SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Common pitfalls in IAM-projects
            Kim Westerlund, Nixu
            10.12.2009 Turku




Aug-13-10   © Nixu 2009
Agenda 9:00-10:30
  1.  Considerations for IAM-project planning
  2.  How to map IAM product capabilities with real
      life use cases




Aug-13-10   © Nixu 2009
                              Sorry, some recycled slides are in Finnish
Kim Westerlund Verkot & Tietoturva –konferenssissa 2006:




                                                           (Ajatuksia lainattu Mark Dixonilta)
It’s a journey…

1.  Kick off the learning process
2.  Get and keep sponsorship
3.  Get value consensus early
4.  Manage ambitions
5.  Partition, sequence, conquer
6.  Understand current processes
7.  Offer design choices
8.  Plan processes and governance
9.  Deploy with clean data
To be considered up front (identity
  management readiness check)
    Are these normal project initialization questions
     for you?
        What do you want to achieve with the IdM-program,
              and why?
             What processes should your IdM-program touch?
             Do you have defined owners for systems that are
              involved?
             Do we really have time for such a demanding project?
             Do we understand how the resulting IdM-service will
              affect our data architecture?
             Do we have the money (license fees could be less
              that 30% of the total investment)?


Aug-13-10   © Nixu 2009
Look for REAL (business) drivers
  that reflects your situation
                                         These could
                                         be headlines,
                                        not the content
                                             itself!!!




Aug-13-10   © Nixu 2009   … you will need them later
Example Business capability flows
Operating drivers              Business capabilities      Functional impact

Complete, unique,                                          Less incremental
                                       Faster time to
  current, stable                                                cost
                                     benefit on mergers
accessible identity
       data                                                Earlier operational
                                      Business process          efficiency
             Automated user          response to market
              provisioning                changes           Retained assets
                                                               and trust
                 Shared               Secure business
                                        processes              Points of
              authentication
                                                             administration
                 services
                                                              eliminated
                                      Cost efficiencies
             Delegated user           freeing staff and    Fewer, faster, less
              management                    cash            skilled help desk
                                                                 incidents
                User self-
                                        Internet age
               registration                                Better reputation
                                          services
Select a methodological approach…
…like ”JHS165: Tietojärjestelmien vaatimusten määrittely osana
järjestelmän hankintaa”
An agile approach
1.  Write user stories
   http://en.wikipedia.org/wiki/User_story

2.  Define use cases of strategic functionalities
   http://en.wikipedia.org/wiki/Use_case

3.  Illustrate the functionality with wire frame
    models
4.  Define 3 months phases with useful deliverables
    that show real value to your organization




                                 … you will need them later
Identity and Access Management as a real
business solution
A holistic approach to identity management
services is an elephant
              Employees        Students         Partners
             •  Policy       •  Policy       •  Policy
 Manageme




                                                             Solution
  Access


             •  Technology   •  Technology   •  Technology
    nt


             •  Processes    •  Processes    •  Processes
             •  Services     •  Services     •  Services
             •  Interfaces   •  Interfaces   •  Interfaces

             •  Policy       •  Policy       •  Policy
 Manageme




                                                             Solution
             •  Technology   •  Technology   •  Technology
  Identity




             •  Processes    •  Processes    •  Processes
     nt




             •  Services     •  Services     •  Services
             •  Interfaces   •  Interfaces   •  Interfaces

             • Policy        •  Policy       •  Policy
 User Data




                                                             Solution
             •  Technology   •  Technology   •  Technology
  Stores




             •  Services     •  Services     •  Services




                   SSO             SSO             SSO
Slicing the elephant into pieces (example1):
  Focus on student on boarding and termination processes with
  automation to some select applications.




Aug-13-10   © Nixu 2009
Slicing the elephant into pieces (example2):
  Enable a better user experience and a architectural building
  block for renewable application with WebSSO.




