SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
Company	
  presenta-on	
  
Olivier	
  Naveau	
  
Managing	
  Director	
  
2
Our	
  history	
  of	
  IAM	
  
3
Access	
  control	
  is	
  on	
  top	
  of	
  priority	
  list!	
  
As	
  stated	
  by	
  Deloi.e	
  in	
  their	
  GFSI	
  Security	
  Survey,	
  top	
  
external	
  audit	
  findings	
  are	
  about	
  excessive	
  access	
  rights,	
  
segrega>on	
  of	
  du>es	
  and	
  access	
  control	
  compliance.	
  
h.p://www.deloi.e.com/gfsi/securitysurvey	
  
4
Why	
  access	
  control	
  remains	
  difficult?	
  
Who are my users?
What do they have access to?
Are these accesses legitimate?
Objectives
Landscape
Business applications are developed in
silos. IAM implies horizontal integration.
Multiplication of # of users and
of # of applications.
Evolving landscape: cloud, mobile, social,
compliance, liability
Iden-ty	
  &	
  Access	
  Management	
  
	
  
A	
  structured	
  approach	
  
6
Structured	
  approach	
  of	
  Iden-ty	
  &	
  Access	
  Mgmt	
  
1.  Data	
  model	
  
2.  Func>ons	
  &	
  Processes	
  
3.  Key	
  components	
  
4.  Business	
  values	
  
6
7
1.	
  Data	
  model:	
  administer	
  IAM	
  data	
  
Identity data
•  Identities
•  Attributes
(contractual status, dates, job description,
location)
•  Manager
•  Organization
•  Accounts
Access data
•  Business roles
•  Technical roles (or profiles)
•  Applications
•  Entitlements
•  Policies (or access rights)
(who, what, what for, condition)
Activity data
•  Authentication requests
•  Access requests
•  Changes to Identity data
•  Changes to Access data
8
1.	
  Data	
  model:	
  the	
  power	
  of	
  Brainwave	
  
9
2.	
  Iden-ty	
  &	
  Access	
  Management	
  processes	
  
Administer	
  
IAM	
  data	
  
Access	
  (or	
  use)	
  
IAM	
  data	
  
Control	
  
IAM	
  data	
  
Access
data
Identity
data
Authenticate
Authorize
Federate
Analyse
Audit
Comply
10
2.	
  Iden-ty	
  &	
  Access	
  Management	
  processes	
  
Administer	
  
IAM	
  data	
  
Access	
  (or	
  use)	
  
IAM	
  data	
  
Control	
  
IAM	
  data	
  
...	
  is	
  the	
  construc>on	
  phase	
  of	
  iden>ty,	
  and	
  subsequently	
  
providing	
  it	
  with	
  a	
  "personality"	
  by	
  assigning	
  a.ributes,	
  
en>tlements,	
  creden>als.	
  It	
  provides	
  the	
  create/maintain/
re>re	
  capabili>es	
  of	
  IAM.	
  Administra>on	
  also	
  provides	
  the	
  
plaPorm	
  for	
  intelligence:	
  a	
  means	
  to	
  make	
  sense	
  of	
  the	
  
iden>ty	
  and	
  access	
  events.	
  	
  
...	
  serves	
  as	
  a	
  founda>onal	
  plaPorm	
  to	
  facilitate	
  
authen>ca>on	
  and	
  authoriza>on,	
  and	
  the	
  capabili>es	
  within	
  
them,	
  from	
  single	
  sign-­‐on	
  to	
  en>tlements	
  resolu>on	
  and	
  
enforcement	
  of	
  access	
  decisions.	
  Access	
  is	
  the	
  "engine"	
  of	
  
IAM	
  that	
  takes	
  iden>>es	
  and	
  their	
  informa>on	
  and	
  uses	
  
them	
  to	
  effect.	
  
