SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
1 Maximizing Value



                                                       Managing the User Lifecycle
                                                       Across On-Premises and
                                                       Cloud-Hosted Applications




Getting value from Hitachi ID Password Manager by improving user adoption.




2 Economics of self-service




                                         © 2012 Hitachi ID Systems, Inc.. All rights reserved.   1
Slide Presentation



2.1         Cost/savings timeline
 Costs are are primarily up-front, savings accrue over time.




                                   s
                                ce
                             vi
                            er
                       ce s
                   en at e
             M lem lic re

                     an ion
                 nt nt s
                p re wa
               ai e en




                                                     ce




                                                                                     ce




                                                                                                              ce
             Im wa rd




                                                  an




                                                                                  an




                                                                                                           an
                ft ha
  COSTS




                                               en




                                                                               en




                                                                                                        en
             So er




                                            nt




                                                                            nt




                                                                                                     nt
                rv




                                        ai




                                                                         ai




                                                                                                  ai
            Se




                                                                                                           Time
                                        M




                                                                        M




                                                                                                 M
  SAVINGS




                                                                                                           Time
                                                      Reduced IT support call volume


            Buy    Install   Roll-out                                 Operate

                                                      Break-even date


2.2         User productivity
     • For every $1 in cost savings at the help desk, there are usually $2 in productivity improvements for
       users.
     • Productivity does not appear in a tidy line-item in a single departmental budget.
     • Productivity is hard to measure – did the user just have a coffee with the time we saved?
     • Most organizations are unable to use improved productivity to justify investments in service
       automation, but users should nonetheless be told that this is one of the expected outcomes.




                                                          © 2012 Hitachi ID Systems, Inc.. All rights reserved.          2
Slide Presentation



2.3    Maximizing return

      • To get results, users must adopt self-service instead of calling the help desk.
      • Maximizing user adoption is key to higher, earlier ROI.




      Problem incident rate

      Awareness


      Accessibility


      Willingness

        User adoption             Missed opportunity




3 Engaging users
3.1    Critical to success



      Awareness         Users must know about the solution before they can be expected to use it.
      Accessibility     Users must be able to use the solution or they will have to revert to calling the
                        help desk.
      Willingness       Users must want to use the solution or they will tend to do what they have
                        always done before.

 It’s essential optimize all three.




                                                       © 2012 Hitachi ID Systems, Inc.. All rights reserved.       3
Slide Presentation



3.2     Awareness: user enrollment
      Fail        Install the software and hope for the         Users have no idea..
                  best.
      Poor        Send a single mail-blast to all users         Is it SPAM?
                  once the system is up.
      OK          Send a single, personalized e-mail to         What about new hires?
                  every user once the system is up.
      Good        Send personalized reminders to every          Easy to ignore.
                  user with an incomplete profile.
      Very good   Automatically open an enrollment UI           Hard to ignore.
                  when users sign into the network.
      Excellent   Force non-responsive users to complete        Impossible to ignore.
                  their profiles before they can use their
                  PC.

3.3     Accessibility: password reset

      OK          Publish a web UI.                             Locked-out or mobile users can’t get to
                                                                it!
      Good        Secure kiosk account – login as "help"        Users need to know to do this.
                  with no password to launch kiosk-style
                  UI from login prompt.
      Very good   Add an "I forgot" button to the login         Available when needed.
                  screen.
      Excellent   Modify login error messages to link to        Harder to miss.
                  SSPR.
      Good        Enable SSPR via telephone at the help         Some users like to call or need to fix
                  desk phone number.                            their VPN.
      Excellent   Enable SSPR over temporary VPN for            Password reset for cached credentials is
                  mobile users.                                 hard!




                                                 © 2012 Hitachi ID Systems, Inc.. All rights reserved.       4
Slide Presentation



3.4   Willingness: motivate users to comply
  • Users will only change their behavior if they have a good reason to do so.
  • Incentives:

        –   Prizes, contests to get users enrolled.
        –   Improved user service – e.g., easier to fix a password problem.
        –   Fewer passwords to manage – e.g., synchronized.
        –   Make security question enrollment a routine part of performance reviews.
  • Dis-incentives:

        – After self-service is available, make password-support calls take longer at the help desk.
        – Charge-back for assisted service, but not for self-service.
  • Always explain why the process is changing:
        – "We are automating password resets, so that they are easier to do and available 24x7. Here’s
          what you’ll have to do..."




4 Best practices
4.1   Engage users
  • E-mail invitations and reminders to get users to enroll.
  • Web popups for users who failed to respond to e-mail.
  • Forced enrollment if management approves (e.g., after 2 e-mails and 3 web popups).

4.2   Make it hard to miss
  •   Add a link to password management to the Intranet.
  •   Add a link to password reset to application login screens.
  •   Add a button for password reset to workstation login screens.
  •   Modify error dialogs to link to password reset.