Aug-13-10   © Nixu 2009
Use a proven methodological approach
  – start with a pre-study project


                         Pre-study




03/13/09   © Nixu 2009
Define (feasibility study)
•  Key planning factors of current
   state
•  Architecture guiding principles
•  Building-block architecture
•  Technology recommendations
•  Business value
   communications
•  High level roadmap
•  Key stakeholders
Sequencing the work – what first
  Early business value
  High benefit to cost
  High benefit to risk
  Greatest testimonial impact
  Friendly or captive client
  Critical mass necessity

            Operational          Security
             efficiency



                   Cost            Risks


Aug-13-10    © Nixu 2009
Inspect what is the cost of doing
nothing…

  Hidden costs due to redundant work
  Cost due to delays in getting access
  Checks, fixes and reporting costs
  System implementation projects re-
   inventing the wheel


  Technology itself doesn’t generate benefits
  Technology is involved in implementing
   new processes
Optimal IAM Project Methodology
•  Focussed on;
   •    People and Processes,
   •    Business Benefits,
   •    Requirements and use cases,
   •    Risk Management
•  Producticed approach
The waterfall model
                     The proposed project



      Requir
                                          Imple      Verific        Mainte
      ement           Design
                                          ment       ation          nance
        s



          http://en.wikipedia.org/wiki/
             Big_Design_Up_Front

            The waterfall model is argued by many to be a bad idea in practice.
 This is mainly because of their belief that it is impossible for any non-trivial project to
get one phase of a software product's lifecycle perfected, before moving on to the next
   Aug-13-10  © Nixu 2009    phases and learning from them.
… and what’s sometimes
  forgotten




                 Roadma           Role                Support
                    p                                                    Commun
                                 mining &              model              ication
    Current      develop-        modellin      Process
     state        ment              g         alignmen          Change
                                                                             Roadma
     study                                         t     New    manage
                            Data                                                p
                                      Overall         processe ment          executio
                          clensing
                                     architec-             s                    n
                                       ture            impleme
Aug-13-10   © Nixu 2009
                                                        ntation
Problems with public procurement
    You should know in advance what you want
    Customer responsibilities are usually not defined
     in the call for bids
        –  Vendors estimate (misjudges) these differently –
           proposals aren’t comparable
    The Desing phase could and should change the
     desired state  minimize desing upfront by defining only
       functional requirements and only some non-functional reqs.
    Fixed fee IAM-projects seldom work for the best
     and may lead to a lose-lose result



Aug-13-10   © Nixu 2009
It’s a journey; remember to…

1.  Kick off the learning process
2.  Get and keep sponsorship
3.  Get value consensus early
4.  Manage ambitions
5.  Partition, sequence, conquer
6.  Understand current processes
7.  Offer design choices
8.  Plan processes and governance
9.  Deploy with clean data
How to map IAM product capabilities with
  real life use cases




Aug-13-10   © Nixu 2009
It’s too hard to pick the right IAM-products
    by mapping features to your needs
Product solutions per area

 Identity Management              Web Access                     Federated Single Sign-
                                  management                     On
   Oracle Identity Manager
   IBM Tivoli Identity Manager     Sun Access Manager            Almost every access
   Sun Identity Manager            Oracle Access Manager       management vendor
   CA Identity Manager             EMC/RSA Access Manger         PingIdentity
   BMC User Administration and     CA Siteminder access          Symlabs
 Provisioning                     manager                          OSS: OpenSAML, SourceID,
   SAP NetWeaver Identity          Novell Access Manager       SimpleSAML
 Management                         BMC Access Management
   Novell Identity manager         IBM Tivoli Access Manager
   Omada Identity Manager          Entrust GetAccess
   Microsoft Forefron Identity     Ubisecure Ubilogin
 Manager                            Fujitsu mPollux
   Propentus Permission            OSS: OpenSSO, JOSSO,
 Manager                          Pubcookie, WebAuth, JASIG
   OSS: Velo, Ganymede           CAS
Selecting the right products
    DO NOT MAKE THE SELECTION BEFORE YOU KNOW
     WHAT YOU WANT


    Do not think about the suite if it’s not about the product
     price
    Choose it based on real use cases, not product features
    Define minimal tailored functionality that you want be
     supported by the vendor.
        –  Most of your desires are “can do, but it will cost you big bucks”
        –  Try simplifying processes – it’s anyway cheaper
        –  Requires open discussion with the vendor –
           “neuvottelumenettely” read JHS167
           http://www.jhs-suositukset.fi/suomi/jhs167
           IT DOESN’T COMP
    Consider also post-implementation processes


Aug-13-10   © Nixu 2009
kim.westerlund@nixu.com
     040 5123 125
Thank you, kiitos, tack

                                    Nixu Oy
                           P.O. Box 39 (Keilaranta 15)
                                FI-02150 Espoo
                                    Finland