... generates reports for auditors, provides real-time
monitoring for operations and delivers the analytics
necessary for analysts and business stakeholders to
make intelligent, actionable decisions in the business
and in IT.
11
Techno-
logies
3.	
  Key	
  components	
  
ProcessesPeople
rely	
  on	
  support	
  
sustain	
  
Cendio®
ThinLinc
®
12
4.	
  Business	
  values:	
  iden-fy	
  and	
  measure	
  KPIs	
  
KPIs	
  
Efficiency	
  	
  
of	
  opera>ons	
  
Effec>veness	
  
of	
  security	
  
Enablement	
  
of	
  business	
  
Iden-ty	
  &	
  Access	
  Management	
  
	
  
Iden-ty	
  Intelligence	
  
	
  
Virtual	
  Desktop	
  Infrastructure	
  
	
  
	
  
	
  
Paradigmo’s	
  proposal	
  
14
Paradigmo’s	
  proposal	
  is	
  process	
  based	
  
Administer*
IAM*data*
Access*(or*use)*
IAM*data*
Control*
IAM*data*
Cendio®
ThinLinc
®
Boost**
user*mobility*
15
Account
Administer	
  
IAM	
  data	
  
The	
  theory	
  
Rules
Roles
Requests
Attributes
Actions
Objects
Policies
Conditions
Role management Policy management
16
File Share
Active Directory
Microsoft
Applica>ons	
  
Human	
  resources	
  
Signaletic
Attributes
Coarse-grained
Fine-grained
User	
  form	
  (C,U,D)	
  
Access	
  form	
  
Mandates	
  
Administer	
  
IAM	
  data	
  
A	
  standard	
  use	
  case	
  
Databases	
  
Profiles
17
PAP
Policy Manager:
-  Applications
-  Roles
-  URLs
-  Business Transactions
-  Conditions
-  Coarse-grained access matrix
-  Fine-grained access matrix
Corporate	
  
LDAP	
  
Mandates	
  
FAS
AUributes	
  
AUributes	
  
Mandates	
  
Roles	
  
Scope:
~140 internal applications
~30 external applications
Policies	
  	
  
ac-va-on	
  
Administer	
  
IAM	
  data	
  
Policy	
  Manager	
  
18
Applica-on	
  
Roles	
  (LDAP	
  filter)	
  
Coarse	
  
grained	
  
matrix	
  
URL	
  
Allow	
  
Deny	
  
Condi>on	
  (LDAP	
  filter)	
  
Roles	
  (LDAP	
  filter)	
  
Fine	
  
grained	
  
matrix	
  
BT	
  
Allow	
  
Deny	
  
Condi>on	
  (LDAP	
  filter)	
  
<URL,	
  [GET|POST]>	
  
<Resource,	
  Ac-on>	
  
Administer	
  
IAM	
  data	
  
ABAC	
  implementa-on	
  
Scope:
~140 internal applications
~30 external applications
19
Access	
  (or	
  use)	
  
IAM	
  data	
  
Identity
Provider
(IDP)
Service
Provider
(SP)
Applica>ons	
  
Concepts	
  
20
Why	
  ForgeRock?	
  
ü All-­‐in-­‐one	
  Unified	
  
Open	
  Iden>ty	
  Stack	
  
ü Easy	
  to	
  install	
  and	
  to	
  
operate:	
  one	
  single	
  process	
  
delivers	
  all	
  func>ons	
  
ü Simple	
  and	
  scalable	
  	
  
to	
  cope	
  with	
  Internet	
  scale	
  
ü Simple	
  and	
  flexible	
  
to	
  cope	
  with	
  new	
  concepts	
  
ü Support	
  and	
  extensibility	
  
capabili>es	
  (developer	
  
friendly)	
  
ü Subscrip>on	
  model,	
  no	
  
cost	
  un>l	
  Enterprise	
  build	
  
is	
  use	
  in	
  produc>on	
  
Administer*
IAM*data*
Access%(or%use)%
IAM%data%
21
FedICT	
  delivers	
  Federal	
  Authen>ca>on	
  Service	
  (FAS),	
  the	
  
reference	
  public	
  IDP	
  service	
  in	
  Belgium,	
  based	
  on	
  OpenAM.	
  
