SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
Password Management Project Roadmap
© 2014 Hitachi ID Systems, Inc. All rights reserved.
This document will guide you through the entire life of a successful password management project, includ-
ing:
• A needs analysis.
• Who to involve in the project.
• How to select the best product.
• Technical design decisions.
• How to effectively roll out the system.
• How to monitor and assure sound ROI.
Contents
1 Introduction 1
2 Needs analysis 2
2.1 Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.2 User productivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.3 Support cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.4 Security violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.5 OS migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3 Organization 4
3.1 Mandate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.2 Budget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.3 Participants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.4 Ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4 Selecting a product 6
4.1 Technical requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4.1.1 Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4.1.2 Target systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.1.3 Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.1.4 Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1.5 Flexibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1.6 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.2 Vendor profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
i
Password Management Project Roadmap
4.2.1 Financial stability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.2.2 Quality of support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.2.3 Deployment time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.2.4 Single source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.2.5 Future direction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.2.6 Partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5 Project management 12
5.1 Project startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
5.2 Product selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
5.3 Acquisition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.4 Product deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
6 Post deployment 15
6.1 User adoption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
6.2 Ongoing support and upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
6.3 Measuring ROI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
7 Summary 16
© 2014 Hitachi ID Systems, Inc. All rights reserved.
Password Management Project Roadmap
1 Introduction
As today’s organizations deploy an ever-growing number of complex systems, password management prob-
lems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise
security.
Identifying the cause of these problems, and resolving them, requires the involvement of many interested
parties and much strategic planning. Organizations can use a number of software products to address
these issues. Selecting the right one also involves taking a number of important factors into consideration.
This document will guide you through the entire life of a successful password management project, includ-
ing:
• A needs analysis.
• Who to involve in the project.
• How to select the best product.
• Technical design decisions.
• How to effectively roll out the system.
• How to monitor and assure sound ROI.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 1
Password Management Project Roadmap
2 Needs analysis
The first step when selecting and deploying a password management product is to conduct a needs anal-
ysis. The needs analysis should identify the problems that a password management system must solve.
These should be translated into requirements which the successful vendor must meet.
Following are the most common password management problems, and a brief description of password
management functionalities that are required to solve them.
2.1 Complexity
Users frequently have too many passwords on too many different systems. As a result, they either forget
their passwords or violate security policy in an effort to remember them.
A password management system should allow users to manage every password from a single screen, and
allow users to synchronize their passwords to a single, hard-to-guess password.
2.2 User productivity
Users who forget their passwords waste time on:
• Trying to log in.
• Calling the help desk.
• Waiting for service.
• Proving their identity (authenticating).
• Waiting for a password reset.
Each problem incident may consume 20-30 minutes of user time. In many organizations, users experience
this problem 2-4 times annually. In a large user population, this generates a huge volume of user problems
and help desk calls.
A password management system should incorporate password synchronization, which helps users to re-
member their passwords and thus eliminate the majority of password-related problems. It should also
include a password self-reset and help desk password reset facility, to speed up the resolution of remaining
password problems at the help desk.
2.3 Support cost
Users who forget their passwords call the help desk, and get service. These calls normally represent 20%
to 30% of total help desk call volume.
• Password synchronization can reduce the incidence of password problems.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 2
Password Management Project Roadmap
• Self-service password resets help users resolve their own problems, rather than calling the help desk.
• A help desk password reset facility should minimize problem resolution time by:
– Integrating caller identification and authentication.
– Supporting password reset on multiple systems from a single screen.
– Automatically creating and closing call records.
2.4 Security violations
In an effort to remember a large number of passwords, users may violate security policies by:
• Writing down passwords.
• Sharing passwords.
• Selecting easily remembered and guessed passwords.
• Not changing passwords.
• Reusing old passwords.
Password synchronization simplifies and automates the password change process while enforcing security
procedures. A password policy engine should ensure that synchronized passwords are strong and changed
regularly.
2.5 OS migration
When new network systems are installed, users must be assigned new passwords. When many users are
involved, creating new login IDs, assigning each of them an initial password, and securely communicating
that password value to the user is a large undertaking.
This process is required in projects such as new OS deployments (for example, migrating to Windows 2000
Active Directory), new authentication services (for example, RADIUS servers supporting many firewalls),
and new application deployments (for example, SAP or PeopleSoft deployments).
Password synchronization should allow administrators to assign existing users of new systems a random
initial password. Users can then reset some or all of their passwords to a new, known value to gain access
to new systems.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 3
Password Management Project Roadmap
3 Organization
To be successful, a password management project must have a mandate, a schedule and a budget. Persons
in an organization with a vested interest in password management must be involved early in the project.
This ensures that their requirements are met at the design stage, and that they will not object to any part of
the project during deployment.
3.1 Mandate
A password management project must start with a clear mandate to solve specific business problems.
Section 2 on Page 2 outlines the most likely issues that must be resolved.
Projects that start without this mandate may fail when the time comes to request resources and the support
of groups within the organization.
3.2 Budget
It is often helpful to verify, at the onset of a password management project, whether or when sufficient funds
will be available. The following items require funding:
• A software license for the selected product.
• Annual support costs.
• Training.
• Hardware and associated software costs (including operating systems, network management soft-
ware, installation).
• Professional services – to install the selected product and to manage a roll-out.
• Internal resources – for project management, product selection, installation and ongoing system ad-
ministration and support.
3.3 Participants
Early involvement by all interested parties in an organization ensures that the final design reflects all needs,
and that no objections will be raised late in the project.
The following groups are typically involved in a password management project:
• The help desk / I.T. user support: Must understand how to use the system and its impact on their
work. Password management systems typically produce the most tangible cost savings here. Help
desk analysts will be the direct users of the system.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 4
Password Management Project Roadmap
• Desktop support: Must approve any software that will be installed or executed on workstations, as
well as any proposed configuration changes.
• Systems administrators: Must understand the impact of a password management solution on the
systems they manage.
• I.T. security: Must understand the impact on overall security policy and design. Should approve
password policies and non-password authentication methods (for example, authentication used for
password resets.)
3.4 Ownership
It is crucial for a password management project to include the system’s long-term owner, as early as possi-
ble.
Ideally, the long-term system owner and the system’s technical administrator(s) will have a strong influence