                              Tel +358 9 478 1011




Aug-13-10   © Nixu 2009
Nixu IdM feasibility study deliverables (fi or en)
Deliverable                 Purpose
Work plan                   Project plan for pre-study phase
Work shop presentations     Executive summary and supporting graphics
Identity management         Helps to understand the Identity and Access Management concept and “speak the same
glossary                    language”.
Business overview with      Describes the business as-is and to-be situation. The business environment with partner
business flows              and customer network material flows between the unit and other parties. Explains the roles
description                 of parties in the process. Volumes of flows are attached. Business requirements are linked
                            to the business flows
Requirements                Understand and document the key requirements to be covered
                            •  Business requirements (e.g. KPIs, critical functionalty)
                            •  Process & organisation requirements (usability, language, resource reqeuirements)
                            •  Performance requirements (speed, volumes)
                            •  System requirements (integration)
                            •  Technical requirements (infrastructure and environments)
                            •  Data requirements
                            •  General project requirements e.g. schedule, resources, other
                            Main requirements are recorded and prioritized on the issue site latest when project is
                            approved.
Solution architecture/      Description of in scope modules and components, remaining and replaced systems and
Solution Match              required integration
                            Initial fit/gap list and open issues that need to be clarified
Business case               Business case calculating espected costs/benefits from the project
Management material         Summarizes findings of feasibility study. Answers the questions: ”why should the project be
                            implemented?” ”What should be implemented?” How and when and on what terms is it
                            possible? ” What are the risks and constraints?”. Decision to start project can be made.
              © Nixu 2009

Weitere ähnliche Inhalte

Was ist angesagt?

Smart Metering, Networking and Operations Summit
Smart Metering, Networking and Operations SummitSmart Metering, Networking and Operations Summit
Smart Metering, Networking and Operations SummitNicole Waddell
 
Rethink IT. Reinvent Business. - Dharanibalan Gurunathan
Rethink IT. Reinvent Business. - Dharanibalan GurunathanRethink IT. Reinvent Business. - Dharanibalan Gurunathan
Rethink IT. Reinvent Business. - Dharanibalan GurunathanJyothi Satyanathan
 
Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Grenville Lannon
 
Maximising digital engagement and inclusion 2.0
Maximising digital engagement and inclusion 2.0Maximising digital engagement and inclusion 2.0
Maximising digital engagement and inclusion 2.0Access iQ
 
Leveraging Virtualization from an IT Project to a Business Strategy
Leveraging Virtualization from an IT Project to a Business StrategyLeveraging Virtualization from an IT Project to a Business Strategy
Leveraging Virtualization from an IT Project to a Business StrategyDavid Resnic
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonSalmon Limited
 
Empowering the CIO: Enabling smarter decisions with application portfolio man...
Empowering the CIO: Enabling smarter decisions with application portfolio man...Empowering the CIO: Enabling smarter decisions with application portfolio man...
Empowering the CIO: Enabling smarter decisions with application portfolio man...IBM Rational software
 
Case Management: Managing chaos: unstructured processes and dynamic BPM
Case Management: Managing chaos: unstructured processes and dynamic BPMCase Management: Managing chaos: unstructured processes and dynamic BPM
Case Management: Managing chaos: unstructured processes and dynamic BPMCapgemini
 
YJT Solutions Overview Presentation
YJT Solutions Overview PresentationYJT Solutions Overview Presentation
YJT Solutions Overview PresentationYJT Solutions
 
Ibm pure flex client presentation
Ibm pure flex client presentationIbm pure flex client presentation
Ibm pure flex client presentationArrow ECS UK
 
IBM PureSystems - a ground breaking new family of Expert Integrated Systems.
IBM PureSystems - a ground breaking new family of Expert Integrated Systems.IBM PureSystems - a ground breaking new family of Expert Integrated Systems.
IBM PureSystems - a ground breaking new family of Expert Integrated Systems.Gen-i
 
The new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T SlovenijaThe new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T SlovenijaS&T GROUP
 
Opposites Attract SOA, Agile, MDA
Opposites Attract SOA, Agile, MDAOpposites Attract SOA, Agile, MDA
Opposites Attract SOA, Agile, MDADenzil Wasson
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportPaul Muller
 

Was ist angesagt? (18)

Smart Metering, Networking and Operations Summit
Smart Metering, Networking and Operations SummitSmart Metering, Networking and Operations Summit
Smart Metering, Networking and Operations Summit
 
Step Fwd It
Step Fwd ItStep Fwd It
Step Fwd It
 
Rethink IT. Reinvent Business. - Dharanibalan Gurunathan
Rethink IT. Reinvent Business. - Dharanibalan GurunathanRethink IT. Reinvent Business. - Dharanibalan Gurunathan
Rethink IT. Reinvent Business. - Dharanibalan Gurunathan
 
Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2Isys40051 12 is suppliers & outsourcing v2
Isys40051 12 is suppliers & outsourcing v2
 
Maximising digital engagement and inclusion 2.0
Maximising digital engagement and inclusion 2.0Maximising digital engagement and inclusion 2.0
Maximising digital engagement and inclusion 2.0
 
Child Wear Ea Blueprint V0.7
Child Wear Ea Blueprint V0.7Child Wear Ea Blueprint V0.7
Child Wear Ea Blueprint V0.7
 
Leveraging Virtualization from an IT Project to a Business Strategy
Leveraging Virtualization from an IT Project to a Business StrategyLeveraging Virtualization from an IT Project to a Business Strategy
Leveraging Virtualization from an IT Project to a Business Strategy
 
[StepTalks2011] Agility @ Scale - Rien Schot
[StepTalks2011] Agility @ Scale - Rien Schot[StepTalks2011] Agility @ Scale - Rien Schot
[StepTalks2011] Agility @ Scale - Rien Schot
 
Scalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: SalmonScalable eCommerce Solutions: Salmon
Scalable eCommerce Solutions: Salmon
 
Empowering the CIO: Enabling smarter decisions with application portfolio man...
Empowering the CIO: Enabling smarter decisions with application portfolio man...Empowering the CIO: Enabling smarter decisions with application portfolio man...
Empowering the CIO: Enabling smarter decisions with application portfolio man...
 
Case Management: Managing chaos: unstructured processes and dynamic BPM
Case Management: Managing chaos: unstructured processes and dynamic BPMCase Management: Managing chaos: unstructured processes and dynamic BPM
Case Management: Managing chaos: unstructured processes and dynamic BPM
 
YJT Solutions Overview Presentation
YJT Solutions Overview PresentationYJT Solutions Overview Presentation
YJT Solutions Overview Presentation
 
Ibm pure flex client presentation
Ibm pure flex client presentationIbm pure flex client presentation
Ibm pure flex client presentation
 
IBM PureSystems - a ground breaking new family of Expert Integrated Systems.
IBM PureSystems - a ground breaking new family of Expert Integrated Systems.IBM PureSystems - a ground breaking new family of Expert Integrated Systems.
IBM PureSystems - a ground breaking new family of Expert Integrated Systems.
 
The new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T SlovenijaThe new role of CIO, Borut Kolmanič, S&T Slovenija
The new role of CIO, Borut Kolmanič, S&T Slovenija
 
Opposites Attract SOA, Agile, MDA
Opposites Attract SOA, Agile, MDAOpposites Attract SOA, Agile, MDA
Opposites Attract SOA, Agile, MDA
 
Loan disbursement automation
Loan disbursement automationLoan disbursement automation
Loan disbursement automation
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team Sport
 

Andere mochten auch

Nixu Cyber Defense Center - You have one fear less.
Nixu Cyber Defense Center - You have one fear less.Nixu Cyber Defense Center - You have one fear less.
Nixu Cyber Defense Center - You have one fear less.Nixu Corporation
 
Nixu 30.8.2016 First North -tilaisuus Nordnet
Nixu 30.8.2016 First North -tilaisuus NordnetNixu 30.8.2016 First North -tilaisuus Nordnet
Nixu 30.8.2016 First North -tilaisuus NordnetNordnet Suomi
 
Tietovastuu - Pilvipalveluiden turvallisuus
Tietovastuu - Pilvipalveluiden turvallisuusTietovastuu - Pilvipalveluiden turvallisuus
Tietovastuu - Pilvipalveluiden turvallisuusNixu Corporation
 
Proton Induced X Ray Emission P P
Proton  Induced  X  Ray  Emission  P PProton  Induced  X  Ray  Emission  P P
Proton Induced X Ray Emission P Pguest123ae0
 
2. x ray emission
2. x ray emission2. x ray emission
2. x ray emissionAbuIshaq
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?Nixu Corporation
 
PCI DSS 3.0 muutokset – “editor’s pick”
PCI DSS 3.0 muutokset – “editor’s pick”PCI DSS 3.0 muutokset – “editor’s pick”
PCI DSS 3.0 muutokset – “editor’s pick”Nixu Corporation
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsLeonardo
 
Finland, a cyber threat preparedness forerunner?
Finland, a cyber threat preparedness forerunner?Finland, a cyber threat preparedness forerunner?
Finland, a cyber threat preparedness forerunner?Jyrki Kasvi
 
Network Automation in Support of Cyber Defense
Network Automation in Support of Cyber DefenseNetwork Automation in Support of Cyber Defense
Network Automation in Support of Cyber DefenseRichard Larkin
 

Andere mochten auch (13)

Nixu Cyber Defense Center - You have one fear less.
Nixu Cyber Defense Center - You have one fear less.Nixu Cyber Defense Center - You have one fear less.
Nixu Cyber Defense Center - You have one fear less.
 