4.3   User awareness and education
  •   Remind users of the benefits of the system though personalized e-mails.
  •   Provide help pages tailored to your deployment.
  •   Explain the benefits to both users and IT support.
  •   Record and publish movies showing how the system is used.

4.4   Incentives and dis-incentives
  •   Synchronize passwords – users are motivated by fewer passwords to remember.
  •   Implement promotional campaigns, prizes, etc. for enrollment.
  •   Integrate enrollment with the new-hire onboarding process and with performance reviews.
  •   Make users wait for service if they call the help desk – and play back a recording about self-service.




                                                 © 2012 Hitachi ID Systems, Inc.. All rights reserved.       5
Slide Presentation



4.5       Control invitations
   • If the system invites 10,000 users to enroll on a single day:

           – 5,000 of them might try to sign in at the same time.
           – 500 of them might call the help desk for assistance.
           – The help desk will have a record call volume!
   • To avoid this:
           – Limit the invitations sent per day (e.g., 500).
           – Limit the frequency of invitations per user (e.g., weekly).
           – Avoid sending invitations on weekends and holidays.




5 Pitfalls to avoid
5.1       Just SSPR for AD via web
 Implement a simple web application for self-service password reset (SSPR) on Active Directory.
      • Users expect more:

            – Password synchronization between AD and their various other passwords.
            – Access to SSPR from their locked out workstation login screen.
            – Advanced features such as smart card PIN reset and hard disk key recovery.
      • Failing to meet user expectations inevitably leads to project failure.

5.2       Expecting users to volunteer
 Without executive sponsorship, some projects fail to implement a system that proactively
 invites users to enroll and use the system.
      • Users never volunteer!
            – If the system does not repeatedly remind users to enroll, then it is certain that enrollment and
              adoption rates will approach zero.
            – No user adoption == no value.
      • Inviting users to complete their profile is mandatory!
      • Getting an executive mandate is an important step early in the project!

5.3       Password reset but no synchronization
 Enabling users to reset forgotten passwords but not synchronizing passwords.
      •   Users have too many passwords – help them!
      •   Users with fewer passwords to remember have fewer password problems.
      •   Users will ignore the system if it does not offer them value. Fewer passwords is value for users!
      •   Synchronization means as many integrations as possible. Maximize the value for users!
      •   If you give users something, they will respond by increasing user adoption and ROI.



                                                    © 2012 Hitachi ID Systems, Inc.. All rights reserved.       6
Slide Presentation



5.4    Web-only user interface
 It’s easy to offer password reset from a web browser and it’s hard to extend this service to the
 login prompt.
      • About 40% of password problems are due to users who cannot sign into their workstation. ROI is
        severely impacted if this problem is not automated!
      • A smaller number of problems is due to mobile users who are locked out, but the impact on users
        is very expensive!
      • It is essential to provide SSPR to locked out users, via telephone, secure kiosk account, GINA
        service or Credential Provider.
      • In many organizations, it is even more important to provide SSPR to users who are away from the
        office.




6 Effective project management
6.1    Clear objectives
   • Users respond better when they know why , not just what .
   • Different objectives will dictate different strategies:
         – Regulatory compliance: mandatory enrollment/use
         – Cost savings: urge users to enroll
         – Improved user service: advise users of availability
   • Having executive sponsorship helps both during deployment (to motivate system owners /
     administrators) and during roll-out (to motivate user adoption).

6.2    Measure cost savings
   • Measure baseline and ongoing variables, to:

         – Quantify project successes.
         – Identify and respond to problem areas.
   • Useful variables to track:
         –   Total number of users in the organization.
         –   Number of enrolled users.
         –   Rates of successful and failed self-service logins.
         –   Rates of successful and failed password synchronization attempts.
         –   Rates of successful and failed self-service password reset attempts.
         –   Rates of successful and failed assisted password reset attempts.
         –   Average duration of a user session performing self-service password reset.
         –   Average duration of a support analyst session performing assisted password reset.




                                                 © 2012 Hitachi ID Systems, Inc.. All rights reserved.       7
Slide Presentation




               7 Realistic goals

                    Users enrolled                                                                                                90%
                    Users taking advantage of password synchronization                                                            100%
                    Problem incidents eliminated through password synchronization                                                 75%
                    Users taking advantage of self-service password reset                                                         60%
                    Total call volume reduction (100-75%)x(100-60%)                                                               90%




               8 Summary
                    • Users don’t magically cooperate – a plan is needed to drive adoption.
                    • Executive sponsorship, effective communication, a friendly and pervasive system all contribute to a
                      successful project.
                    • Over 90% of password-related help desk calls can be eliminated in a well managed project.




