SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Identifying the
Identity Managers
John Paschoud
Identity Management Matters
Lakeside Conference Centre, Aston University
16-Nov-2010
2
What are the business drivers for
better Identity Management?
• Process efficiency
– cost-savings on duplicated processes and systems
• Good information governance
– knowing who has access to what!
• Joined-up learning environments
– with library resources, research data,…
• National standards (UK Access federation)
• International standards (parallel education
federations now in most developed countries)
3
Who is the IdM Toolkit for?
Answer A:
• University & college ICT directors, CIOs etc
– …who would go to jail for really bad IdM
– …or at least have to explain to someone why they’ve
been kicked out of the UK federation
Answer B:
• Their staff who are either:
– Already quite good at the technicalities – but could do
with some guidance on what’s expected; OR
– Suddenly tasked with becoming the local expert in
IdM - and a bit scared
4
What’s in the Toolkit? [1]
• Introduction to Identity Management
– Defines basic terms and concepts of Identity Management used or assumed
elsewhere. Should be read by anyone using the Toolkit.
• Identity Management governance and policies
– Describes the roles, structures and policies required for Identity Management
and how they relate to Identity Management systems and processes. Useful for
Chief Information Officers or Directors responsible for IT, and staff who need to
draft or apply institutional policies.
• Identity Management systems, components and functions
– The technical components and functions of Identity Management systems in an
academic institution. Good background reading for IT service managers and
staff, and anyone discussing Identity Management with potential system
suppliers.
• Defining institutional requirements
– Functional requirements for each component of an Identity Management system,
which may be useful in defining the objectives of an in-house implementation
project or in detailed specifications to suppliers.
• Discovering and Auditing current institutional Identity Management
– A detailed guide to finding out the state of Identity Management in an institution
with a comprehensive audit (based on work of the JISC Identity Project which
developed and tested IdM audits in several universities).
5
What’s in the Toolkit? [2]
• Gap analysis
– Explains how to establish the current and desired states of affairs for Identity
Management, gives a list of common gaps in FHE institutions, and suggests
ways for developing a strategy.
• Institutional Roadmap
– Producing an overall roadmap or programme plan. Prioritising major deliverables
and milestones by achievability, cost and institutional impact.
• Designing and Managing an Identity Management project
– Project management issues particular to implementing Identity Management,
including key institutional benefits of improved Identity Management for use in an
institutional business case.
• Selecting supplier solutions
– Where commercial procurement of systems or components is required, this
section aims to help understand the IdM system solutions available, produce
procurement criteria, and construct tender documents.
6
Other useful things you’ll find at the
bottom of the toolbox
• Identity Management Glossary
• Providing network access for 'walk-in' users
• Identity Management Policy checklist
• Measuring user security behaviour
– How to run the “Passwords for Chocolate” test on your campus
7
Auditing Identity Management
in a university or college
• What is meant by an IdM audit
• How to propose an IdM audit to senior
management
• Project-managing an audit
• Finding the Identity Managers
• Finding out how IdM is done
• Analysing the information collected
• Presenting the results of an IdM audit
8
What's an IdM audit, and why do one?
What: An IdM audit is a comprehensive detailed study
of an organisation's identity management systems
and procedures. The aim is to find out how identity
management is carried out, even if some of the
practitioners do not realise they are identity
managers.
Why: Know where you are (many institutions probably
don't), before deciding which direction you need to
go!
Limitations: Not quantitative in the same way as a
financial audit. May decide to outscope paper-based
processes
9
Making the business case
for an IdM audit
• To be useful an IdM audit can be a
substantial job, needing project
management and proper justification
• The IdM Toolkit includes an outline
business case template based on the OGC
recommended structure
10
Managing an IdM audit as a project
Who should be involved
Senior staff (project board)
Key Researcher
Preparation
KR knowledge gaps – technical or
organisational?
Project planning
11
12
Stage 1 checklist
 a member of senior management backing the
audit
 a board that will oversee the project and are
agreed on scope, aims and methods
 a key researcher who is freed-up from other work;
and familiar (enough) with the technicalities of
IdM and the peculiarities of the institution
 a timetable and project plan
 a plan for the organisation of material collected by
the audit
13
Discovering where IdM goes on,
and who does it
• 'Obvious' processes
• Local knowledge (starting with the project
board)
• Good internal publicity
• Gathering documentation
14
Stage 2 checklist
 A long list of contacts (suspects?)
 A catalogue of documentation
(found so far)
15
Investigating IdM processes
• Prioritising contacts
• Arranging interviews
• (more) Internal PR
• Capturing information from interviews
• Template interview questions from the IdM
Toolkit
• Organising and storing interview material
16
Stage 3 checklist
 a short list of further contacts for
interview
 a collection of interview recordings
and transcripts/notes
17
Analysing and presenting findings
Executive summary
Methodology
Context: general description of the organisation
How identity information is managed
Integration of IdM systems and processes
Security and access control
Legal compliance and governance of IdM
Conclusions and recommendations
Where to get it:
www.Identity-Project.org
How to contact us:
JISC-IDENTITY-MANAGEMENT@JISCmail.ac.uk

