SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Integrating Novell Access Governance
                                   ®



Suite with Novell Identity Manager


Steve Lewis
Identity Compliance Specialist
Novell, Inc. /slewis1@novell.com
Agenda

              Access Governance Suite Overview
                    –   Certification Manager
                    –   Role Manager
              Roles Based Provisioning Manager Overview
                    –   The 3 R's of Provisioning
              Access Governance Suite/ Roles Based Provisioning
              Module Integration
              Demo




2   © Novell, Inc. All rights reserved.
Access Governance Suite
                Overview
Novell Access Governance Suite
                            ®


    (AGS)

                                           Business-driven
                                accountability, visibility and certification


                                                                      Compliance
                                                                      Certification
                                                                       Manager




     Roles Lifecycle
        Manager




4   © Novell, Inc. All rights reserved.
Effective Governance of Access
    Requires a Dynamic, Ongoing Process

                                                            Regular Review and
                 Analytics for                              Certification of User
                 Decision Support                           Access



                                                                    Change Management
                                                                    for User Access
           Discovery and
           Collection of
           User Access
           Information

                                                                  Orchestration of
                                                                  Controls to Remediate
                                                                  Inappropriate Access
                                          Role Design and
                                          Maintenance



5   © Novell, Inc. All rights reserved.
Novell Access Governance Suite
                            ®


    Enabling Access Certification

    •   Business-oriented certification process
         –   Provides business context with insightful analytics
         –   Highly personalized business dashboards
    •   Continuous, business-event-driven, or cyclical
        frequency
    •   Process to initiate remediation of inappropriate access
    •   Auditable evidence of access compliance




6   © Novell, Inc. All rights reserved.
Novell Access Governance Suite
                            ®


    Delivering Role Lifecycle Management

    •   Effective, flexible model for defining enterprise roles
         –   Role discovery, business role modeling and change
             management (top-down and bottom-up)
         –   Mapping of business roles to IT roles
         –   Collaborative review, design and approval of roles
    •   Continuous process for role lifecycle management
         –   Analytics provide insightful decision support information
    •   Roles capability and comprehensive reporting provide
        sustainable compliance



7   © Novell, Inc. All rights reserved.
Role Based Positioning Module (RBPM)
                             Overview
A Balanced Approach to Provisioning
    Novell provides:
                ®
                                                           Role Based
    Easiest to define and maintain
    Most integrated governance                             Provisioning
    Integrated monitoring
    Least expensive                                     Heavy implementation
    Most coverage                                       and maintenance effort



                                                     Optimum effectiveness
                                                         and efficiency


                                              Rules-based              Request-based
                                              Provisioning              Provisioning
                                          Difficulty in Governance   Operational Nightmare




      An integrated provisioning approach usually provides the best all-around
                    results for security, efficiency and flexibility
9   © Novell, Inc. All rights reserved.
Roles Based Provisioning Module
     (RBPM)

     •   Roles Module for Novell Identity Manager (IDM)
                                                ®




          –   An RBAC/Compliance solution, nicely integrated with Novell's
              product line, and open to accommodating
              specialized/custom/best-of-breed solutions
          –   Addresses the most common customer use cases:
               >   Role-based assignment of resources and permissions
               >   Runtime enforcement of compliance rules, including separation of duties
                   (SoD)
               >   Management of the compliance process (reporting, review of authorizations,
                   re certification business process, etc.)




10   © Novell, Inc. All rights reserved.
Integrated Roles Infrastructure

     •   Built into the infrastructure of the Novell Identity and       ®



         Security product line
          –   Role objects located within the Identity Vault
               >   available to be leveraged across the product line and beyond
          –   Accessible via the Identity Manager User Application portal and
              iManager
               >   administration and end-user interfaces are already familiar
          –   Leverages the Identity Manager approval workflow system
               >   unified method of requesting and re-certifying resources
          –   Ties into Identity Manager event system and services
               >   immediate policy enforcement




11   © Novell, Inc. All rights reserved.
IDM/RBPM and AGS Integration
Integration

     •   Role Engineering
          –   Collect Roles from RBPM/IDM
          –   Collect Entitlements from RBPM/IDM
          –   Model Roles with RBPM/IDM entitlements
          –   Publish Roles with RBPM/IDM entitlements to AGS
          –   Use Roles for Provisioning and De-provisioning
     •   Certification Reviews
          –   Revocation of Role memberships in AGS will flow to RBPM
          –   All entitlements associated with the Roles will be
              De-provisioned



13   © Novell, Inc. All rights reserved.
Demo
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Más contenido relacionado

La actualidad más candente

Requirements Management Office - Strata
Requirements Management Office - Strata Requirements Management Office - Strata
Requirements Management Office - Strata IIBA UK Chapter
 