Nixu 30.8.2016 First North -tilaisuus Nordnet
Nixu 30.8.2016 First North -tilaisuus NordnetNixu 30.8.2016 First North -tilaisuus Nordnet
Nixu 30.8.2016 First North -tilaisuus Nordnet
 
Tietovastuu - Pilvipalveluiden turvallisuus
Tietovastuu - Pilvipalveluiden turvallisuusTietovastuu - Pilvipalveluiden turvallisuus
Tietovastuu - Pilvipalveluiden turvallisuus
 
Proton Induced X Ray Emission P P
Proton  Induced  X  Ray  Emission  P PProton  Induced  X  Ray  Emission  P P
Proton Induced X Ray Emission P P
 
X ray scattering
X ray scatteringX ray scattering
X ray scattering
 
2. x ray emission
2. x ray emission2. x ray emission
2. x ray emission
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
PCI DSS 3.0 muutokset – “editor’s pick”
PCI DSS 3.0 muutokset – “editor’s pick”PCI DSS 3.0 muutokset – “editor’s pick”
PCI DSS 3.0 muutokset – “editor’s pick”
 
Cyber Defense in 2016
Cyber Defense in 2016Cyber Defense in 2016
Cyber Defense in 2016
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
Finland, a cyber threat preparedness forerunner?
Finland, a cyber threat preparedness forerunner?Finland, a cyber threat preparedness forerunner?
Finland, a cyber threat preparedness forerunner?
 
Network Automation in Support of Cyber Defense
Network Automation in Support of Cyber DefenseNetwork Automation in Support of Cyber Defense
Network Automation in Support of Cyber Defense
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie Higher education IAM-seminar Turku 10.12.2009

Business Process Re-Engineering
Business Process Re-Engineering Business Process Re-Engineering
Business Process Re-Engineering Building Engines
 
Smart Metering, Networking & Operations Summit
Smart Metering, Networking & Operations SummitSmart Metering, Networking & Operations Summit
Smart Metering, Networking & Operations SummitNicole Waddell
 
Smart Metering Networking & Operations
Smart Metering Networking & OperationsSmart Metering Networking & Operations
Smart Metering Networking & OperationsAbby Lombardi
 
What is BI on Cloud
What is BI on CloudWhat is BI on Cloud
What is BI on Cloudtdwiindia
 
Insorce Presentation
Insorce PresentationInsorce Presentation
Insorce PresentationShammik Gupta
 
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...Compuware APM
 
Aufait Technologies - Introduction to BPM
Aufait Technologies - Introduction to BPMAufait Technologies - Introduction to BPM
Aufait Technologies - Introduction to BPMDinesh Kumar P
 
Bridging the c suite gap
Bridging the c suite gapBridging the c suite gap
Bridging the c suite gapInterop
 
Mohan k. bavirisetty introduction to semantic soa & bpm sept 14 2010 v 1.0
Mohan k. bavirisetty    introduction to semantic soa & bpm sept 14 2010 v 1.0Mohan k. bavirisetty    introduction to semantic soa & bpm sept 14 2010 v 1.0
Mohan k. bavirisetty introduction to semantic soa & bpm sept 14 2010 v 1.0Dr. Mohan K. Bavirisetty
 
Managed Services
Managed ServicesManaged Services
Managed ServicesVenkat J
 
Siebel to Salesforce
Siebel to Salesforce Siebel to Salesforce
Siebel to Salesforce Pactera_US
 
SEC Presentation V2
SEC Presentation V2SEC Presentation V2
SEC Presentation V2Salim Sheikh
 
Freenet project ralf_sigmund_opitz_activiti_days_2012
Freenet project ralf_sigmund_opitz_activiti_days_2012Freenet project ralf_sigmund_opitz_activiti_days_2012
Freenet project ralf_sigmund_opitz_activiti_days_2012Ralf Sigmund
 
Camo Tech Services March09
Camo Tech Services March09Camo Tech Services March09
Camo Tech Services March09sreejithm
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Planning Expansion and Adding Scope to your Current Shared Services Operation
Planning Expansion and Adding Scope to your Current Shared Services OperationPlanning Expansion and Adding Scope to your Current Shared Services Operation
Planning Expansion and Adding Scope to your Current Shared Services OperationScottMadden, Inc.
 