Weitere ähnliche Inhalte

Ähnlich wie Identifying the Identity Managers

The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)JISC.AM
 
Requirements engineering iii
Requirements engineering iiiRequirements engineering iii
Requirements engineering iiiindrisrozas
 
Identity Matters
Identity MattersIdentity Matters
Identity Mattersguest0dc425
 
Introduction to Competitive Intelligence Portals
Introduction to Competitive Intelligence PortalsIntroduction to Competitive Intelligence Portals
Introduction to Competitive Intelligence PortalsComintelli
 
Scce webinar assessment_061316
Scce webinar assessment_061316Scce webinar assessment_061316
Scce webinar assessment_061316Eric Morehead
 
Module 6 - Systems Planning bak.pptx.pdf
Module 6 - Systems Planning bak.pptx.pdfModule 6 - Systems Planning bak.pptx.pdf
Module 6 - Systems Planning bak.pptx.pdfMASantos15
 
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsBeyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsMontrium
 
chapter02-120827115348-phpapp01.pdf
chapter02-120827115348-phpapp01.pdfchapter02-120827115348-phpapp01.pdf
chapter02-120827115348-phpapp01.pdfAxmedMaxamuud6
 
Chapter 2 Analyzing the Business Case .pptx
Chapter 2 Analyzing the Business Case .pptxChapter 2 Analyzing the Business Case .pptx
Chapter 2 Analyzing the Business Case .pptxAxmedMaxamuudYoonis
 
ISO 45001 Key Implementation Steps
ISO 45001 Key Implementation StepsISO 45001 Key Implementation Steps
ISO 45001 Key Implementation StepsPECB
 
The Project Management and Information Technology Context(1).pptx
The Project Management and Information Technology Context(1).pptxThe Project Management and Information Technology Context(1).pptx
The Project Management and Information Technology Context(1).pptxjayakodyjayakody
 
ORGANIZATION CONSULTANTS Enterprise Content Management a.docx
ORGANIZATION CONSULTANTS Enterprise Content Management a.docxORGANIZATION CONSULTANTS Enterprise Content Management a.docx
ORGANIZATION CONSULTANTS Enterprise Content Management a.docxvannagoforth
 
Business Analysis Fundamentals
Business Analysis FundamentalsBusiness Analysis Fundamentals
Business Analysis Fundamentalswaelsaid75
 
CRJS466 – Psychopathology and CriminalityUnit 5 Individual Proje.docx
CRJS466 – Psychopathology and CriminalityUnit 5 Individual Proje.docxCRJS466 – Psychopathology and CriminalityUnit 5 Individual Proje.docx
CRJS466 – Psychopathology and CriminalityUnit 5 Individual Proje.docxfaithxdunce63732
 