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...Spiffy
 
Moving Beyond Project Level SOA
Moving Beyond Project Level SOAMoving Beyond Project Level SOA
Moving Beyond Project Level SOAguest0d8992
 
BSM201.pdf
BSM201.pdfBSM201.pdf
BSM201.pdfNovell
 
Astute @ Quest Midwest Conference 2011 - At A CrossRoads with PeopleSoft
Astute @ Quest Midwest Conference 2011 - At A CrossRoads with PeopleSoftAstute @ Quest Midwest Conference 2011 - At A CrossRoads with PeopleSoft
Astute @ Quest Midwest Conference 2011 - At A CrossRoads with PeopleSoftArvind Rajan
 
TrueMBO Demo
TrueMBO DemoTrueMBO Demo
TrueMBO Demosseitz
 
S-CUBE LP: Online Testing for Proactive Adaptation
S-CUBE LP: Online Testing for Proactive AdaptationS-CUBE LP: Online Testing for Proactive Adaptation
S-CUBE LP: Online Testing for Proactive Adaptationvirtual-campus
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa servicesIESS
 
Linkroad Corporate Snapshot
Linkroad Corporate SnapshotLinkroad Corporate Snapshot
Linkroad Corporate Snapshotmelvinyou
 
Defining and Evaluating the Usability of CMS - Saurabh Kudesia
 Defining and Evaluating the Usability of CMS - Saurabh Kudesia   Defining and Evaluating the Usability of CMS - Saurabh Kudesia
Defining and Evaluating the Usability of CMS - Saurabh Kudesia STC India UX SIG
 
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudwwwally
 
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)Serhad MAKBULOĞLU, MBA
 
Introducing syspro (shareslide)
Introducing syspro (shareslide)Introducing syspro (shareslide)
Introducing syspro (shareslide)SYSPRO
 
Flevy.com - Feasibility Study Template for Electronic Software Distribution
Flevy.com - Feasibility Study Template for Electronic Software DistributionFlevy.com - Feasibility Study Template for Electronic Software Distribution
Flevy.com - Feasibility Study Template for Electronic Software DistributionDavid Tracy
 
Checking the health of your active directory enviornment
Checking the health of your active directory enviornmentChecking the health of your active directory enviornment
Checking the health of your active directory enviornmentSpiffy
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Novell
 
Az Managed Exchange Services(1)
Az Managed Exchange Services(1)Az Managed Exchange Services(1)
Az Managed Exchange Services(1)alwayson
 
Astute Business Solutions - Fast Track Impact Analysis for PeopleSoft 9.2 Upg...
Astute Business Solutions - Fast Track Impact Analysis for PeopleSoft 9.2 Upg...Astute Business Solutions - Fast Track Impact Analysis for PeopleSoft 9.2 Upg...
Astute Business Solutions - Fast Track Impact Analysis for PeopleSoft 9.2 Upg...Arvind Rajan
 

La actualidad más candente (20)

PS Spectrum
PS SpectrumPS Spectrum
PS Spectrum
 
Requirements Management Office - Strata
Requirements Management Office - Strata Requirements Management Office - Strata
Requirements Management Office - Strata
 
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
 
Moving Beyond Project Level SOA
Moving Beyond Project Level SOAMoving Beyond Project Level SOA
Moving Beyond Project Level SOA
 
BSM201.pdf
BSM201.pdfBSM201.pdf
BSM201.pdf
 
Astute @ Quest Midwest Conference 2011 - At A CrossRoads with PeopleSoft
Astute @ Quest Midwest Conference 2011 - At A CrossRoads with PeopleSoftAstute @ Quest Midwest Conference 2011 - At A CrossRoads with PeopleSoft
Astute @ Quest Midwest Conference 2011 - At A CrossRoads with PeopleSoft
 
TrueMBO Demo
TrueMBO DemoTrueMBO Demo
TrueMBO Demo
 
S-CUBE LP: Online Testing for Proactive Adaptation
S-CUBE LP: Online Testing for Proactive AdaptationS-CUBE LP: Online Testing for Proactive Adaptation
S-CUBE LP: Online Testing for Proactive Adaptation
 
An approach to extract the business value from soa services
An approach to extract the business value from soa servicesAn approach to extract the business value from soa services
An approach to extract the business value from soa services
 
Linkroad Corporate Snapshot
Linkroad Corporate SnapshotLinkroad Corporate Snapshot
Linkroad Corporate Snapshot
 
Defining and Evaluating the Usability of CMS - Saurabh Kudesia
 Defining and Evaluating the Usability of CMS - Saurabh Kudesia   Defining and Evaluating the Usability of CMS - Saurabh Kudesia
Defining and Evaluating the Usability of CMS - Saurabh Kudesia
 