FPS	
  Finance	
  delivers	
  AuthN,	
  AuthZ	
  &	
  SSO	
  of	
  internal	
  (~140)	
  
and	
  external	
  (~30)	
  applica>ons	
  based	
  on	
  OpenSSO.	
  
Toyota	
  implemented	
  AuthN	
  &	
  AuthZ	
  of	
  “things”	
  on	
  OpenAM.	
  
For	
  internal	
  apps,	
  the	
  migra>on	
  is	
  ongoing.	
  	
  
Luxair	
  provides	
  AuthN,	
  AuthZ	
  &	
  SSO	
  for	
  home-­‐developed	
  
applica>ons	
  using	
  OpenAM.	
  	
  
BNP	
  PIP	
  uses	
  OpenDJ	
  to	
  provide	
  central	
  authen>ca>on	
  of	
  
Unix	
  administrators	
  and	
  users.	
  	
  
Clinique	
  Saint-­‐Luc	
  provides	
  AuthN,	
  AuthZ	
  &	
  SSO	
  of	
  
commercial	
  applica>ons	
  using	
  OpenAM.	
  	
  
Why	
  ForgeRock?	
  
Administer*
IAM*data*
Access%(or%use)%
IAM%data%
22
Use	
  cases	
  Control'
IAM'data'
Who are my users?
What do they have access to?
Are these accesses legitimate?
How do I communicate
on the role structure of
my organization?
How do I clean
up data before an
IAM deployment?
23
ü Control	
  oriented	
  approach:	
  it	
  
rebuilds	
  the	
  AM	
  theore>cal	
  model	
  
from	
  <accounts,	
  en>tlements>	
  
ü Low	
  footprint	
  on	
  organiza>on:	
  it	
  
applies	
  ETL	
  method	
  for	
  data	
  
loading	
  
ü Data	
  model	
  is	
  complete	
  and	
  
agnos>c	
  
ü BI	
  principles	
  applied	
  to	
  Iden>ty	
  for	
  
online	
  inves>ga>ons	
  or	
  repor>ng	
  
ü Full	
  history	
  built	
  through	
  
successive	
  snapshots	
  
Ø Quickly	
  delivers	
  concrete	
  results	
  
Why	
  Brainwave?	
  Control'
IAM'data'
D
a
t
a
24
ü Provide	
  a	
  feature-­‐rich	
  VDI	
  infrastructure	
  at	
  an	
  op>mized	
  cost	
  
ü Provide	
  fast	
  hot-­‐desking.	
  Typically,	
  nurses	
  in	
  hospitals	
  and	
  
clinics	
  
ü Support	
  remote	
  sites	
  or	
  home	
  workers	
  
ü Implement	
  ‘BYOD’	
  projects	
  
ü Support	
  advanced	
  graphics	
  
ü Op>mize	
  performance	
  of	
  Java	
  applica>ons	
  (when	
  there	
  are	
  
network	
  latencies)	
  
ü Support	
  Windows	
  and	
  Linux	
  desktops	
  
ü Lower	
  noise	
  level	
  in	
  training	
  rooms	
  
ü Secure	
  sterile	
  environments	
  
Boost%%
user%mobility%
	
  Use	
  cases	
  
25
Desktop(
access(
Desktop(
management(
Desktop(
virtualisa3on(
Cendio®
ThinLinc
®
•  IGEL thin client
(Windows or Linux)
•  IGEL UDC (Desktop converter)
•  IGEL UMS (Mgmt suite)
•  HW: Card reader, WIFI
•  SW: PowerTerm, Codec
•  All included in purchase price
•  Desktop and application virtualization
•  Session server, fast hot-desking support
•  Mixed Windows and Linux desktop
support
•  Advanced Graphics support
•  Optimized network performance
•  Concurrent licensing, subscription model
Boost%%
user%mobility%
Innova-ve	
  and	
  cost	
  effec-ve	
  solu-on	
  