Business Analyst Series 2023 - Week 1 Session 2
Business Analyst Series 2023 -  Week 1 Session 2Business Analyst Series 2023 -  Week 1 Session 2
Business Analyst Series 2023 - Week 1 Session 2DianaGray10
 

Ähnlich wie Identifying the Identity Managers (20)

The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)
 
Auditing
AuditingAuditing
Auditing
 
Silabus el5213 internal auditing (audit internal) v021
Silabus el5213 internal auditing (audit internal) v021Silabus el5213 internal auditing (audit internal) v021
Silabus el5213 internal auditing (audit internal) v021
 
Requirements engineering iii
Requirements engineering iiiRequirements engineering iii
Requirements engineering iii
 
Identity Matters
Identity MattersIdentity Matters
Identity Matters
 
Introduction to Competitive Intelligence Portals
Introduction to Competitive Intelligence PortalsIntroduction to Competitive Intelligence Portals
Introduction to Competitive Intelligence Portals
 
Scce webinar assessment_061316
Scce webinar assessment_061316Scce webinar assessment_061316
Scce webinar assessment_061316
 
Module 6 - Systems Planning bak.pptx.pdf
Module 6 - Systems Planning bak.pptx.pdfModule 6 - Systems Planning bak.pptx.pdf
Module 6 - Systems Planning bak.pptx.pdf
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsBeyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
 
chapter02-120827115348-phpapp01.pdf
chapter02-120827115348-phpapp01.pdfchapter02-120827115348-phpapp01.pdf
chapter02-120827115348-phpapp01.pdf
 
Chapter 2 Analyzing the Business Case .pptx
Chapter 2 Analyzing the Business Case .pptxChapter 2 Analyzing the Business Case .pptx
Chapter 2 Analyzing the Business Case .pptx
 
Slalmd2014 cid presentation
Slalmd2014 cid presentationSlalmd2014 cid presentation
Slalmd2014 cid presentation
 
ISO 45001 Key Implementation Steps
ISO 45001 Key Implementation StepsISO 45001 Key Implementation Steps
ISO 45001 Key Implementation Steps
 
The Project Management and Information Technology Context(1).pptx
The Project Management and Information Technology Context(1).pptxThe Project Management and Information Technology Context(1).pptx
The Project Management and Information Technology Context(1).pptx
 
Sadchap02
Sadchap02Sadchap02
Sadchap02
 
ORGANIZATION CONSULTANTS Enterprise Content Management a.docx
ORGANIZATION CONSULTANTS Enterprise Content Management a.docxORGANIZATION CONSULTANTS Enterprise Content Management a.docx
ORGANIZATION CONSULTANTS Enterprise Content Management a.docx
 
Business Analysis Fundamentals
Business Analysis FundamentalsBusiness Analysis Fundamentals
Business Analysis Fundamentals
 
CRJS466 – Psychopathology and CriminalityUnit 5 Individual Proje.docx
CRJS466 – Psychopathology and CriminalityUnit 5 Individual Proje.docxCRJS466 – Psychopathology and CriminalityUnit 5 Individual Proje.docx
CRJS466 – Psychopathology and CriminalityUnit 5 Individual Proje.docx
 
Business Analyst Series 2023 - Week 1 Session 2
Business Analyst Series 2023 -  Week 1 Session 2Business Analyst Series 2023 -  Week 1 Session 2
Business Analyst Series 2023 - Week 1 Session 2
 

Mehr von JISC Netskills

Digital storytelling for public engagement
Digital storytelling for public engagementDigital storytelling for public engagement
Digital storytelling for public engagementJISC Netskills
 
A quick guide to taking awesome photos
A quick guide to taking awesome photosA quick guide to taking awesome photos
A quick guide to taking awesome photosJISC Netskills
 
Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)JISC Netskills
 
Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012JISC Netskills
 
Digital maps & data mash ups
Digital maps & data mash upsDigital maps & data mash ups
Digital maps & data mash upsJISC Netskills
 