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
 
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
Windows Server 2012 Active Directory Domain and Trust (Forest Trust)
 
Introducing syspro (shareslide)
Introducing syspro (shareslide)Introducing syspro (shareslide)
Introducing syspro (shareslide)
 
Flevy.com - Feasibility Study Template for Electronic Software Distribution
Flevy.com - Feasibility Study Template for Electronic Software DistributionFlevy.com - Feasibility Study Template for Electronic Software Distribution
Flevy.com - Feasibility Study Template for Electronic Software Distribution
 
Checking the health of your active directory enviornment
Checking the health of your active directory enviornmentChecking the health of your active directory enviornment
Checking the health of your active directory enviornment
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
 
Az Managed Exchange Services(1)
Az Managed Exchange Services(1)Az Managed Exchange Services(1)
Az Managed Exchange Services(1)
 
GForce2011 Brochure
GForce2011 BrochureGForce2011 Brochure
GForce2011 Brochure
 
Astute Business Solutions - Fast Track Impact Analysis for PeopleSoft 9.2 Upg...
Astute Business Solutions - Fast Track Impact Analysis for PeopleSoft 9.2 Upg...Astute Business Solutions - Fast Track Impact Analysis for PeopleSoft 9.2 Upg...
Astute Business Solutions - Fast Track Impact Analysis for PeopleSoft 9.2 Upg...
 

Similar a Integrating Novell Access Governance Suite with Novell Identity Manager

Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Novell
 
ProcessGene GRC Software Suite
ProcessGene GRC Software SuiteProcessGene GRC Software Suite
ProcessGene GRC Software SuiteProcessGene Ltd
 
Orchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementOrchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementAlan McSweeney
 
Advance controls 2013
Advance controls 2013Advance controls 2013
Advance controls 2013Zeeshan Khan
 
ITIL® im Microsoft-Umfeld: Einführung in das MOF
ITIL® im Microsoft-Umfeld: Einführung in das MOFITIL® im Microsoft-Umfeld: Einführung in das MOF
ITIL® im Microsoft-Umfeld: Einführung in das MOFDigicomp Academy AG
 
Virtualization Management With Quest V Foglight
Virtualization Management With Quest V FoglightVirtualization Management With Quest V Foglight
Virtualization Management With Quest V FoglightChris Roberts
 
Business Service Management on the Fly—In under 60 Minutes!
Business Service Management on the Fly—In under 60 Minutes!Business Service Management on the Fly—In under 60 Minutes!
Business Service Management on the Fly—In under 60 Minutes!Novell
 
Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Novell
 
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...David O'Dowd
 
Skyward Erp Presentation
Skyward Erp PresentationSkyward Erp Presentation
Skyward Erp Presentationvishalnvora1
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
MS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical OverviewMS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical OverviewSpiffy
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell
 
Hudson it validateskills joint ppt march 7th conf v2
Hudson it validateskills joint ppt march 7th conf v2Hudson it validateskills joint ppt march 7th conf v2
Hudson it validateskills joint ppt march 7th conf v2Assess Management Ltd
 
Siebel - Oracle Real Time Scheduler integration
Siebel - Oracle Real Time Scheduler integrationSiebel - Oracle Real Time Scheduler integration
Siebel - Oracle Real Time Scheduler integrationJeroen Burgers
 

Similar a Integrating Novell Access Governance Suite with Novell Identity Manager (20)

Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
 
ProcessGene GRC Software Suite
ProcessGene GRC Software SuiteProcessGene GRC Software Suite
ProcessGene GRC Software Suite
 
Orchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementOrchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service management
 
Advance controls 2013
Advance controls 2013Advance controls 2013
Advance controls 2013
 
ITIL® im Microsoft-Umfeld: Einführung in das MOF
ITIL® im Microsoft-Umfeld: Einführung in das MOFITIL® im Microsoft-Umfeld: Einführung in das MOF
ITIL® im Microsoft-Umfeld: Einführung in das MOF
 
Virtualization Management With Quest V Foglight
Virtualization Management With Quest V FoglightVirtualization Management With Quest V Foglight
Virtualization Management With Quest V Foglight
 
Business Service Management on the Fly—In under 60 Minutes!
Business Service Management on the Fly—In under 60 Minutes!Business Service Management on the Fly—In under 60 Minutes!
Business Service Management on the Fly—In under 60 Minutes!
 
Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...
 
Layer 7 SecureSpan Solution
Layer 7 SecureSpan SolutionLayer 7 SecureSpan Solution
Layer 7 SecureSpan Solution
 
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...
Subhendu Mohapatra - BearingPoint - Environments Management talk with www.sof...
 
