Identity Live Sydney 2017 - Allan Foster & Eve Maler
Identity Live London 2017 | Kenneth May
Keynote: Tech, Trust, and Transformation - Paris Identity Summit 2016
Implications of GDPR in Conjunction with UMA
Analyst Keynote: Putting Customers First Requires Innovation and Identity - P...
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
OpenAM: An Introduction
DevOps Unleashed: Strategies that Speed Deployments
The digital pains of retail
Identity Live London 2017 | Marko Orenius
A Backstage Tour of Identity - Paris Identity Summit 2016
Ad

Similar to T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud. (20)

PPTX
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
PPT
Up 2011-ken huang
PPTX
IAM.pptxIAM.pptxIAM.pptxIAM.pptxIAM.pptx
PDF
Securing your Applications for the Cloud Age
PDF
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
PDF
Identity as a Managed Cloud Service
DOCX
School of Computer & Information SciencesITS-532 Cloud C.docx
PDF
CIS14: Lean In: Enterprise Cloud Identity
PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
PDF
Cloud computing identity management summary
PDF
What is Identity and Access Management..
PDF
Cloud Computing: A study of cloud architecture and its patterns
PDF
Aditro - IAM as part of Cloud Business strategy
PDF
Identity and Access Management Tools
PPTX
IAM Cloud
PDF
Identity and Access Management in Cloud Computing.
PDF
Identity-As-A-Service (IDaaS) – Everything You Need To Know
PPTX
Identity and Access Management - Powerpoint
DOCX
Directions Answer each question individual and respond with full .docx
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Up 2011-ken huang
IAM.pptxIAM.pptxIAM.pptxIAM.pptxIAM.pptx
Securing your Applications for the Cloud Age
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
Identity as a Managed Cloud Service
School of Computer & Information SciencesITS-532 Cloud C.docx
CIS14: Lean In: Enterprise Cloud Identity
I am sharing 'unit 3' with youuuuuu.PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
Cloud computing identity management summary
What is Identity and Access Management..
Cloud Computing: A study of cloud architecture and its patterns
Aditro - IAM as part of Cloud Business strategy
Identity and Access Management Tools
IAM Cloud
Identity and Access Management in Cloud Computing.
Identity-As-A-Service (IDaaS) – Everything You Need To Know
Identity and Access Management - Powerpoint
Directions Answer each question individual and respond with full .docx

More from ForgeRock (20)

PDF
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
PPTX
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
PDF
Identity Live Sydney: Identity Management - A Strategic Opportunity
PDF
Identity Live Singapore: Transform Your Cybersecurity Capability
PDF
Identity Live Singapore 2018 Keynote Presentation
PDF
Identity Live Sydney 2018 Keynote Presentation
PDF
Identity Live Singapore: Just Ask 'Em
PDF
Identity Live Singapore: Building Trust & Privacy in a Connected Society
PDF
Identity Live Sydney: Intelligent Authentication
PDF
Identity Live Sydney: Building Trust and Privacy in a Connected Society
PDF
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
PPTX
Get the Exact Identity Solution You Need - In the Cloud - Overview
PDF
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
PDF
Opening Keynote (Identity Live Berlin 2018)
PDF
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
PDF
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
PDF
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
PDF
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
PDF
Shift from GDPR readiness to sustained compliance to improve your business an...
PDF
Intelligent Authentication (Identity Live Berlin 2018)
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution You Need - In the Cloud - Overview
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
Opening Keynote (Identity Live Berlin 2018)
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Shift from GDPR readiness to sustained compliance to improve your business an...
Intelligent Authentication (Identity Live Berlin 2018)

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Understanding_Digital_Forensics_Presentation.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A Presentation on Artificial Intelligence
KodekX | Application Modernization Development
NewMind AI Monthly Chronicles - July 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Electronic commerce courselecture one. Pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Building Integrated photovoltaic BIPV_UPV.pdf
Modernizing your data center with Dell and AMD
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
Unlocking AI with Model Context Protocol (MCP)

T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.