Ppwithagileyannhamonqconbeijing 090423081417-phpapp02
Ppwithagileyannhamonqconbeijing 090423081417-phpapp02Ppwithagileyannhamonqconbeijing 090423081417-phpapp02
Ppwithagileyannhamonqconbeijing 090423081417-phpapp02youzitang
 
Dnv Improving Your Process Performances With Agile
Dnv   Improving Your Process Performances With AgileDnv   Improving Your Process Performances With Agile
Dnv Improving Your Process Performances With AgileGeorge Ang
 

Ähnlich wie Higher education IAM-seminar Turku 10.12.2009 (20)

Business Process Re-Engineering
Business Process Re-Engineering Business Process Re-Engineering
Business Process Re-Engineering
 
Smart Metering, Networking & Operations Summit
Smart Metering, Networking & Operations SummitSmart Metering, Networking & Operations Summit
Smart Metering, Networking & Operations Summit
 
Smart Metering Networking & Operations
Smart Metering Networking & OperationsSmart Metering Networking & Operations
Smart Metering Networking & Operations
 
What is BI on Cloud
What is BI on CloudWhat is BI on Cloud
What is BI on Cloud
 
CeBIT-Preview Hamburg
CeBIT-Preview HamburgCeBIT-Preview Hamburg
CeBIT-Preview Hamburg
 
Insorce Presentation
Insorce PresentationInsorce Presentation
Insorce Presentation
 
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
 
Aufait Technologies - Introduction to BPM
Aufait Technologies - Introduction to BPMAufait Technologies - Introduction to BPM
Aufait Technologies - Introduction to BPM
 
5 5-norbert jastroch
5 5-norbert jastroch5 5-norbert jastroch
5 5-norbert jastroch
 
Bridging the c suite gap
Bridging the c suite gapBridging the c suite gap
Bridging the c suite gap
 
Mohan k. bavirisetty introduction to semantic soa & bpm sept 14 2010 v 1.0
Mohan k. bavirisetty    introduction to semantic soa & bpm sept 14 2010 v 1.0Mohan k. bavirisetty    introduction to semantic soa & bpm sept 14 2010 v 1.0
Mohan k. bavirisetty introduction to semantic soa & bpm sept 14 2010 v 1.0
 
Managed Services
Managed ServicesManaged Services
Managed Services
 
Siebel to Salesforce
Siebel to Salesforce Siebel to Salesforce
Siebel to Salesforce
 
SEC Presentation V2
SEC Presentation V2SEC Presentation V2
SEC Presentation V2
 
Freenet project ralf_sigmund_opitz_activiti_days_2012
Freenet project ralf_sigmund_opitz_activiti_days_2012Freenet project ralf_sigmund_opitz_activiti_days_2012
Freenet project ralf_sigmund_opitz_activiti_days_2012
 
Camo Tech Services March09
Camo Tech Services March09Camo Tech Services March09
Camo Tech Services March09
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Planning Expansion and Adding Scope to your Current Shared Services Operation
Planning Expansion and Adding Scope to your Current Shared Services OperationPlanning Expansion and Adding Scope to your Current Shared Services Operation
Planning Expansion and Adding Scope to your Current Shared Services Operation
 
Ppwithagileyannhamonqconbeijing 090423081417-phpapp02
Ppwithagileyannhamonqconbeijing 090423081417-phpapp02Ppwithagileyannhamonqconbeijing 090423081417-phpapp02
Ppwithagileyannhamonqconbeijing 090423081417-phpapp02
 
Dnv Improving Your Process Performances With Agile
Dnv   Improving Your Process Performances With AgileDnv   Improving Your Process Performances With Agile
Dnv Improving Your Process Performances With Agile
 

Kürzlich hochgeladen

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Kürzlich hochgeladen (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Higher education IAM-seminar Turku 10.12.2009