over product selection. These people will have to work with the system and its vendor, so they are more
likely to take the time to make a critical analysis of product documentation, and undertake a technical
laboratory evaluation of candidate products.
It is risky, on the other hand, to have one team select a product, and a separate team install and manage it.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 5
Password Management Project Roadmap
4 Selecting a product
The ideal password management product should meet all of the project’s technical requirements, and be
supported by a stable, mature and helpful vendor.
The following sections describe the technical and business requirements that a password management
system vendor should meet.
4.1 Technical requirements
4.1.1 Functionality
A password management system should include functionality for:
• Password synchronization:
Users should be able to maintain a single password that applies to most, if not all, of their login IDs.
This helps users remember their passwords and reduces calls to the help desk. Users with a single
password are less likely to write down or share their passwords.
• Self-service password reset:
Users who forget their passwords should be able to quickly resolve their problems without calling the
help desk.
• Help desk password reset:
Support analysts should be able to authenticate a caller, reset passwords and automatically create
or close a help desk ticket from a single screen. This reduces call duration and cost, and improves
customer service.
• Multiple access methods:
Users should be able to access the system using all methods offered by the organization, including:
– A web browser and an existing password change user interface, for routine password changes.
– A web browser from the user’s own desktop login screen, for self-service password resets.
– An interactive voice response (IVR) system, for users who need to reset their remote access
password.
• Profile builders:
– In some organizations, users have different login IDs on different systems. If no database exists
to correlate IDs to users prior to deployment, then a profile builder must be available to collect
this information from users.
– If users will be authenticated for password resets using personal information profiles, then a pro-
file builder may be required to update existing data (for example, in a human resources database)
or to create new authentication profiles.
In most cases, the user profile builders should be tools included in the password management au-
thentication module.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 6
Password Management Project Roadmap
• Language support:
Organizations that use languages other than English should be able to deploy the solution with multiple
languages.
4.1.2 Target systems
A successful password management system should be able to manage passwords on most or all of the
systems to which users login with an ID and password.
If this is not possible, then a threshold for systems that must be supported should be defined. A reasonable
approach is to require the solution to manage passwords for systems that generate 95% of password-related
calls to the help desk.
Target systems should work “out of the box” in as many cases as possible.
Where this is infeasible (e.g., home-grown applications, vertical market applications, legacy applications),
the product should be open enough to make it possible to easily integrate with applications:
• Some applications include an API for managing passwords. While rare, this is a useful mechanism
to integrate a password management system. It’s useful to check the language bindings of any such
API, and compare these to what the password management system supports.
• Some applications include command-line tools to manage passwords. The password management
system should be able to execute these – on whatever platform they are available.
• Some applications store their passwords in a database, where a password management system may
manipulate them directly. This includes client/server applications and web applications with DBMS
back-ends.
• Some applications run on midrange or mainframe systems, and can be manipulated by scripting
interaction with a terminal login session.
• Some applications present a web GUI, and a password management system can interact with them
by simulating the actions of a web browser.
4.1.3 Integration
A password management system should integrate seamlessly with existing I.T. infrastructure, including:
• Authentication systems:
Users should be able to authenticate using existing infrastructure – be it a network login ID/password
(such as a Windows NT domain), security tokens (such as an RSA SecurID) or by answering questions
drawn from an H.R. database.
• Support systems:
The system should automatically create issues / tickets in any help desk’s support system used by
the organization (such as Remedy or Peregrine).
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 7
Password Management Project Roadmap
• Electronic mail:
The system should be able to interact with users by e-mail – for example, to prompt them to register,
or notify them of events related to their login IDs.
• Telephony:
Users should be able to access a self-service password reset using existing telephony servers.
• System monitoring:
Existing infrastructure should be able to monitor the password management server health, and react
to alarm conditions.
4.1.4 Deployment
Deployment should be as simple as possible. Features supporting this objective include:
• No use of any desktop software components:
Even very small and simple desktop software must be deployed to thousands of PCs in a large orga-
nization. These PCs may not conform to corporate standards, and an installation process that works
for one may fail on another.
Clearly, it is preferable to avoid desktop software deployment entirely, and eliminate the related risks,
effort and expenditure.
• Minimize server agents:
Installing agents on a production server normally involves a lengthy change control process. Using
existing client software to communicate with servers reduces deployment time.
• Integrate with existing databases:
A password management system should take advantage of existing user profile databases, which
may include information such as a list of which systems each user logs into, or what questions to ask
a user to authenticate him if he forgot his password.
• Automatic discovery of login information:
The system should automatically detect new or deleted login IDs on the systems where it manages
passwords. This reduces both initial deployment and the ongoing administration effort.
• Self-service registration:
Users should be able to update their own profiles in the system, including login IDs and authentication
data.
4.1.5 Flexibility
The system should cope with both current and possible future requirements for:
• User interface:
The user interface should be customizable, and support different appearances for different users (such
as multiple languages or user groups).
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 8
Password Management Project Roadmap
• Help desk integration:
The business logic of updating information in a help desk system should be customizable.
• Password policy:
The system must be able to enforce a global password policy.
• Password reset authentication policy:
The system must support the organization’s policy for authenticating users who require a password
reset.
4.1.6 Security
A password management system literally owns the “keys to the kingdom” and consequently must meet the
most stringent security requirements:
• Encryption
– User access to the system must be encrypted, across every user interface where this is feasible
(a notable UI where this is not feasible is the telephone).
– Any sensitive data stored in the system should likewise be encrypted or hashed, as appropriate.
This includes administrative passwords of people authorized to manage the product, as well as
passwords used by the product to manage target systems. This also includes any sensitive user
profile data (e.g., authentication Q&A).
– The product should support encrypted communication with all target systems – including those
that do not natively implement an encrypted client/server protocol (e.g., most DBMS servers,
mainframes, etc.).
– Encryption should rely on well-known implementations of well-known, trusted encryption and
hashing algorithms.
– Encryption keys should be managed effectively. For example, public keys must be signed by a
real certificate authority (and not by the vendor). Private keys must be obscured and protected
by operating system ACLs.
• Authentication
– Users must be properly authenticated for every system access. This is done, for example, by
asking users to answer multiple personal questions, by having users type their password to some
trusted system, or using hardware tokens.
Some measures that are clearly not secure enough include:
* PINs – which can be guessed, may be intercepted in e-mail distribution, and are likely to be
forgotten by users in any case.
* Use of a single challenge/response question.
– Administrators must be duly authenticated prior to getting access to the system. They should
use the most secure means possible – e.g., hardware tokens or strong passwords. Q&A profiles
are generally not strong enough to be suitable for use by administrators.
• Accountability The system must record every possible event, so that users and administrators alike
can be held accountable for their actions.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 9
Password Management Project Roadmap
• Hardened platform
– The product should operate on a locked down operating system.
– The product should support a diversity of web servers, so that if a given web server is deemed