26
Project	
  objec>ves	
  
	
  
ü Replace	
  1200	
  desktops	
  
whilst	
  op>mizing	
  costs	
  
ü Support	
  current	
  business	
  
requirements,	
  including	
  
hot-­‐desking	
  for	
  nurses	
  
ü Build	
  capacity	
  to	
  ease	
  
future	
  deployments	
  
ü Support	
  emerging	
  
concepts	
  (mobile,	
  cloud…)	
  
Project	
  achievements	
  
	
  
Ø IGEL	
  Thin	
  Client	
  +	
  IGEL	
  UDC	
  
+	
  IGEL	
  UMS	
  
	
  
Ø IGEL	
  /	
  Cendio	
  ThinLinc	
  /	
  
Smartcard	
  integra>on	
  
	
  
Ø Windows	
  2012	
  TS	
  server	
  
farm	
  
Ø Cendio	
  ThinLinc	
  mul>-­‐
client,	
  network	
  op>mized	
  
technology	
  	
  
Boost%%
user%mobility%
Reference	
  deployment:	
  
27
	
  
	
  
	
  
	
  
	
  
Olivier	
  Naveau	
  
Managing	
  Director	
  
	
  
olivier.naveau@paradigmo.com	
  
Ques-ons	
  &	
  answers	
  

Weitere ähnliche Inhalte

Was ist angesagt?

Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a serviceDell World
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Enterprise Management Associates
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trainings
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notesedwinlorenzana
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business casepmcbrideva1
 

Was ist angesagt? (20)

Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notes
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
 

Ähnlich wie Paradigmo specialised in Identity & Access Management

Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEsecuritysytem
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
Qwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica
 
Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014learPriority
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDNUG e.V.
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesSutedjo Tjahjadi
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceIBM Security
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudMicro Focus
 
Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...Judy Breedlove
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsIvanti
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilitiesshaun_raghavan
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceeG Innovations
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceChristine Ackley
 
Session 2023-11.pptx
Session 2023-11.pptxSession 2023-11.pptx
Session 2023-11.pptxAndreeaTom
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationRapidValue
 

Ähnlich wie Paradigmo specialised in Identity & Access Management (20)

Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAE
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Qwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di Qlik
 
Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilities
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
 
Session 2023-11.pptx
Session 2023-11.pptxSession 2023-11.pptx
Session 2023-11.pptx
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 

Kürzlich hochgeladen

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Paradigmo specialised in Identity & Access Management