  • 1. Telekom Security: Id Security Automating ForgeRock Deployments to a Magenta Cloud - Peter Weik -
  • 2. Consumer IAM (B2C) Enterprise IAM (B2E/B2B) Internet of Things IAM (B2T) User Centric digital Identities Social Logins & User profiles Domain Centric Digital Identities Identity & Access Gov. B2B Federations with Partners & Suppliers Service Centric Digital Identities Non-Human Identities & API Security Three Disciplines of Today's Identity & Access Management
  • 3. The Modern IAM Ecosystem Identity & Access Management Things Consumers Employees PArtners Mobile Workforce Privileged Users Applications Data Office workspace User directory On-Premise/PrivateCloud Software asaService CloudPlatforms &WebServices
  • 4. Delivery Models for Cloud Based Identity & Access Mgmt Identity as a Service Multitenant IAM Offering delivered as Software as a Service in a Public Cloud.  Weak integration with existing IAM deployments in the customer domain  Focus on Single Sign-On and identity federation  Limited functionality with regards to authentication and identity management  Operation and data storage typically in the US. Very few providers operate in Germany as well  Public pricing information available, usage or user based pricing models. Managed IAM Service Application outsourcing of an IAM product within a Private Cloud offered as managed service.  Strong integration with existing IAM deployments in the customer domain possible  Full IAM functionality available (depending on IAM product used).Focus on IdM customizations.  Operation and data storage depends on customer requirements and data center locations of the service provider  No public pricing information available; Time & material based quotes are common
  • 5. “Cloudification Grades” of IdentIty & access MGMt Hosted IAM Solution HW HW HW OS OS OS IAMInstance1 IAMInstance2 IAMInstancex … One individual IAM Instance per customer with dedicated IT resources. Multi-tenant IAM as a Service HW OS Tenant1 Tenant2 Tenantx … IAM Instance One standard IAM SaaS instance for all tenants in Public Cloud VM(s) Virtualized IAM Instances One individual IAM instance per customer with virtualized IT resources VM 1 VM 2 VM x HW OS OS OS IAMInstance1 IAMInstance2 IAMInstancex … Virtualized & Containerized IAM Services Individual IAM instances per customer with virtualized IT resources and containerized IAM VM(s( VM (s) VM (s) HW OS OS OS Tenant1 Tenant2 Tenantx … IAM Instance IAM Instance IAM Instance Private Cloud Public Cloud Managed Service Un-managed Service
  • 7. “Cloudification Grade” of IdentIty Protect Pro Hosted IAM Solution HW HW HW OS OS OS IAMInstance1 IAMInstance2 IAMInstancex … One individual IAM Instance per customer with dedicated IT resources. Multi-tenant IAM as a Service HW OS Tenant1 Tenant2 Tenantx … IAM Instance One standard IAM SaaS instance for all tenants in Public Cloud VM(s) Virtualized IAM Instances One individual IAM instance per customer with virtualized IT resources VM 1 VM 2 VM x HW OS OS OS IAMInstance1 IAMInstance2 IAMInstancex … Virtualized & Containerized IAM Services Individual IAM instances per customer with virtualized IT resources and containerized IAM VM (s) VM(s) VM (s) HW OS OS OS Tenant1 Tenant2 Tenantx … IAM Instance IAM Instance IAM Instance Identity Protect Pro
  • 8. Identity Protect Pro Office 365 Identity Protect Pro Identity & Access Management from the Cloud powered by IdentityManagement Access Management Applications Data Office workspace User directory Enterprise a Applications Data Office workspace User directory Enterprise B Partner Nomadic Worker Google Box Private Cloud Salesforce
  • 9. Identity provisioning Identity Synchronization User Self Services Identity Data Management Authentication Service Adaptive Risk Evaluation Identity Federation Single Sign-On Dashboard Services Social Login Identity Protect Pro: Functionalities
  • 10. Identity Protect Pro: The IAM Software Instance vApp IAM iNSTANCE VM AS01 VM DB01 VM AS02 VM DB02 ApplicationLayerDatabaseLayer vApp FW vApp FW OSFW OSFW AppNet Web-Frontend AppNetOperation OSFW OSFW
  • 11. Identity Protect Pro: A Managed IAM Service with Tooling Remarks Configuration management by means of Subversion for the management of customer configurations within in a central repository and support of lifecycle measures for existing customer configurations that are already operational. Deployment of standardized IAM software bundles (incl. required middleware) by means of Docker. A private Docker repository eases the provisioning of patches and updates for all customer instances. Usage of T-Systems DSI vCloud (vmWare based IaaS offering) for the realization of virtual data centers for Identity Protect Pro. IT automation and orchestration of deployments (software and configurations) by means of Ansible. Virtualized & Containerized IAM Services Individual IAM instances per customer with virtualized IT resources and containerized IAM VM (s) VM (s) VM (s) HW OS OS OS Tenant1 Config&Data Tenant2 Config&Data Tenantx Config&Data … IAMInstance (Containerized) IAMInstance (Containerrized) IAMInstance (Containerized) Tools ForgeRock’s Identity Platform supports the required separation of IAM executables, IAM data and IAM configurations.
  • 12. Peace of mind – now and future Access to skilled IAM experts; compliance with international standards; deployment of the latest technologies and mechanisms. Identity Protect Pro: Identity & Access Mgmt delivered as Managed Service from a Magenta Cloud availability The solution is delivered from a high- availability Telekom/T-Systems data center – for minimum downtime. protection of Investments Identity Protect Pro complements your existing IAM infrastructures, providing staff with secure access to cloud applications. convenience Employees can request access rights via self- service workflows and single sign-on increases staff productivity. Cost savings Identity Protect Pro is charged on a demand- driven basis – so you only pay for the resources you actually need. Cost-efficiency Lower up-front investment compared to local IAM solutions (OPEX replaces CAPEX). security Identity Protect Pro is operated in a highly secure data center of Telekom/T-Systems in line with German data protection legislation. speed The deployment of high-performance hardware and broadband network connections enables fast IAM transactions. scalability Identity Protect Pro can be tailored to meet your specific day-to-day requirements (e.g. number of employees).