to have an unacceptable history of vulnerabilities, it can be avoided.
– The product should be accessible across web proxies, so that it can be installed in a protected
subnet, and accessed across a firewall without opening non-HTTPS ports.
– The product should not require the installation of (possibly insecure or vulnerable) client software.
4.2 Vendor profile
As with any vendor, the company supporting a password management system should offer sound support,
effective professional services, good relationships with other relevant vendors, and long term stability.
4.2.1 Financial stability
The five vendors with the largest market share in password management products are all small, and with
one exception privately held corporations.
In the interests of long term support for the technology, it is important to verify that prospective vendors are
financially sound: growing rather than shrinking, and profitable rather than burning cash reserves.
4.2.2 Quality of support
Quality technical support is crucial to project success. This is best measured by implementing the pass-
word management system in a test environment, and evaluating the ability of the vendor to assist in the
installation process.
4.2.3 Deployment time
Vendors should be able to offer turn-key or assisted deployments. A good vendor will be able to successfully
deploy the system in a minimum amount of time. A good product can be deployed without intrusion – without
installing desktop software, and with limited use of server agents.
The deployment effort in a large organization should not take more than 10-20 supplier person/days.
4.2.4 Single source
It is easier and safer to work with a vendor that can provide all the required technology directly. This
eliminates the risks of using third party technology, such as:
• Increased cost.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 10
Password Management Project Roadmap
• Uncertain future product availability and revision.
• Limited, poor or inconsistent technical support.
4.2.5 Future direction
The successful vendor should have a clear direction for future growth and technology advancement. This
helps to ensure vendor stability, and a sound future for the product.
4.2.6 Partners
Password management products must inter-operate with other I.T. infrastructure supported by current sup-
pliers. Relationships between a password management vendor and the vendors of other infrastructure or
services can streamline interoperability and ongoing support.
In particular, it is helpful if the password management vendor has a working relationship with providers of:
• Support portal technology.
• I.T. and help desk outsourcers.
• Security infrastructure.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 11
Password Management Project Roadmap
5 Project management
The following sections outline the objectives of each phase in a password management deployment project.
5.1 Project startup
To begin the project:
1. Perform a needs analysis, as described in Section 2 on Page 2.
2. Document technical and business requirements, as described in Section 4 on Page 6.
3. Establish a project whose mandate is to resolve the problems identified in the needs analysis.
4. Identify prospective vendors and products.
5. Allocate and approve people, systems and a budget.
5.2 Product selection
To make an effective product selection:
1. Perform some research to find out what products are currently available. Analyst firms generally know
which vendors have significant market share, and can identify prospects.
Another excellent source of information is the Internet: use a search engine to find sites that mention:
• “password synchronization,”
• “self-service password reset,”
• “help desk password reset”, and
• “password management.”
2. Once you have identified prospective vendors, forward your technical and business requirements
document to them, and request a proposal.
3. Provide the prospective vendors a list of key decision-makers in your organization and their selection
criteria. This will help vendors to focus their efforts on what matters most to you.
4. Evaluate the product in either a laboratory environment or with a pilot group of users and systems.
Evaluating products based on paper only is very risky. You may reach final conclusions based on
unfounded or inaccurate information.
Vendor RFP responses are no substitute for lab testing: some vendors will respond to RFPs based
on what they believe the customer wants to hear, with no bearing on what their product can actually
do, on the theory that “we can either build it later, or convince the customer that they don’t need it.”
Analyst reports are also no substitute for lab testing: the analysts do not install products in their own
labs, and instead rely on every vendor for an assessment of their own capabilities. Specific vendor
claims are not verified.
Ensure all features defined in the requirements document are tested and compared. This exercise will
highlight differences between products and vendors in a way that a paper process cannot.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 12
Password Management Project Roadmap
5. Compare vendor proposals, technical evaluation results and prices.
5.3 Acquisition
Once a product has been selected, negotiate on a price and project deliverables and sign a contract. Fixing
the price and deliverables (professional services, milestones, level of support) mitigates project risk.
Include a detailed list of deliverables and a statement of work attached to the contract.
5.4 Product deployment
Prepare a detailed deployment plan including: system design, schedule and resource allocation. These
should cover the following aspects:
1. Design:
Determine:
• Which features will be activated.
• How users will access the system.
• Which security policies (such as authentication process, password policy) will be enforced.
• Whether the system will integrate with the help desk issue tracking system, and if so how/when
it will create open/closed tickets.
• Whether the system will integrate with e-mail, the events that will trigger e-mail, and the mes-
sages to be delivered.
• Whether the system will integrate with an authentication database, and the database and schema
to be used.
• Whether the system will include meta directory integration, and the direction, directory, and at-
tributes to be used.
• The number of servers needed.
2. Installation:
Determine how you will carry out:
• Operating system and web server installation.
• Application software installation.
• Integration with the help desk system, meta directory, H.R. database, e-mail, authentication sys-
tems, etc.
• Multi-server replication.
3. Pilot test:
Determine how you will carry out the pilot test by:
• Deploying the system to a limited number of users.
• Verifying the functionality of the system.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 13
Password Management Project Roadmap
• Ensuring that the (possibly customized, possibly multi-lingual) user interface is easy to under-
stand.
• Verifying that all interfaces work as expected.
4. Training:
Determine how you will:
• Train help desk analysts to use the tool, and to assist users with using it.
• Compose training materials for the user population, to be posted on the Intranet and e-mailed
directly to users.
5. User roll-out:
Determine how you will notify users about the tool, and (if required) activate them.
Be sure to get supporting documentation and best practices from the vendor.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 14
Password Management Project Roadmap
6 Post deployment
While the bulk of the work in a password management deployment process ends with user roll-out, more
work is required on an on-going basis. This includes:
6.1 User adoption
• System logs should be analyzed periodically to measure utilization – how many users access the
software, and how often.
• Users who have not used the system should be prompted to do so, ideally using an automated pro-
cess.
• If there are persistent user adoption problems, users can be encouraged to use the system by offering
prizes, or required to use the system as a matter of policy.
6.2 Ongoing support and upgrades
A technical resource must be assigned to ongoing system support. In particular, this person must:
• Monitor the system.
• Act as an advocate for the system, to encourage utilization.
• Answer user and help desk questions.
• Periodically add target systems.
• Troubleshoot any problems that may arise.
• Alter integration business logic as help desk, authentication, meta directory and e-mail systems are
changed.
• Install software upgrades.
A mature product should allow to minimize the amount of effort required to perform these duties.
6.3 Measuring ROI
• System logs can be used to determine the incidence of help desk and self-service password resets
initially and over time.
• Logs can also be used to calculate the average time required by users and by support analysts to
resolve password problems on-line.
• This data should be used to support the initial project cost, in terms of reduced problem frequency,
reduced use of support resources, and faster problem resolution.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 15
Password Management Project Roadmap
7 Summary
Password management systems offer a simple way to improve user service, reduce network security vul-
nerabilities, and lower I.T. support costs.
A typical project can go through concept, needs analysis, technical requirements, product selection, instal-
lation, pilot testing and roll-out in six months or less. Positive return on investment is typically achieved
within 6 months of general roll-out.
www.Hitachi-ID.com
500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com
File: /pub/wp/psynch/documents/roadmap/roadmap4.tex
Date: 2011-01-25