Skyward Erp Presentation
Skyward Erp PresentationSkyward Erp Presentation
Skyward Erp Presentation
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
MS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical OverviewMS TechDays 2011 - Configuration Manager 2012 Technical Overview
MS TechDays 2011 - Configuration Manager 2012 Technical Overview
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
Hudson it validateskills joint ppt march 7th conf v2
Hudson it validateskills joint ppt march 7th conf v2Hudson it validateskills joint ppt march 7th conf v2
Hudson it validateskills joint ppt march 7th conf v2
 
Siebel - Oracle Real Time Scheduler integration
Siebel - Oracle Real Time Scheduler integrationSiebel - Oracle Real Time Scheduler integration
Siebel - Oracle Real Time Scheduler integration
 

Más de Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 

Más de Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

Integrating Novell Access Governance Suite with Novell Identity Manager

  • 1. Integrating Novell Access Governance ® Suite with Novell Identity Manager Steve Lewis Identity Compliance Specialist Novell, Inc. /slewis1@novell.com
  • 2. Agenda Access Governance Suite Overview – Certification Manager – Role Manager Roles Based Provisioning Manager Overview – The 3 R's of Provisioning Access Governance Suite/ Roles Based Provisioning Module Integration Demo 2 © Novell, Inc. All rights reserved.
  • 4. Novell Access Governance Suite ® (AGS) Business-driven accountability, visibility and certification Compliance Certification Manager Roles Lifecycle Manager 4 © Novell, Inc. All rights reserved.
  • 5. Effective Governance of Access Requires a Dynamic, Ongoing Process Regular Review and Analytics for Certification of User Decision Support Access Change Management for User Access Discovery and Collection of User Access Information Orchestration of Controls to Remediate Inappropriate Access Role Design and Maintenance 5 © Novell, Inc. All rights reserved.
  • 6. Novell Access Governance Suite ® Enabling Access Certification • Business-oriented certification process – Provides business context with insightful analytics – Highly personalized business dashboards • Continuous, business-event-driven, or cyclical frequency • Process to initiate remediation of inappropriate access • Auditable evidence of access compliance 6 © Novell, Inc. All rights reserved.
  • 7. Novell Access Governance Suite ® Delivering Role Lifecycle Management • Effective, flexible model for defining enterprise roles – Role discovery, business role modeling and change management (top-down and bottom-up) – Mapping of business roles to IT roles – Collaborative review, design and approval of roles • Continuous process for role lifecycle management – Analytics provide insightful decision support information • Roles capability and comprehensive reporting provide sustainable compliance 7 © Novell, Inc. All rights reserved.
  • 8. Role Based Positioning Module (RBPM) Overview
  • 9. A Balanced Approach to Provisioning Novell provides: ® Role Based Easiest to define and maintain Most integrated governance Provisioning Integrated monitoring Least expensive Heavy implementation Most coverage and maintenance effort Optimum effectiveness and efficiency Rules-based Request-based Provisioning Provisioning Difficulty in Governance Operational Nightmare An integrated provisioning approach usually provides the best all-around results for security, efficiency and flexibility 9 © Novell, Inc. All rights reserved.
  • 10. Roles Based Provisioning Module (RBPM) • Roles Module for Novell Identity Manager (IDM) ® – An RBAC/Compliance solution, nicely integrated with Novell's product line, and open to accommodating specialized/custom/best-of-breed solutions – Addresses the most common customer use cases: > Role-based assignment of resources and permissions > Runtime enforcement of compliance rules, including separation of duties (SoD) > Management of the compliance process (reporting, review of authorizations, re certification business process, etc.) 10 © Novell, Inc. All rights reserved.
  • 11. Integrated Roles Infrastructure • Built into the infrastructure of the Novell Identity and ® Security product line – Role objects located within the Identity Vault > available to be leveraged across the product line and beyond – Accessible via the Identity Manager User Application portal and iManager > administration and end-user interfaces are already familiar – Leverages the Identity Manager approval workflow system > unified method of requesting and re-certifying resources – Ties into Identity Manager event system and services > immediate policy enforcement 11 © Novell, Inc. All rights reserved.
  • 12. IDM/RBPM and AGS Integration
  • 13. Integration • Role Engineering – Collect Roles from RBPM/IDM – Collect Entitlements from RBPM/IDM – Model Roles with RBPM/IDM entitlements – Publish Roles with RBPM/IDM entitlements to AGS – Use Roles for Provisioning and De-provisioning • Certification Reviews – Revocation of Role memberships in AGS will flow to RBPM – All entitlements associated with the Roles will be De-provisioned 13 © Novell, Inc. All rights reserved.
  • 14. Demo
  • 15.
  • 16. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.