Check out our related open workshops:
Check out our related in-house workshops:
Identity and Privilege Management is definitely a "hot topic". But what is Identity and Privilege Management exactly ? Do I need this ? What can it do for me ? During this introductory presentation, we will make an abstraction of the technical details and bring you a management overview. We'll sum up the most important business drivers and explain how these can be applied in your environment.
We will also show that Identity and Privilege Management is not only a technology, but a fundamental aspect of your daily business processes.
Controlling and managing identities in your organization is not as easy as it may look. But doing the same for the access they have is like adding a completely new dimension to the equation. In the last few years many new concepts and tools have been developed to address this corner of the IDM solution. They mostly focus on solving the issue by introducing an intermediary layer between the users and the resources: roles. Tools and technologies are exactly that what they claim to be: they do what you tell them to do and nothing more. So, how do you tell them which roles you need? How do you make sure they can work with the most up-to-date information ?
This module will show different approaches to these questions, describing their positive and negative aspect. The audience will get a good feel of what is involved in "role mining" and "role modeling" and will know in what general direction to go in search for the right solution and will know how to avoid some common pitfalls.
An identity process is a process that performs a control task on identities. An IDM solution is set up to support these processes. Hence, the processes and the process architecture are an ideal starting point for an IDM project.
During this presentation, we show what identity processes exactly are and how you can identify them in your organisation. In the next step, we examine these processes with a maturity model that was specially created for Identity Management.
The results of this analysis provide a good - and more importantly an objective - image of the maturity of our current Identity Management. It also shows where the weaknesses are, and where we will have to invest to get all processes at the same level.
Recent security incidents at companies and government bodies have triggered more and more regulations. Identity, Access and Privilege Management is also subject to this increased regulation, and auditing plays an increasingly important role. During this presentation, we show you how to realize auditing in your environment, but also how this can bring added value. We will not limit ourselves to the goals of compliance, but we will extend this to process- and architecture improvement.
The Internet has been a tremendous source for innovation. In the last 15 years we saw the birth of electronic messaging, the World Wide Web, video streaming, ... And without the collaborative nature of this Internet we wouldn't have many of the standards we can use today, including PKI, LDAP and Kerberos. But do you know the work that is being done in the area of Identity Management? One intermediate result is Federation, a conceptual architecture that already found its way into mainstream IDM suites thanks to SAML and Liberty. However, that merely scratches the surface. What about InfoCards, a meta identity system created by Microsoft and endorsed by most parties (including Novell, SUN and IBM). With IE7 and Vista having native support and other platforms and browsers not far behind, this will certainly be a big hit in the near future. This, Infocards, and other new concepts, trends and technologies will be presented in this module "Evolutions".
Identity processes and auditing are only 2 of the many building blocks: what is needed, is a full Identity Management architecture. To complete the picture, we present a reference architecture. We start with an example of a Governance model, add the policies and complete it with the data- and process architecture.
Federation architectures are a thing of the future for most companies, but they are becoming increasingly important, and a serious momentum is building around the opportunities of federation. An Identity Management Architecture is not a one-time nor a static project. It is a continuously evolving project with a typical lifecycle. There are many different ways to tackle such a project, e.g. bottom-up or top-down. We discuss a number of alternatives, as well as their advantages and disadvantages.