Weitere ähnliche Inhalte

Was ist angesagt?

Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture Rajesh Kumar
 
Introduction to Azure Databricks
Introduction to Azure DatabricksIntroduction to Azure Databricks
Introduction to Azure DatabricksJames Serra
 
Managing Millions of Tests Using Databricks
Managing Millions of Tests Using DatabricksManaging Millions of Tests Using Databricks
Managing Millions of Tests Using DatabricksDatabricks
 
Smartsheet’s Transition to Snowflake and Databricks: The Why and Immediate Im...
Smartsheet’s Transition to Snowflake and Databricks: The Why and Immediate Im...Smartsheet’s Transition to Snowflake and Databricks: The Why and Immediate Im...
Smartsheet’s Transition to Snowflake and Databricks: The Why and Immediate Im...Databricks
 
Data Quality: principles, approaches, and best practices
Data Quality: principles, approaches, and best practicesData Quality: principles, approaches, and best practices
Data Quality: principles, approaches, and best practicesCarl Anderson
 
IT Enterprise architecture ppt
IT Enterprise architecture pptIT Enterprise architecture ppt
IT Enterprise architecture pptMonsif sakienah
 
Data Analytics and Business Intelligence
Data Analytics and Business IntelligenceData Analytics and Business Intelligence
Data Analytics and Business IntelligenceChris Ortega, MBA
 
Data as a Product by Wayne Eckerson
Data as a Product by Wayne EckersonData as a Product by Wayne Eckerson
Data as a Product by Wayne EckersonZoomdata
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data AnalyticsRohithND
 
Using Design System in Lightning Components
Using Design System in Lightning ComponentsUsing Design System in Lightning Components
Using Design System in Lightning ComponentsSalesforce Developers
 
Building Data Science Teams
Building Data Science TeamsBuilding Data Science Teams
Building Data Science TeamsEMC
 
Data Analyst Roles & Responsibilities | Edureka
Data Analyst Roles & Responsibilities | EdurekaData Analyst Roles & Responsibilities | Edureka
Data Analyst Roles & Responsibilities | EdurekaEdureka!
 
Introduction to Enterprise Architecture
Introduction to Enterprise Architecture Introduction to Enterprise Architecture
Introduction to Enterprise Architecture Leo Shuster
 
Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...Burak S. Arikan
 
Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26koolkampus
 
Lessons in Data Modeling: Why a Data Model is an Important Part of Your Data ...
Lessons in Data Modeling: Why a Data Model is an Important Part of Your Data ...Lessons in Data Modeling: Why a Data Model is an Important Part of Your Data ...
Lessons in Data Modeling: Why a Data Model is an Important Part of Your Data ...DATAVERSITY
 
Data science presentation
Data science presentationData science presentation
Data science presentationMSDEVMTL
 

Was ist angesagt? (20)

Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture Azure data analytics platform - A reference architecture
Azure data analytics platform - A reference architecture
 
Introduction to Azure Databricks
Introduction to Azure DatabricksIntroduction to Azure Databricks
Introduction to Azure Databricks
 
Managing Millions of Tests Using Databricks
Managing Millions of Tests Using DatabricksManaging Millions of Tests Using Databricks
Managing Millions of Tests Using Databricks
 
MDM and Reference Data
MDM and Reference DataMDM and Reference Data
MDM and Reference Data
 
Smartsheet’s Transition to Snowflake and Databricks: The Why and Immediate Im...
Smartsheet’s Transition to Snowflake and Databricks: The Why and Immediate Im...Smartsheet’s Transition to Snowflake and Databricks: The Why and Immediate Im...
Smartsheet’s Transition to Snowflake and Databricks: The Why and Immediate Im...
 
Data Quality: principles, approaches, and best practices
Data Quality: principles, approaches, and best practicesData Quality: principles, approaches, and best practices
Data Quality: principles, approaches, and best practices
 
IT Enterprise architecture ppt
IT Enterprise architecture pptIT Enterprise architecture ppt
IT Enterprise architecture ppt
 
Project report on blogs
Project report on blogsProject report on blogs
Project report on blogs
 
Data Analytics and Business Intelligence
Data Analytics and Business IntelligenceData Analytics and Business Intelligence
Data Analytics and Business Intelligence
 
Data as a Product by Wayne Eckerson
Data as a Product by Wayne EckersonData as a Product by Wayne Eckerson
Data as a Product by Wayne Eckerson
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Using Design System in Lightning Components
Using Design System in Lightning ComponentsUsing Design System in Lightning Components
Using Design System in Lightning Components
 
Building Data Science Teams
Building Data Science TeamsBuilding Data Science Teams
Building Data Science Teams
 
Data Analyst Roles & Responsibilities | Edureka
Data Analyst Roles & Responsibilities | EdurekaData Analyst Roles & Responsibilities | Edureka
Data Analyst Roles & Responsibilities | Edureka
 
Marketing Dashboards
Marketing DashboardsMarketing Dashboards
Marketing Dashboards
 
Introduction to Enterprise Architecture
Introduction to Enterprise Architecture Introduction to Enterprise Architecture
Introduction to Enterprise Architecture
 
Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...Data Quality Management - Data Issue Management & Resolutionn / Practical App...
Data Quality Management - Data Issue Management & Resolutionn / Practical App...
 
Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26
 
Lessons in Data Modeling: Why a Data Model is an Important Part of Your Data ...
Lessons in Data Modeling: Why a Data Model is an Important Part of Your Data ...Lessons in Data Modeling: Why a Data Model is an Important Part of Your Data ...
Lessons in Data Modeling: Why a Data Model is an Important Part of Your Data ...
 
Data science presentation
Data science presentationData science presentation
Data science presentation
 

Andere mochten auch

IPWEA NSW Division Conference: Engineering Cadet Programs
IPWEA NSW Division Conference: Engineering Cadet ProgramsIPWEA NSW Division Conference: Engineering Cadet Programs
IPWEA NSW Division Conference: Engineering Cadet ProgramsMelissa Gaspari
 
Adressing requirements with agile practices
Adressing requirements with agile practicesAdressing requirements with agile practices
Adressing requirements with agile practicesfboisvert
 
OpenNebula TechDay Ede: Status, Roadmap and New Features
OpenNebula TechDay Ede: Status, Roadmap and New FeaturesOpenNebula TechDay Ede: Status, Roadmap and New Features
OpenNebula TechDay Ede: Status, Roadmap and New FeaturesOpenNebula Project
 
Getting Started Hacking OpenNebula - Fosdem-2013
Getting Started Hacking OpenNebula - Fosdem-2013Getting Started Hacking OpenNebula - Fosdem-2013
Getting Started Hacking OpenNebula - Fosdem-2013OpenNebula Project
 
Project Management Office Roles Functions And Benefits
Project Management Office Roles Functions And BenefitsProject Management Office Roles Functions And Benefits
Project Management Office Roles Functions And BenefitsMaria Erland, PMP
 