Introducing digital storytelling
Introducing digital storytellingIntroducing digital storytelling
Introducing digital storytellingJISC Netskills
 
Web tools for administrators
Web tools for administratorsWeb tools for administrators
Web tools for administratorsJISC Netskills
 
A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)JISC Netskills
 
Embedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City UniversityEmbedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City UniversityJISC Netskills
 
Digital storytelling for the flipped classroom
Digital storytelling for the flipped classroomDigital storytelling for the flipped classroom
Digital storytelling for the flipped classroomJISC Netskills
 
Using free web based tools for collaborative e learning
Using free web based tools for collaborative e learningUsing free web based tools for collaborative e learning
Using free web based tools for collaborative e learningJISC Netskills
 
QR codes - the virtual poking into the real
QR codes - the virtual poking into the realQR codes - the virtual poking into the real
QR codes - the virtual poking into the realJISC Netskills
 

Mehr von JISC Netskills (20)

Digital storytelling for public engagement
Digital storytelling for public engagementDigital storytelling for public engagement
Digital storytelling for public engagement
 
A quick guide to taking awesome photos
A quick guide to taking awesome photosA quick guide to taking awesome photos
A quick guide to taking awesome photos
 
Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)
 
Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012
 
Digital maps & data mash ups
Digital maps & data mash upsDigital maps & data mash ups
Digital maps & data mash ups
 
Introducing digital storytelling
Introducing digital storytellingIntroducing digital storytelling
Introducing digital storytelling
 
Web tools for administrators
Web tools for administratorsWeb tools for administrators
Web tools for administrators
 
A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)
 
Embedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City UniversityEmbedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City University
 
Digital storytelling for the flipped classroom
Digital storytelling for the flipped classroomDigital storytelling for the flipped classroom
Digital storytelling for the flipped classroom
 
Using free web based tools for collaborative e learning
Using free web based tools for collaborative e learningUsing free web based tools for collaborative e learning
Using free web based tools for collaborative e learning
 
QR codes - the virtual poking into the real
QR codes - the virtual poking into the realQR codes - the virtual poking into the real
QR codes - the virtual poking into the real
 
Greenevents2
Greenevents2Greenevents2
Greenevents2
 
Greeningthedatacentre
GreeningthedatacentreGreeningthedatacentre
Greeningthedatacentre
 
Suste tech
Suste techSuste tech
Suste tech
 
Proco2
Proco2Proco2
Proco2
 
Kit catalogue
Kit catalogueKit catalogue
Kit catalogue
 
Virtually sustainable
Virtually sustainableVirtually sustainable
Virtually sustainable
 
Ucare
UcareUcare
Ucare
 
Stor c
Stor cStor c
Stor c
 

Kürzlich hochgeladen

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Identifying the Identity Managers