  • 1. Company  presenta-on   Olivier  Naveau   Managing  Director  
  • 3. 3 Access  control  is  on  top  of  priority  list!   As  stated  by  Deloi.e  in  their  GFSI  Security  Survey,  top   external  audit  findings  are  about  excessive  access  rights,   segrega>on  of  du>es  and  access  control  compliance.   h.p://www.deloi.e.com/gfsi/securitysurvey  
  • 4. 4 Why  access  control  remains  difficult?   Who are my users? What do they have access to? Are these accesses legitimate? Objectives Landscape Business applications are developed in silos. IAM implies horizontal integration. Multiplication of # of users and of # of applications. Evolving landscape: cloud, mobile, social, compliance, liability
  • 5. Iden-ty  &  Access  Management     A  structured  approach  
  • 6. 6 Structured  approach  of  Iden-ty  &  Access  Mgmt   1.  Data  model   2.  Func>ons  &  Processes   3.  Key  components   4.  Business  values   6
  • 7. 7 1.  Data  model:  administer  IAM  data   Identity data •  Identities •  Attributes (contractual status, dates, job description, location) •  Manager •  Organization •  Accounts Access data •  Business roles •  Technical roles (or profiles) •  Applications •  Entitlements •  Policies (or access rights) (who, what, what for, condition) Activity data •  Authentication requests •  Access requests •  Changes to Identity data •  Changes to Access data
  • 8. 8 1.  Data  model:  the  power  of  Brainwave  
  • 9. 9 2.  Iden-ty  &  Access  Management  processes   Administer   IAM  data   Access  (or  use)   IAM  data   Control   IAM  data   Access data Identity data Authenticate Authorize Federate Analyse Audit Comply
  • 10. 10 2.  Iden-ty  &  Access  Management  processes   Administer   IAM  data   Access  (or  use)   IAM  data   Control   IAM  data   ...  is  the  construc>on  phase  of  iden>ty,  and  subsequently   providing  it  with  a  "personality"  by  assigning  a.ributes,   en>tlements,  creden>als.  It  provides  the  create/maintain/ re>re  capabili>es  of  IAM.  Administra>on  also  provides  the   plaPorm  for  intelligence:  a  means  to  make  sense  of  the   iden>ty  and  access  events.     ...  serves  as  a  founda>onal  plaPorm  to  facilitate   authen>ca>on  and  authoriza>on,  and  the  capabili>es  within   them,  from  single  sign-­‐on  to  en>tlements  resolu>on  and   enforcement  of  access  decisions.  Access  is  the  "engine"  of   IAM  that  takes  iden>>es  and  their  informa>on  and  uses   them  to  effect.   ... generates reports for auditors, provides real-time monitoring for operations and delivers the analytics necessary for analysts and business stakeholders to make intelligent, actionable decisions in the business and in IT.
  • 11. 11 Techno- logies 3.  Key  components   ProcessesPeople rely  on  support   sustain   Cendio® ThinLinc ®
  • 12. 12 4.  Business  values:  iden-fy  and  measure  KPIs   KPIs   Efficiency     of  opera>ons   Effec>veness   of  security   Enablement   of  business  
  • 13. Iden-ty  &  Access  Management     Iden-ty  Intelligence     Virtual  Desktop  Infrastructure         Paradigmo’s  proposal  
  • 14. 14 Paradigmo’s  proposal  is  process  based   Administer* IAM*data* Access*(or*use)* IAM*data* Control* IAM*data* Cendio® ThinLinc ® Boost** user*mobility*
  • 15. 15 Account Administer   IAM  data   The  theory   Rules Roles Requests Attributes Actions Objects Policies Conditions Role management Policy management
  • 16. 16 File Share Active Directory Microsoft Applica>ons   Human  resources   Signaletic Attributes Coarse-grained Fine-grained User  form  (C,U,D)   Access  form   Mandates   Administer   IAM  data   A  standard  use  case   Databases   Profiles
  • 17. 17 PAP Policy Manager: -  Applications -  Roles -  URLs -  Business Transactions -  Conditions -  Coarse-grained access matrix -  Fine-grained access matrix Corporate   LDAP   Mandates   FAS AUributes   AUributes   Mandates   Roles   Scope: ~140 internal applications ~30 external applications Policies     ac-va-on   Administer   IAM  data   Policy  Manager  