Project Management Office (PMO)
Project Management Office (PMO)Project Management Office (PMO)
Project Management Office (PMO)Anand Subramaniam
 

Andere mochten auch (10)

IPWEA NSW Division Conference: Engineering Cadet Programs
IPWEA NSW Division Conference: Engineering Cadet ProgramsIPWEA NSW Division Conference: Engineering Cadet Programs
IPWEA NSW Division Conference: Engineering Cadet Programs
 
Adressing requirements with agile practices
Adressing requirements with agile practicesAdressing requirements with agile practices
Adressing requirements with agile practices
 
PROGRESS
PROGRESSPROGRESS
PROGRESS
 
OpenNebula TechDay Ede: Status, Roadmap and New Features
OpenNebula TechDay Ede: Status, Roadmap and New FeaturesOpenNebula TechDay Ede: Status, Roadmap and New Features
OpenNebula TechDay Ede: Status, Roadmap and New Features
 
Getting Started Hacking OpenNebula - Fosdem-2013
Getting Started Hacking OpenNebula - Fosdem-2013Getting Started Hacking OpenNebula - Fosdem-2013
Getting Started Hacking OpenNebula - Fosdem-2013
 
Sample Roadmaps
Sample RoadmapsSample Roadmaps
Sample Roadmaps
 
Fundamentos de gerenciamento de projetos
Fundamentos de gerenciamento de projetosFundamentos de gerenciamento de projetos
Fundamentos de gerenciamento de projetos
 
Network Transformation Roadmap
Network Transformation RoadmapNetwork Transformation Roadmap
Network Transformation Roadmap
 
Project Management Office Roles Functions And Benefits
Project Management Office Roles Functions And BenefitsProject Management Office Roles Functions And Benefits
Project Management Office Roles Functions And Benefits
 
Project Management Office (PMO)
Project Management Office (PMO)Project Management Office (PMO)
Project Management Office (PMO)
 

Ähnlich wie Password Management Project Guide

Chat Application [Full Documentation]
Chat Application [Full Documentation]Chat Application [Full Documentation]
Chat Application [Full Documentation]Rajon
 
Risk analyticsmaster
Risk analyticsmasterRisk analyticsmaster
Risk analyticsmasterMamadou Bass
 
3 openerp hr-book.complete
3 openerp hr-book.complete3 openerp hr-book.complete
3 openerp hr-book.completeopenerpwiki
 
Deployment guide series ibm tivoli security compliance manager sg246450
Deployment guide series ibm tivoli security compliance manager sg246450Deployment guide series ibm tivoli security compliance manager sg246450
Deployment guide series ibm tivoli security compliance manager sg246450Banking at Ho Chi Minh city
 
SW Deployment best practices
SW Deployment best practicesSW Deployment best practices
SW Deployment best practicesSyed Danish Irfan
 
Secure Management of Access to Privileged Accounts
Secure Management of Access to Privileged AccountsSecure Management of Access to Privileged Accounts
Secure Management of Access to Privileged AccountsHitachi ID Systems, Inc.
 
Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4Mehul Sanghavi
 
Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Banking at Ho Chi Minh city
 
Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Banking at Ho Chi Minh city
 
Certification study guide ibm tivoli access manager for e business 6.0 sg247202
Certification study guide ibm tivoli access manager for e business 6.0 sg247202Certification study guide ibm tivoli access manager for e business 6.0 sg247202
Certification study guide ibm tivoli access manager for e business 6.0 sg247202Banking at Ho Chi Minh city
 
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...EnriqueJoseCaleroGal
 
Deployment guide series ibm tivoli compliance insight manager sg247531
Deployment guide series ibm tivoli compliance insight manager sg247531Deployment guide series ibm tivoli compliance insight manager sg247531
Deployment guide series ibm tivoli compliance insight manager sg247531Banking at Ho Chi Minh city
 
Deployment guide series ibm tivoli compliance insight manager sg247531
Deployment guide series ibm tivoli compliance insight manager sg247531Deployment guide series ibm tivoli compliance insight manager sg247531
Deployment guide series ibm tivoli compliance insight manager sg247531Banking at Ho Chi Minh city
 
Ibm web sphere datapower b2b appliance xb60 revealed
Ibm web sphere datapower b2b appliance xb60 revealedIbm web sphere datapower b2b appliance xb60 revealed
Ibm web sphere datapower b2b appliance xb60 revealednetmotshop
 
bkremer-report-final
bkremer-report-finalbkremer-report-final
bkremer-report-finalBen Kremer
 

Ähnlich wie Password Management Project Guide (20)

Identity Management Project Roadmap
Identity Management Project RoadmapIdentity Management Project Roadmap
Identity Management Project Roadmap
 
Selecting a Password Management Product
Selecting a Password Management ProductSelecting a Password Management Product
Selecting a Password Management Product
 
Selecting a User Provisioning Solution
Selecting a User Provisioning SolutionSelecting a User Provisioning Solution
Selecting a User Provisioning Solution
 
sg247934
sg247934sg247934
sg247934
 
Chat Application [Full Documentation]
Chat Application [Full Documentation]Chat Application [Full Documentation]
Chat Application [Full Documentation]
 
Risk analyticsmaster
Risk analyticsmasterRisk analyticsmaster
Risk analyticsmaster
 
3 openerp hr-book.complete
3 openerp hr-book.complete3 openerp hr-book.complete
3 openerp hr-book.complete
 
Deployment guide series ibm tivoli security compliance manager sg246450
Deployment guide series ibm tivoli security compliance manager sg246450Deployment guide series ibm tivoli security compliance manager sg246450
Deployment guide series ibm tivoli security compliance manager sg246450
 
SW Deployment best practices
SW Deployment best practicesSW Deployment best practices
SW Deployment best practices
 
Secure Management of Access to Privileged Accounts
Secure Management of Access to Privileged AccountsSecure Management of Access to Privileged Accounts
Secure Management of Access to Privileged Accounts
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
 
Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4Oracle Web Conferencing - Release 2.0.4
Oracle Web Conferencing - Release 2.0.4
 
Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...
 
Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...
 
Certification study guide ibm tivoli access manager for e business 6.0 sg247202
Certification study guide ibm tivoli access manager for e business 6.0 sg247202Certification study guide ibm tivoli access manager for e business 6.0 sg247202
Certification study guide ibm tivoli access manager for e business 6.0 sg247202
 
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
 
Deployment guide series ibm tivoli compliance insight manager sg247531
Deployment guide series ibm tivoli compliance insight manager sg247531Deployment guide series ibm tivoli compliance insight manager sg247531
Deployment guide series ibm tivoli compliance insight manager sg247531
 
Deployment guide series ibm tivoli compliance insight manager sg247531
Deployment guide series ibm tivoli compliance insight manager sg247531Deployment guide series ibm tivoli compliance insight manager sg247531
Deployment guide series ibm tivoli compliance insight manager sg247531
 
Ibm web sphere datapower b2b appliance xb60 revealed
Ibm web sphere datapower b2b appliance xb60 revealedIbm web sphere datapower b2b appliance xb60 revealed
Ibm web sphere datapower b2b appliance xb60 revealed
 
bkremer-report-final
bkremer-report-finalbkremer-report-final
bkremer-report-final
 

Mehr von Hitachi ID Systems, Inc.

