1 / 27

IAM Overview and Self-assessment Exercise

IAM Overview and Self-assessment Exercise. Keith Hazelton, UW-Madison & Internet2 MACE Renee Shuey , Penn State & InCommon TAC Co-chair InCommon CAMP, Columbus, 22 June 2011. Who is IAM?. What is IAM?.

sierra-king
Download Presentation

IAM Overview and Self-assessment Exercise

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IAM Overview and Self-assessment Exercise • Keith Hazelton, UW-Madison & Internet2 MACE • Renee Shuey, Penn State & InCommon TAC Co-chair • InCommon CAMP, Columbus, 22 June 2011

  2. Who is IAM?

  3. What is IAM? “….it is the alignment of University business  processes, policies, and technologies that manage identities to support the delivery of rich and diverse  array of online services for faculty, staff, and  students….”

  4. Why IAM? • Consolidation of multiple identity stores • Simplify process for user’s to manage identity information • Mitigate Risk • Provide flexibility to move to a more user centric IdM

  5. Identity and Access Management InfrastructureBig Picture

  6. Foundational Identity Management

  7. Identityand AccessManagement

  8. Group and RoleManagement

  9. PrivilegeManagement

  10. Identity and Access ManagementThe Rest of the Story

  11. Governance • Resolve conflicts, make decisions at the institutional level • Attributes for Success: • Sustained lateral awareness of needs, challenges for the purposes of anticipating collisions before they happen • Recognizing what is possible and what we’re striving for • Processes to make decisions when conflicts arise

  12. Governance • People own their identity • Within the institution, units/executives are stewards for a context • Those contexts overlap in complicated, significant ways

  13. Governance • What Kinds of Decisions • Methods, processes to resolve conflicts • Policy recommendations, changes, development • Set direction for process and technology requirements

  14. Policy • The establishment and adoption of policy is a key component to the success of an Identity and Access Management (IAM) implementation. • “P”olicy vs. “p”olicy

  15. Policy - One Approach

  16. The State of Identity Management Self-assessment Questionnaire

  17. External Collaboration

  18. Security of Identities and Authentication

  19. Guests or weakly identified entities

  20. Integration technologies

  21. Account Provisioning Process

  22. Account de-Provisioning process

  23. Access rule consistency

  24. Practices

  25. Self Assessment - Group Exercise~30 Minutes

  26. Additional Resources • InCommon • http://www.incommonfederation.org/ • EDUCAUSE IdM • http://www.educause.edu/iam • Grouper • http://www.internet2.edu/grouper/ • PACCMAN • http://middleware.internet2.edu/paccman/

More Related