  • 1. Common pitfalls in IAM-projects Kim Westerlund, Nixu 10.12.2009 Turku Aug-13-10 © Nixu 2009
  • 2. Agenda 9:00-10:30 1.  Considerations for IAM-project planning 2.  How to map IAM product capabilities with real life use cases Aug-13-10 © Nixu 2009 Sorry, some recycled slides are in Finnish
  • 3. Kim Westerlund Verkot & Tietoturva –konferenssissa 2006: (Ajatuksia lainattu Mark Dixonilta)
  • 4. It’s a journey… 1.  Kick off the learning process 2.  Get and keep sponsorship 3.  Get value consensus early 4.  Manage ambitions 5.  Partition, sequence, conquer 6.  Understand current processes 7.  Offer design choices 8.  Plan processes and governance 9.  Deploy with clean data
  • 5. To be considered up front (identity management readiness check)   Are these normal project initialization questions for you?   What do you want to achieve with the IdM-program, and why?   What processes should your IdM-program touch?   Do you have defined owners for systems that are involved?   Do we really have time for such a demanding project?   Do we understand how the resulting IdM-service will affect our data architecture?   Do we have the money (license fees could be less that 30% of the total investment)? Aug-13-10 © Nixu 2009
  • 6. Look for REAL (business) drivers that reflects your situation These could be headlines, not the content itself!!! Aug-13-10 © Nixu 2009 … you will need them later
  • 7. Example Business capability flows Operating drivers Business capabilities Functional impact Complete, unique, Less incremental Faster time to current, stable cost benefit on mergers accessible identity data Earlier operational Business process efficiency Automated user response to market provisioning changes Retained assets and trust Shared Secure business processes Points of authentication administration services eliminated Cost efficiencies Delegated user freeing staff and Fewer, faster, less management cash skilled help desk incidents User self- Internet age registration Better reputation services
  • 8. Select a methodological approach… …like ”JHS165: Tietojärjestelmien vaatimusten määrittely osana järjestelmän hankintaa”
  • 9. An agile approach 1.  Write user stories http://en.wikipedia.org/wiki/User_story 2.  Define use cases of strategic functionalities http://en.wikipedia.org/wiki/Use_case 3.  Illustrate the functionality with wire frame models 4.  Define 3 months phases with useful deliverables that show real value to your organization … you will need them later
  • 10. Identity and Access Management as a real business solution
  • 11. A holistic approach to identity management services is an elephant Employees Students Partners •  Policy •  Policy •  Policy Manageme Solution Access •  Technology •  Technology •  Technology nt •  Processes •  Processes •  Processes •  Services •  Services •  Services •  Interfaces •  Interfaces •  Interfaces •  Policy •  Policy •  Policy Manageme Solution •  Technology •  Technology •  Technology Identity •  Processes •  Processes •  Processes nt •  Services •  Services •  Services •  Interfaces •  Interfaces •  Interfaces • Policy •  Policy •  Policy User Data Solution •  Technology •  Technology •  Technology Stores •  Services •  Services •  Services SSO SSO SSO
  • 12. Slicing the elephant into pieces (example1): Focus on student on boarding and termination processes with automation to some select applications. Aug-13-10 © Nixu 2009
  • 13. Slicing the elephant into pieces (example2): Enable a better user experience and a architectural building block for renewable application with WebSSO. Aug-13-10 © Nixu 2009
  • 14. Use a proven methodological approach – start with a pre-study project Pre-study 03/13/09 © Nixu 2009
  • 15. Define (feasibility study) •  Key planning factors of current state •  Architecture guiding principles •  Building-block architecture •  Technology recommendations •  Business value communications •  High level roadmap •  Key stakeholders
  • 16. Sequencing the work – what first   Early business value   High benefit to cost   High benefit to risk   Greatest testimonial impact   Friendly or captive client   Critical mass necessity Operational Security efficiency Cost Risks Aug-13-10 © Nixu 2009
  • 17. Inspect what is the cost of doing nothing…   Hidden costs due to redundant work   Cost due to delays in getting access   Checks, fixes and reporting costs   System implementation projects re- inventing the wheel   Technology itself doesn’t generate benefits   Technology is involved in implementing new processes
  • 18. Optimal IAM Project Methodology •  Focussed on; •  People and Processes, •  Business Benefits, •  Requirements and use cases, •  Risk Management •  Producticed approach
