1 / 14

UW Identity & Access Management Initiative Update

UW Identity & Access Management Initiative Update. ACT, February 13, 2009 Keith Hazelton Pam Allen. Agenda. Review of the New Affiliation Governance Keith Update on the IAM Project Pam. P1 - Identity Manager What We Said:. 12 week engagement – Production Pilot Started Nov. 10

wilson
Download Presentation

UW Identity & Access Management Initiative Update

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. UW Identity & Access Management Initiative Update ACT, February 13, 2009 Keith Hazelton Pam Allen

  2. Agenda • Review of the New Affiliation Governance Keith • Update on the IAM Project Pam

  3. P1 - Identity ManagerWhat We Said: • 12 week engagement – Production Pilot • Started Nov. 10 • 4 week planning & design • 8 week implementation • Candidate Application – Shared Financial Systems • Financial system of record for all UW System campuses • Primary business functionality – authorization workflow and account provisioning, Logging, auditing, reporting

  4. Shared Financials – Current Situation SFS Authoritative Sources IAA Approvers Business Unit /Employee DoIT Security Paper Authorization form Automated Account and default role assignments (PeopleCode) Shared Financials – Current Situation Additional Manual Role Assignment and de-provisioning Manual Auditing

  5. Shared Financials – Potential Future with Oracle Identity Manager (OIM) Shared Financials – Potential Future with Oracle Identity Manager (OIM) Automated provisioning of account and role assignments Authoritative Sources IAA OIM SFS Automated Auditing, Reporting and Attestation Approvers Business Unit /employee Automated Workflows DoIT Security

  6. P1 - Identity ManagerWhat Happened: • 12 week engagement – Production Pilot • Started Nov. 10√ • 4 week planning & design √ • Deliverables: SFS Requirements, Framework Design • 8 week production implementation No • Revised Scope • Build out the framework in the development environment • Build demonstration for SFS 9

  7. P1 - Identity ManagerWhat We Learned • Application • A big first implementation • Customer prioritization of project • Business processes need to be reviewed and potentially re-engineered • Level of provisioning required: Many PeopleSoft Roles • Application – Module – Role Shared Financials - Core Financials - AR Inquiry • Multiple approvers – complicated business logic • Lack of automated organization chart 10

  8. What We are Doing Trusted Reconciliation Connector Storing IAA Data in OIM Format PeopleSoft Connector for SFS Allow for Application/Module/Roles Framework Authoritative Sources SFS Dev Environment IAA OIM Approvers Building logic to detect changes in attributes that result in changes to entitlements Business Unit /employee Building Generic Multi-Approver Workflow Demonstration

  9. Next Steps • Use what we’ve learned from OIM • Proceed with the Roadmap • Work with Oracle Virtual Directory and Oracle Access Manager

  10. Q and A

  11. Discussion IAM Stakeholder wiki page: https://wiki.doit.wisc.edu/confluence/display/IAMP/IAM+Stakeholders

More Related