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 

Mehr von Hitachi ID Systems, Inc. (20)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 

Kürzlich hochgeladen

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 

Kürzlich hochgeladen (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 

Password Management Project Guide

  • 1. Password Management Project Roadmap © 2014 Hitachi ID Systems, Inc. All rights reserved.
  • 2. This document will guide you through the entire life of a successful password management project, includ- ing: • A needs analysis. • Who to involve in the project. • How to select the best product. • Technical design decisions. • How to effectively roll out the system. • How to monitor and assure sound ROI. Contents 1 Introduction 1 2 Needs analysis 2 2.1 Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 User productivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.3 Support cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.4 Security violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.5 OS migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3 Organization 4 3.1 Mandate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3.2 Budget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3.3 Participants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3.4 Ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4 Selecting a product 6 4.1 Technical requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.1.1 Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.1.2 Target systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 4.1.3 Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 4.1.4 Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 4.1.5 Flexibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 4.1.6 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 4.2 Vendor profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 i
  • 3. Password Management Project Roadmap 4.2.1 Financial stability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2.2 Quality of support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2.3 Deployment time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2.4 Single source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2.5 Future direction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4.2.6 Partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 5 Project management 12 5.1 Project startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 5.2 Product selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 5.3 Acquisition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 5.4 Product deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 6 Post deployment 15 6.1 User adoption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 6.2 Ongoing support and upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 6.3 Measuring ROI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 7 Summary 16 © 2014 Hitachi ID Systems, Inc. All rights reserved.
  • 4. Password Management Project Roadmap 1 Introduction As today’s organizations deploy an ever-growing number of complex systems, password management prob- lems choke help desk systems, cause expensive delays and lost productivity, and threaten to compromise security. Identifying the cause of these problems, and resolving them, requires the involvement of many interested parties and much strategic planning. Organizations can use a number of software products to address these issues. Selecting the right one also involves taking a number of important factors into consideration. This document will guide you through the entire life of a successful password management project, includ- ing: • A needs analysis. • Who to involve in the project. • How to select the best product. • Technical design decisions. • How to effectively roll out the system. • How to monitor and assure sound ROI. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 1
  • 5. Password Management Project Roadmap 2 Needs analysis The first step when selecting and deploying a password management product is to conduct a needs anal- ysis. The needs analysis should identify the problems that a password management system must solve. These should be translated into requirements which the successful vendor must meet. Following are the most common password management problems, and a brief description of password management functionalities that are required to solve them. 2.1 Complexity Users frequently have too many passwords on too many different systems. As a result, they either forget their passwords or violate security policy in an effort to remember them. A password management system should allow users to manage every password from a single screen, and allow users to synchronize their passwords to a single, hard-to-guess password. 2.2 User productivity Users who forget their passwords waste time on: • Trying to log in. • Calling the help desk. • Waiting for service. • Proving their identity (authenticating). • Waiting for a password reset. Each problem incident may consume 20-30 minutes of user time. In many organizations, users experience this problem 2-4 times annually. In a large user population, this generates a huge volume of user problems and help desk calls. A password management system should incorporate password synchronization, which helps users to re- member their passwords and thus eliminate the majority of password-related problems. It should also include a password self-reset and help desk password reset facility, to speed up the resolution of remaining password problems at the help desk. 2.3 Support cost Users who forget their passwords call the help desk, and get service. These calls normally represent 20% to 30% of total help desk call volume. • Password synchronization can reduce the incidence of password problems. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 2
  • 6. Password Management Project Roadmap • Self-service password resets help users resolve their own problems, rather than calling the help desk. • A help desk password reset facility should minimize problem resolution time by: – Integrating caller identification and authentication. – Supporting password reset on multiple systems from a single screen. – Automatically creating and closing call records. 2.4 Security violations In an effort to remember a large number of passwords, users may violate security policies by: • Writing down passwords. • Sharing passwords. • Selecting easily remembered and guessed passwords. • Not changing passwords. • Reusing old passwords. Password synchronization simplifies and automates the password change process while enforcing security procedures. A password policy engine should ensure that synchronized passwords are strong and changed regularly. 2.5 OS migration When new network systems are installed, users must be assigned new passwords. When many users are involved, creating new login IDs, assigning each of them an initial password, and securely communicating that password value to the user is a large undertaking. This process is required in projects such as new OS deployments (for example, migrating to Windows 2000 Active Directory), new authentication services (for example, RADIUS servers supporting many firewalls), and new application deployments (for example, SAP or PeopleSoft deployments). Password synchronization should allow administrators to assign existing users of new systems a random initial password. Users can then reset some or all of their passwords to a new, known value to gain access to new systems. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 3
  • 7. Password Management Project Roadmap 3 Organization To be successful, a password management project must have a mandate, a schedule and a budget. Persons in an organization with a vested interest in password management must be involved early in the project. This ensures that their requirements are met at the design stage, and that they will not object to any part of the project during deployment. 3.1 Mandate A password management project must start with a clear mandate to solve specific business problems. Section 2 on Page 2 outlines the most likely issues that must be resolved. Projects that start without this mandate may fail when the time comes to request resources and the support of groups within the organization. 3.2 Budget It is often helpful to verify, at the onset of a password management project, whether or when sufficient funds will be available. The following items require funding: • A software license for the selected product. • Annual support costs. • Training. • Hardware and associated software costs (including operating systems, network management soft- ware, installation). • Professional services – to install the selected product and to manage a roll-out. • Internal resources – for project management, product selection, installation and ongoing system ad- ministration and support. 3.3 Participants Early involvement by all interested parties in an organization ensures that the final design reflects all needs, and that no objections will be raised late in the project. The following groups are typically involved in a password management project: • The help desk / I.T. user support: Must understand how to use the system and its impact on their work. Password management systems typically produce the most tangible cost savings here. Help desk analysts will be the direct users of the system. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 4