  • 1. Identifying the Identity Managers John Paschoud Identity Management Matters Lakeside Conference Centre, Aston University 16-Nov-2010
  • 2. 2 What are the business drivers for better Identity Management? • Process efficiency – cost-savings on duplicated processes and systems • Good information governance – knowing who has access to what! • Joined-up learning environments – with library resources, research data,… • National standards (UK Access federation) • International standards (parallel education federations now in most developed countries)
  • 3. 3 Who is the IdM Toolkit for? Answer A: • University & college ICT directors, CIOs etc – …who would go to jail for really bad IdM – …or at least have to explain to someone why they’ve been kicked out of the UK federation Answer B: • Their staff who are either: – Already quite good at the technicalities – but could do with some guidance on what’s expected; OR – Suddenly tasked with becoming the local expert in IdM - and a bit scared
  • 4. 4 What’s in the Toolkit? [1] • Introduction to Identity Management – Defines basic terms and concepts of Identity Management used or assumed elsewhere. Should be read by anyone using the Toolkit. • Identity Management governance and policies – Describes the roles, structures and policies required for Identity Management and how they relate to Identity Management systems and processes. Useful for Chief Information Officers or Directors responsible for IT, and staff who need to draft or apply institutional policies. • Identity Management systems, components and functions – The technical components and functions of Identity Management systems in an academic institution. Good background reading for IT service managers and staff, and anyone discussing Identity Management with potential system suppliers. • Defining institutional requirements – Functional requirements for each component of an Identity Management system, which may be useful in defining the objectives of an in-house implementation project or in detailed specifications to suppliers. • Discovering and Auditing current institutional Identity Management – A detailed guide to finding out the state of Identity Management in an institution with a comprehensive audit (based on work of the JISC Identity Project which developed and tested IdM audits in several universities).
  • 5. 5 What’s in the Toolkit? [2] • Gap analysis – Explains how to establish the current and desired states of affairs for Identity Management, gives a list of common gaps in FHE institutions, and suggests ways for developing a strategy. • Institutional Roadmap – Producing an overall roadmap or programme plan. Prioritising major deliverables and milestones by achievability, cost and institutional impact. • Designing and Managing an Identity Management project – Project management issues particular to implementing Identity Management, including key institutional benefits of improved Identity Management for use in an institutional business case. • Selecting supplier solutions – Where commercial procurement of systems or components is required, this section aims to help understand the IdM system solutions available, produce procurement criteria, and construct tender documents.
  • 6. 6 Other useful things you’ll find at the bottom of the toolbox • Identity Management Glossary • Providing network access for 'walk-in' users • Identity Management Policy checklist • Measuring user security behaviour – How to run the “Passwords for Chocolate” test on your campus
  • 7. 7 Auditing Identity Management in a university or college • What is meant by an IdM audit • How to propose an IdM audit to senior management • Project-managing an audit • Finding the Identity Managers • Finding out how IdM is done • Analysing the information collected • Presenting the results of an IdM audit
  • 8. 8 What's an IdM audit, and why do one? What: An IdM audit is a comprehensive detailed study of an organisation's identity management systems and procedures. The aim is to find out how identity management is carried out, even if some of the practitioners do not realise they are identity managers. Why: Know where you are (many institutions probably don't), before deciding which direction you need to go! Limitations: Not quantitative in the same way as a financial audit. May decide to outscope paper-based processes
  • 9. 9 Making the business case for an IdM audit • To be useful an IdM audit can be a substantial job, needing project management and proper justification • The IdM Toolkit includes an outline business case template based on the OGC recommended structure
  • 10. 10 Managing an IdM audit as a project Who should be involved Senior staff (project board) Key Researcher Preparation KR knowledge gaps – technical or organisational? Project planning
  • 11. 11
  • 12. 12 Stage 1 checklist  a member of senior management backing the audit  a board that will oversee the project and are agreed on scope, aims and methods  a key researcher who is freed-up from other work; and familiar (enough) with the technicalities of IdM and the peculiarities of the institution  a timetable and project plan  a plan for the organisation of material collected by the audit
  • 13. 13 Discovering where IdM goes on, and who does it • 'Obvious' processes • Local knowledge (starting with the project board) • Good internal publicity • Gathering documentation
  • 14. 14 Stage 2 checklist  A long list of contacts (suspects?)  A catalogue of documentation (found so far)
  • 15. 15 Investigating IdM processes • Prioritising contacts • Arranging interviews • (more) Internal PR • Capturing information from interviews • Template interview questions from the IdM Toolkit • Organising and storing interview material
  • 16. 16 Stage 3 checklist  a short list of further contacts for interview  a collection of interview recordings and transcripts/notes
  • 17. 17 Analysing and presenting findings Executive summary Methodology Context: general description of the organisation How identity information is managed Integration of IdM systems and processes Security and access control Legal compliance and governance of IdM Conclusions and recommendations
  • 18. Where to get it: www.Identity-Project.org How to contact us: JISC-IDENTITY-MANAGEMENT@JISCmail.ac.uk