  • 18. 18 Applica-on   Roles  (LDAP  filter)   Coarse   grained   matrix   URL   Allow   Deny   Condi>on  (LDAP  filter)   Roles  (LDAP  filter)   Fine   grained   matrix   BT   Allow   Deny   Condi>on  (LDAP  filter)   <URL,  [GET|POST]>   <Resource,  Ac-on>   Administer   IAM  data   ABAC  implementa-on   Scope: ~140 internal applications ~30 external applications
  • 19. 19 Access  (or  use)   IAM  data   Identity Provider (IDP) Service Provider (SP) Applica>ons   Concepts  
  • 20. 20 Why  ForgeRock?   ü All-­‐in-­‐one  Unified   Open  Iden>ty  Stack   ü Easy  to  install  and  to   operate:  one  single  process   delivers  all  func>ons   ü Simple  and  scalable     to  cope  with  Internet  scale   ü Simple  and  flexible   to  cope  with  new  concepts   ü Support  and  extensibility   capabili>es  (developer   friendly)   ü Subscrip>on  model,  no   cost  un>l  Enterprise  build   is  use  in  produc>on   Administer* IAM*data* Access%(or%use)% IAM%data%
  • 21. 21 FedICT  delivers  Federal  Authen>ca>on  Service  (FAS),  the   reference  public  IDP  service  in  Belgium,  based  on  OpenAM.   FPS  Finance  delivers  AuthN,  AuthZ  &  SSO  of  internal  (~140)   and  external  (~30)  applica>ons  based  on  OpenSSO.   Toyota  implemented  AuthN  &  AuthZ  of  “things”  on  OpenAM.   For  internal  apps,  the  migra>on  is  ongoing.     Luxair  provides  AuthN,  AuthZ  &  SSO  for  home-­‐developed   applica>ons  using  OpenAM.     BNP  PIP  uses  OpenDJ  to  provide  central  authen>ca>on  of   Unix  administrators  and  users.     Clinique  Saint-­‐Luc  provides  AuthN,  AuthZ  &  SSO  of   commercial  applica>ons  using  OpenAM.     Why  ForgeRock?   Administer* IAM*data* Access%(or%use)% IAM%data%
  • 22. 22 Use  cases  Control' IAM'data' Who are my users? What do they have access to? Are these accesses legitimate? How do I communicate on the role structure of my organization? How do I clean up data before an IAM deployment?
  • 23. 23 ü Control  oriented  approach:  it   rebuilds  the  AM  theore>cal  model   from  <accounts,  en>tlements>   ü Low  footprint  on  organiza>on:  it   applies  ETL  method  for  data   loading   ü Data  model  is  complete  and   agnos>c   ü BI  principles  applied  to  Iden>ty  for   online  inves>ga>ons  or  repor>ng   ü Full  history  built  through   successive  snapshots   Ø Quickly  delivers  concrete  results   Why  Brainwave?  Control' IAM'data' D a t a
  • 24. 24 ü Provide  a  feature-­‐rich  VDI  infrastructure  at  an  op>mized  cost   ü Provide  fast  hot-­‐desking.  Typically,  nurses  in  hospitals  and   clinics   ü Support  remote  sites  or  home  workers   ü Implement  ‘BYOD’  projects   ü Support  advanced  graphics   ü Op>mize  performance  of  Java  applica>ons  (when  there  are   network  latencies)   ü Support  Windows  and  Linux  desktops   ü Lower  noise  level  in  training  rooms   ü Secure  sterile  environments   Boost%% user%mobility%  Use  cases  
  • 25. 25 Desktop( access( Desktop( management( Desktop( virtualisa3on( Cendio® ThinLinc ® •  IGEL thin client (Windows or Linux) •  IGEL UDC (Desktop converter) •  IGEL UMS (Mgmt suite) •  HW: Card reader, WIFI •  SW: PowerTerm, Codec •  All included in purchase price •  Desktop and application virtualization •  Session server, fast hot-desking support •  Mixed Windows and Linux desktop support •  Advanced Graphics support •  Optimized network performance •  Concurrent licensing, subscription model Boost%% user%mobility% Innova-ve  and  cost  effec-ve  solu-on  
  • 26. 26 Project  objec>ves     ü Replace  1200  desktops   whilst  op>mizing  costs   ü Support  current  business   requirements,  including   hot-­‐desking  for  nurses   ü Build  capacity  to  ease   future  deployments   ü Support  emerging   concepts  (mobile,  cloud…)   Project  achievements     Ø IGEL  Thin  Client  +  IGEL  UDC   +  IGEL  UMS     Ø IGEL  /  Cendio  ThinLinc  /   Smartcard  integra>on     Ø Windows  2012  TS  server   farm   Ø Cendio  ThinLinc  mul>-­‐ client,  network  op>mized   technology     Boost%% user%mobility% Reference  deployment:  
  • 27. 27           Olivier  Naveau   Managing  Director     olivier.naveau@paradigmo.com   Ques-ons  &  answers