  • 8. Password Management Project Roadmap • Desktop support: Must approve any software that will be installed or executed on workstations, as well as any proposed configuration changes. • Systems administrators: Must understand the impact of a password management solution on the systems they manage. • I.T. security: Must understand the impact on overall security policy and design. Should approve password policies and non-password authentication methods (for example, authentication used for password resets.) 3.4 Ownership It is crucial for a password management project to include the system’s long-term owner, as early as possi- ble. Ideally, the long-term system owner and the system’s technical administrator(s) will have a strong influence over product selection. These people will have to work with the system and its vendor, so they are more likely to take the time to make a critical analysis of product documentation, and undertake a technical laboratory evaluation of candidate products. It is risky, on the other hand, to have one team select a product, and a separate team install and manage it. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 5
  • 9. Password Management Project Roadmap 4 Selecting a product The ideal password management product should meet all of the project’s technical requirements, and be supported by a stable, mature and helpful vendor. The following sections describe the technical and business requirements that a password management system vendor should meet. 4.1 Technical requirements 4.1.1 Functionality A password management system should include functionality for: • Password synchronization: Users should be able to maintain a single password that applies to most, if not all, of their login IDs. This helps users remember their passwords and reduces calls to the help desk. Users with a single password are less likely to write down or share their passwords. • Self-service password reset: Users who forget their passwords should be able to quickly resolve their problems without calling the help desk. • Help desk password reset: Support analysts should be able to authenticate a caller, reset passwords and automatically create or close a help desk ticket from a single screen. This reduces call duration and cost, and improves customer service. • Multiple access methods: Users should be able to access the system using all methods offered by the organization, including: – A web browser and an existing password change user interface, for routine password changes. – A web browser from the user’s own desktop login screen, for self-service password resets. – An interactive voice response (IVR) system, for users who need to reset their remote access password. • Profile builders: – In some organizations, users have different login IDs on different systems. If no database exists to correlate IDs to users prior to deployment, then a profile builder must be available to collect this information from users. – If users will be authenticated for password resets using personal information profiles, then a pro- file builder may be required to update existing data (for example, in a human resources database) or to create new authentication profiles. In most cases, the user profile builders should be tools included in the password management au- thentication module. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 6
  • 10. Password Management Project Roadmap • Language support: Organizations that use languages other than English should be able to deploy the solution with multiple languages. 4.1.2 Target systems A successful password management system should be able to manage passwords on most or all of the systems to which users login with an ID and password. If this is not possible, then a threshold for systems that must be supported should be defined. A reasonable approach is to require the solution to manage passwords for systems that generate 95% of password-related calls to the help desk. Target systems should work “out of the box” in as many cases as possible. Where this is infeasible (e.g., home-grown applications, vertical market applications, legacy applications), the product should be open enough to make it possible to easily integrate with applications: • Some applications include an API for managing passwords. While rare, this is a useful mechanism to integrate a password management system. It’s useful to check the language bindings of any such API, and compare these to what the password management system supports. • Some applications include command-line tools to manage passwords. The password management system should be able to execute these – on whatever platform they are available. • Some applications store their passwords in a database, where a password management system may manipulate them directly. This includes client/server applications and web applications with DBMS back-ends. • Some applications run on midrange or mainframe systems, and can be manipulated by scripting interaction with a terminal login session. • Some applications present a web GUI, and a password management system can interact with them by simulating the actions of a web browser. 4.1.3 Integration A password management system should integrate seamlessly with existing I.T. infrastructure, including: • Authentication systems: Users should be able to authenticate using existing infrastructure – be it a network login ID/password (such as a Windows NT domain), security tokens (such as an RSA SecurID) or by answering questions drawn from an H.R. database. • Support systems: The system should automatically create issues / tickets in any help desk’s support system used by the organization (such as Remedy or Peregrine). © 2014 Hitachi ID Systems, Inc.. All rights reserved. 7
  • 11. Password Management Project Roadmap • Electronic mail: The system should be able to interact with users by e-mail – for example, to prompt them to register, or notify them of events related to their login IDs. • Telephony: Users should be able to access a self-service password reset using existing telephony servers. • System monitoring: Existing infrastructure should be able to monitor the password management server health, and react to alarm conditions. 4.1.4 Deployment Deployment should be as simple as possible. Features supporting this objective include: • No use of any desktop software components: Even very small and simple desktop software must be deployed to thousands of PCs in a large orga- nization. These PCs may not conform to corporate standards, and an installation process that works for one may fail on another. Clearly, it is preferable to avoid desktop software deployment entirely, and eliminate the related risks, effort and expenditure. • Minimize server agents: Installing agents on a production server normally involves a lengthy change control process. Using existing client software to communicate with servers reduces deployment time. • Integrate with existing databases: A password management system should take advantage of existing user profile databases, which may include information such as a list of which systems each user logs into, or what questions to ask a user to authenticate him if he forgot his password. • Automatic discovery of login information: The system should automatically detect new or deleted login IDs on the systems where it manages passwords. This reduces both initial deployment and the ongoing administration effort. • Self-service registration: Users should be able to update their own profiles in the system, including login IDs and authentication data. 4.1.5 Flexibility The system should cope with both current and possible future requirements for: • User interface: The user interface should be customizable, and support different appearances for different users (such as multiple languages or user groups). © 2014 Hitachi ID Systems, Inc.. All rights reserved. 8
  • 12. Password Management Project Roadmap • Help desk integration: The business logic of updating information in a help desk system should be customizable. • Password policy: The system must be able to enforce a global password policy. • Password reset authentication policy: The system must support the organization’s policy for authenticating users who require a password reset. 4.1.6 Security A password management system literally owns the “keys to the kingdom” and consequently must meet the most stringent security requirements: • Encryption – User access to the system must be encrypted, across every user interface where this is feasible (a notable UI where this is not feasible is the telephone). – Any sensitive data stored in the system should likewise be encrypted or hashed, as appropriate. This includes administrative passwords of people authorized to manage the product, as well as passwords used by the product to manage target systems. This also includes any sensitive user profile data (e.g., authentication Q&A). – The product should support encrypted communication with all target systems – including those that do not natively implement an encrypted client/server protocol (e.g., most DBMS servers, mainframes, etc.). – Encryption should rely on well-known implementations of well-known, trusted encryption and hashing algorithms. – Encryption keys should be managed effectively. For example, public keys must be signed by a real certificate authority (and not by the vendor). Private keys must be obscured and protected by operating system ACLs. • Authentication – Users must be properly authenticated for every system access. This is done, for example, by asking users to answer multiple personal questions, by having users type their password to some trusted system, or using hardware tokens. Some measures that are clearly not secure enough include: * PINs – which can be guessed, may be intercepted in e-mail distribution, and are likely to be forgotten by users in any case. * Use of a single challenge/response question. – Administrators must be duly authenticated prior to getting access to the system. They should use the most secure means possible – e.g., hardware tokens or strong passwords. Q&A profiles are generally not strong enough to be suitable for use by administrators. • Accountability The system must record every possible event, so that users and administrators alike can be held accountable for their actions. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 9