  • 19. The waterfall model The proposed project Requir Imple Verific Mainte ement Design ment ation nance s http://en.wikipedia.org/wiki/ Big_Design_Up_Front The waterfall model is argued by many to be a bad idea in practice. This is mainly because of their belief that it is impossible for any non-trivial project to get one phase of a software product's lifecycle perfected, before moving on to the next Aug-13-10 © Nixu 2009 phases and learning from them.
  • 20. … and what’s sometimes forgotten Roadma Role Support p Commun mining & model ication Current develop- modellin Process state ment g alignmen Change Roadma study t New manage Data p Overall processe ment executio clensing architec- s n ture impleme Aug-13-10 © Nixu 2009 ntation
  • 21. Problems with public procurement   You should know in advance what you want   Customer responsibilities are usually not defined in the call for bids –  Vendors estimate (misjudges) these differently – proposals aren’t comparable   The Desing phase could and should change the desired state  minimize desing upfront by defining only functional requirements and only some non-functional reqs.   Fixed fee IAM-projects seldom work for the best and may lead to a lose-lose result Aug-13-10 © Nixu 2009
  • 22. It’s a journey; remember to… 1.  Kick off the learning process 2.  Get and keep sponsorship 3.  Get value consensus early 4.  Manage ambitions 5.  Partition, sequence, conquer 6.  Understand current processes 7.  Offer design choices 8.  Plan processes and governance 9.  Deploy with clean data
  • 23. How to map IAM product capabilities with real life use cases Aug-13-10 © Nixu 2009
  • 24. It’s too hard to pick the right IAM-products by mapping features to your needs Product solutions per area Identity Management Web Access Federated Single Sign- management On   Oracle Identity Manager   IBM Tivoli Identity Manager   Sun Access Manager   Almost every access   Sun Identity Manager   Oracle Access Manager management vendor   CA Identity Manager   EMC/RSA Access Manger   PingIdentity   BMC User Administration and   CA Siteminder access   Symlabs Provisioning manager   OSS: OpenSAML, SourceID,   SAP NetWeaver Identity   Novell Access Manager SimpleSAML Management   BMC Access Management   Novell Identity manager   IBM Tivoli Access Manager   Omada Identity Manager   Entrust GetAccess   Microsoft Forefron Identity   Ubisecure Ubilogin Manager   Fujitsu mPollux   Propentus Permission   OSS: OpenSSO, JOSSO, Manager Pubcookie, WebAuth, JASIG   OSS: Velo, Ganymede CAS
  • 25. Selecting the right products   DO NOT MAKE THE SELECTION BEFORE YOU KNOW WHAT YOU WANT   Do not think about the suite if it’s not about the product price   Choose it based on real use cases, not product features   Define minimal tailored functionality that you want be supported by the vendor. –  Most of your desires are “can do, but it will cost you big bucks” –  Try simplifying processes – it’s anyway cheaper –  Requires open discussion with the vendor – “neuvottelumenettely” read JHS167 http://www.jhs-suositukset.fi/suomi/jhs167 IT DOESN’T COMP   Consider also post-implementation processes Aug-13-10 © Nixu 2009
  • 26. kim.westerlund@nixu.com 040 5123 125
  • 27. Thank you, kiitos, tack Nixu Oy P.O. Box 39 (Keilaranta 15) FI-02150 Espoo Finland Tel +358 9 478 1011 Aug-13-10 © Nixu 2009
  • 28. Nixu IdM feasibility study deliverables (fi or en) Deliverable Purpose Work plan Project plan for pre-study phase Work shop presentations Executive summary and supporting graphics Identity management Helps to understand the Identity and Access Management concept and “speak the same glossary language”. Business overview with Describes the business as-is and to-be situation. The business environment with partner business flows and customer network material flows between the unit and other parties. Explains the roles description of parties in the process. Volumes of flows are attached. Business requirements are linked to the business flows Requirements Understand and document the key requirements to be covered •  Business requirements (e.g. KPIs, critical functionalty) •  Process & organisation requirements (usability, language, resource reqeuirements) •  Performance requirements (speed, volumes) •  System requirements (integration) •  Technical requirements (infrastructure and environments) •  Data requirements •  General project requirements e.g. schedule, resources, other Main requirements are recorded and prioritized on the issue site latest when project is approved. Solution architecture/ Description of in scope modules and components, remaining and replaced systems and Solution Match required integration Initial fit/gap list and open issues that need to be clarified Business case Business case calculating espected costs/benefits from the project Management material Summarizes findings of feasibility study. Answers the questions: ”why should the project be implemented?” ”What should be implemented?” How and when and on what terms is it possible? ” What are the risks and constraints?”. Decision to start project can be made. © Nixu 2009