Identity and Privilege Management

Identity and Privilege Management

How to avoid an identity crisis in your company

28 March 2007 (14-21)
Location: Sofitel Diegem (Diegem near Brussels (Belgium))
Presented in English
Price: 540 EUR (excl. 21% VAT)

This event is history, please check out the List of Upcoming Seminars, or send us an email

Check out our related open workshops:

Check out our related in-house workshops:

Full Programme:
13.30h - 14.00h
Registration, coffee/tea and croissants
14.00h - 14.50h
Identity & Privilege Management, Reality Check & Market Status

Identity and Privilege Management is definitely a "hot topic". But what is Identity and Privilege Management exactly ? Do I need this ? What can it do for me ? During this introductory presentation, we will make an abstraction of the technical details and bring you a management overview. We'll sum up the most important business drivers and explain how these can be applied in your environment.

We will also show that Identity and Privilege Management is not only a technology, but a fundamental aspect of your daily business processes.

  • Business Drivers
    • Business Facilitation
    • Cost Containment
    • Operational Efficiency
    • IT Risk Management
    • Regulatory Compliance
  • Complexity
    • Authentication (eID, Infocard, ...)
    • Multiple digital identities
    • Processes
    • Management models (delegation, federation, ...)
14.50h - 15.40h
Privileges, Profiles, Roles and RBAC

Controlling and managing identities in your organization is not as easy as it may look. But doing the same for the access they have is like adding a completely new dimension to the equation. In the last few years many new concepts and tools have been developed to address this corner of the IDM solution. They mostly focus on solving the issue by introducing an intermediary layer between the users and the resources: roles. Tools and technologies are exactly that what they claim to be: they do what you tell them to do and nothing more. So, how do you tell them which roles you need? How do you make sure they can work with the most up-to-date information ?

This module will show different approaches to these questions, describing their positive and negative aspect. The audience will get a good feel of what is involved in "role mining" and "role modeling" and will know in what general direction to go in search for the right solution and will know how to avoid some common pitfalls.

  • Privilege Management
    • DAC (Discretionary Access Control)
    • RBAC (Role-Based Access Control)
    • RuBAC (Rule-Based Access Control)
    • EDAC (Enterprise Dynamic Access Control)
    • ...
  • Role Mining and Modeling
    • Conceptual model
    • Pragmatic approach
    • Adaptive processes
    • Measuring is knowing and knowing is controlling!
15.40h - 16.00h
Coffee/Tea and Refreshments
16.00h - 16.50h
IDM Fundamentals: Processes

An identity process is a process that performs a control task on identities. An IDM solution is set up to support these processes. Hence, the processes and the process architecture are an ideal starting point for an IDM project.

During this presentation, we show what identity processes exactly are and how you can identify them in your organisation. In the next step, we examine these processes with a maturity model that was specially created for Identity Management.

The results of this analysis provide a good - and more importantly an objective - image of the maturity of our current Identity Management. It also shows where the weaknesses are, and where we will have to invest to get all processes at the same level.

  • The importance of a good overview of:
    • Data
    • Digital identities
    • Entitlements
    • Tasks
    • Processes
  • How to map:
    • Applications
    • Authorisations
    • Identity Model of your Data Architecture
  • How to map:
    • Tasks
    • Processes (TO-BE)
16.50h - 17.40h
IDM ROI: Compliance, Auditing & Control

Recent security incidents at companies and government bodies have triggered more and more regulations. Identity, Access and Privilege Management is also subject to this increased regulation, and auditing plays an increasingly important role. During this presentation, we show you how to realize auditing in your environment, but also how this can bring added value. We will not limit ourselves to the goals of compliance, but we will extend this to process- and architecture improvement.

  • Corporate Governance & Compliance
  • Compliant IDM
    • ISO 17799
  • Auditing (+ managing expectations of auditors)
  • Approaches
    • Post mortem
    • On Incident
    • Preventive
    • Some examples
17.40h - 19.00h
19.00h - 19.50h
IDM Evolutions & Current Technology

The Internet has been a tremendous source for innovation. In the last 15 years we saw the birth of electronic messaging, the World Wide Web, video streaming, ... And without the collaborative nature of this Internet we wouldn't have many of the standards we can use today, including PKI, LDAP and Kerberos. But do you know the work that is being done in the area of Identity Management? One intermediate result is Federation, a conceptual architecture that already found its way into mainstream IDM suites thanks to SAML and Liberty. However, that merely scratches the surface. What about InfoCards, a meta identity system created by Microsoft and endorsed by most parties (including Novell, SUN and IBM). With IE7 and Vista having native support and other platforms and browsers not far behind, this will certainly be a big hit in the near future. This, Infocards, and other new concepts, trends and technologies will be presented in this module "Evolutions".

  • Identity on the Internet
  • Existing (Usable) Work
    • Federation (SAML, Liberty)
    • Identity Silos (best practices)
  • Work in Progress
    • Liberty WS-F
    • Meta Identity System
    • OpenID
  • Applicability in the Enterprise
19.50h - 20.40h
IDM Architecture: The Overall Picture and Critical Success Factors

Identity processes and auditing are only 2 of the many building blocks: what is needed, is a full Identity Management architecture. To complete the picture, we present a reference architecture. We start with an example of a Governance model, add the policies and complete it with the data- and process architecture.

Federation architectures are a thing of the future for most companies, but they are becoming increasingly important, and a serious momentum is building around the opportunities of federation. An Identity Management Architecture is not a one-time nor a static project. It is a continuously evolving project with a typical lifecycle. There are many different ways to tackle such a project, e.g. bottom-up or top-down. We discuss a number of alternatives, as well as their advantages and disadvantages.

  • Reference Architecture
    • Burton Group
  • Evolution
    • Federation
      • User Centric
      • Standards (SAML 1.1, ID-FF, ID-WSF, ID-SIS, Shibboleth, SAML 2.0)
      • Belgian Federal Token
  • Critical Success Factors
    • Process
    • Compliance
20.40h - 21.00h
Final Q & A
End of this seminar
        SPEAKERS »

Questions about this ? Interested but you can't attend ? Send us an email !