  • 13. Password Management Project Roadmap • Hardened platform – The product should operate on a locked down operating system. – The product should support a diversity of web servers, so that if a given web server is deemed to have an unacceptable history of vulnerabilities, it can be avoided. – The product should be accessible across web proxies, so that it can be installed in a protected subnet, and accessed across a firewall without opening non-HTTPS ports. – The product should not require the installation of (possibly insecure or vulnerable) client software. 4.2 Vendor profile As with any vendor, the company supporting a password management system should offer sound support, effective professional services, good relationships with other relevant vendors, and long term stability. 4.2.1 Financial stability The five vendors with the largest market share in password management products are all small, and with one exception privately held corporations. In the interests of long term support for the technology, it is important to verify that prospective vendors are financially sound: growing rather than shrinking, and profitable rather than burning cash reserves. 4.2.2 Quality of support Quality technical support is crucial to project success. This is best measured by implementing the pass- word management system in a test environment, and evaluating the ability of the vendor to assist in the installation process. 4.2.3 Deployment time Vendors should be able to offer turn-key or assisted deployments. A good vendor will be able to successfully deploy the system in a minimum amount of time. A good product can be deployed without intrusion – without installing desktop software, and with limited use of server agents. The deployment effort in a large organization should not take more than 10-20 supplier person/days. 4.2.4 Single source It is easier and safer to work with a vendor that can provide all the required technology directly. This eliminates the risks of using third party technology, such as: • Increased cost. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 10
  • 14. Password Management Project Roadmap • Uncertain future product availability and revision. • Limited, poor or inconsistent technical support. 4.2.5 Future direction The successful vendor should have a clear direction for future growth and technology advancement. This helps to ensure vendor stability, and a sound future for the product. 4.2.6 Partners Password management products must inter-operate with other I.T. infrastructure supported by current sup- pliers. Relationships between a password management vendor and the vendors of other infrastructure or services can streamline interoperability and ongoing support. In particular, it is helpful if the password management vendor has a working relationship with providers of: • Support portal technology. • I.T. and help desk outsourcers. • Security infrastructure. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 11
  • 15. Password Management Project Roadmap 5 Project management The following sections outline the objectives of each phase in a password management deployment project. 5.1 Project startup To begin the project: 1. Perform a needs analysis, as described in Section 2 on Page 2. 2. Document technical and business requirements, as described in Section 4 on Page 6. 3. Establish a project whose mandate is to resolve the problems identified in the needs analysis. 4. Identify prospective vendors and products. 5. Allocate and approve people, systems and a budget. 5.2 Product selection To make an effective product selection: 1. Perform some research to find out what products are currently available. Analyst firms generally know which vendors have significant market share, and can identify prospects. Another excellent source of information is the Internet: use a search engine to find sites that mention: • “password synchronization,” • “self-service password reset,” • “help desk password reset”, and • “password management.” 2. Once you have identified prospective vendors, forward your technical and business requirements document to them, and request a proposal. 3. Provide the prospective vendors a list of key decision-makers in your organization and their selection criteria. This will help vendors to focus their efforts on what matters most to you. 4. Evaluate the product in either a laboratory environment or with a pilot group of users and systems. Evaluating products based on paper only is very risky. You may reach final conclusions based on unfounded or inaccurate information. Vendor RFP responses are no substitute for lab testing: some vendors will respond to RFPs based on what they believe the customer wants to hear, with no bearing on what their product can actually do, on the theory that “we can either build it later, or convince the customer that they don’t need it.” Analyst reports are also no substitute for lab testing: the analysts do not install products in their own labs, and instead rely on every vendor for an assessment of their own capabilities. Specific vendor claims are not verified. Ensure all features defined in the requirements document are tested and compared. This exercise will highlight differences between products and vendors in a way that a paper process cannot. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 12
  • 16. Password Management Project Roadmap 5. Compare vendor proposals, technical evaluation results and prices. 5.3 Acquisition Once a product has been selected, negotiate on a price and project deliverables and sign a contract. Fixing the price and deliverables (professional services, milestones, level of support) mitigates project risk. Include a detailed list of deliverables and a statement of work attached to the contract. 5.4 Product deployment Prepare a detailed deployment plan including: system design, schedule and resource allocation. These should cover the following aspects: 1. Design: Determine: • Which features will be activated. • How users will access the system. • Which security policies (such as authentication process, password policy) will be enforced. • Whether the system will integrate with the help desk issue tracking system, and if so how/when it will create open/closed tickets. • Whether the system will integrate with e-mail, the events that will trigger e-mail, and the mes- sages to be delivered. • Whether the system will integrate with an authentication database, and the database and schema to be used. • Whether the system will include meta directory integration, and the direction, directory, and at- tributes to be used. • The number of servers needed. 2. Installation: Determine how you will carry out: • Operating system and web server installation. • Application software installation. • Integration with the help desk system, meta directory, H.R. database, e-mail, authentication sys- tems, etc. • Multi-server replication. 3. Pilot test: Determine how you will carry out the pilot test by: • Deploying the system to a limited number of users. • Verifying the functionality of the system. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 13
  • 17. Password Management Project Roadmap • Ensuring that the (possibly customized, possibly multi-lingual) user interface is easy to under- stand. • Verifying that all interfaces work as expected. 4. Training: Determine how you will: • Train help desk analysts to use the tool, and to assist users with using it. • Compose training materials for the user population, to be posted on the Intranet and e-mailed directly to users. 5. User roll-out: Determine how you will notify users about the tool, and (if required) activate them. Be sure to get supporting documentation and best practices from the vendor. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 14
  • 18. Password Management Project Roadmap 6 Post deployment While the bulk of the work in a password management deployment process ends with user roll-out, more work is required on an on-going basis. This includes: 6.1 User adoption • System logs should be analyzed periodically to measure utilization – how many users access the software, and how often. • Users who have not used the system should be prompted to do so, ideally using an automated pro- cess. • If there are persistent user adoption problems, users can be encouraged to use the system by offering prizes, or required to use the system as a matter of policy. 6.2 Ongoing support and upgrades A technical resource must be assigned to ongoing system support. In particular, this person must: • Monitor the system. • Act as an advocate for the system, to encourage utilization. • Answer user and help desk questions. • Periodically add target systems. • Troubleshoot any problems that may arise. • Alter integration business logic as help desk, authentication, meta directory and e-mail systems are changed. • Install software upgrades. A mature product should allow to minimize the amount of effort required to perform these duties. 6.3 Measuring ROI • System logs can be used to determine the incidence of help desk and self-service password resets initially and over time. • Logs can also be used to calculate the average time required by users and by support analysts to resolve password problems on-line. • This data should be used to support the initial project cost, in terms of reduced problem frequency, reduced use of support resources, and faster problem resolution. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 15
  • 19. Password Management Project Roadmap 7 Summary Password management systems offer a simple way to improve user service, reduce network security vul- nerabilities, and lower I.T. support costs. A typical project can go through concept, needs analysis, technical requirements, product selection, instal- lation, pilot testing and roll-out in six months or less. Positive return on investment is typically achieved within 6 months of general roll-out. www.Hitachi-ID.com 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com File: /pub/wp/psynch/documents/roadmap/roadmap4.tex Date: 2011-01-25