500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com


                                                                                              File: PRCS:pres
www.Hitachi-ID.com                                                                            Date: March 1, 2012

Más contenido relacionado

Destacado

Strategic consulting sm_es_green_water_navin_agarwal
Strategic consulting sm_es_green_water_navin_agarwalStrategic consulting sm_es_green_water_navin_agarwal
Strategic consulting sm_es_green_water_navin_agarwal
Navin Agarwal
 
黃晴與彭立人醫師的對話錄
黃晴與彭立人醫師的對話錄黃晴與彭立人醫師的對話錄
黃晴與彭立人醫師的對話錄
honan4108
 
Inmigración Armenia
Inmigración ArmeniaInmigración Armenia
Inmigración Armenia
Ladesergio
 
Symposium on HPC Applications – IIT Kanpur
Symposium on HPC Applications – IIT KanpurSymposium on HPC Applications – IIT Kanpur
Symposium on HPC Applications – IIT Kanpur
Rishi Pathak
 

Destacado (11)

Strategic consulting sm_es_green_water_navin_agarwal
Strategic consulting sm_es_green_water_navin_agarwalStrategic consulting sm_es_green_water_navin_agarwal
Strategic consulting sm_es_green_water_navin_agarwal
 
AlphaGraphics Design
AlphaGraphics DesignAlphaGraphics Design
AlphaGraphics Design
 
5° básico b semana 18 al 22 abril
 5° básico b  semana 18  al 22 abril 5° básico b  semana 18  al 22 abril
5° básico b semana 18 al 22 abril
 
Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...
Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...
Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...
 
黃晴與彭立人醫師的對話錄
黃晴與彭立人醫師的對話錄黃晴與彭立人醫師的對話錄
黃晴與彭立人醫師的對話錄
 
Inmigración Armenia
Inmigración ArmeniaInmigración Armenia
Inmigración Armenia
 
#CNX14 - Building Killer Apps - Moving Beyond Transactions to Experiences
#CNX14 - Building Killer Apps - Moving Beyond Transactions to Experiences#CNX14 - Building Killer Apps - Moving Beyond Transactions to Experiences
#CNX14 - Building Killer Apps - Moving Beyond Transactions to Experiences
 
UPB - Software is eating up the world
UPB - Software is eating up the worldUPB - Software is eating up the world
UPB - Software is eating up the world
 
Teleconferencias
TeleconferenciasTeleconferencias
Teleconferencias
 
Using Social Media for Ministry
Using Social Media for MinistryUsing Social Media for Ministry
Using Social Media for Ministry
 
Symposium on HPC Applications – IIT Kanpur
Symposium on HPC Applications – IIT KanpurSymposium on HPC Applications – IIT Kanpur
Symposium on HPC Applications – IIT Kanpur
 

Más de Hitachi ID Systems, Inc.

Más de Hitachi ID Systems, Inc. (20)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Maximizing user adoption with Hitachi ID Password Manager

  • 1. 1 Maximizing Value Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Getting value from Hitachi ID Password Manager by improving user adoption. 2 Economics of self-service © 2012 Hitachi ID Systems, Inc.. All rights reserved. 1
  • 2. Slide Presentation 2.1 Cost/savings timeline Costs are are primarily up-front, savings accrue over time. s ce vi er ce s en at e M lem lic re an ion nt nt s p re wa ai e en ce ce ce Im wa rd an an an ft ha COSTS en en en So er nt nt nt rv ai ai ai Se Time M M M SAVINGS Time Reduced IT support call volume Buy Install Roll-out Operate Break-even date 2.2 User productivity • For every $1 in cost savings at the help desk, there are usually $2 in productivity improvements for users. • Productivity does not appear in a tidy line-item in a single departmental budget. • Productivity is hard to measure – did the user just have a coffee with the time we saved? • Most organizations are unable to use improved productivity to justify investments in service automation, but users should nonetheless be told that this is one of the expected outcomes. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 2
  • 3. Slide Presentation 2.3 Maximizing return • To get results, users must adopt self-service instead of calling the help desk. • Maximizing user adoption is key to higher, earlier ROI. Problem incident rate Awareness Accessibility Willingness User adoption Missed opportunity 3 Engaging users 3.1 Critical to success Awareness Users must know about the solution before they can be expected to use it. Accessibility Users must be able to use the solution or they will have to revert to calling the help desk. Willingness Users must want to use the solution or they will tend to do what they have always done before. It’s essential optimize all three. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 3
  • 4. Slide Presentation 3.2 Awareness: user enrollment Fail Install the software and hope for the Users have no idea.. best. Poor Send a single mail-blast to all users Is it SPAM? once the system is up. OK Send a single, personalized e-mail to What about new hires? every user once the system is up. Good Send personalized reminders to every Easy to ignore. user with an incomplete profile. Very good Automatically open an enrollment UI Hard to ignore. when users sign into the network. Excellent Force non-responsive users to complete Impossible to ignore. their profiles before they can use their PC. 3.3 Accessibility: password reset OK Publish a web UI. Locked-out or mobile users can’t get to it! Good Secure kiosk account – login as "help" Users need to know to do this. with no password to launch kiosk-style UI from login prompt. Very good Add an "I forgot" button to the login Available when needed. screen. Excellent Modify login error messages to link to Harder to miss. SSPR. Good Enable SSPR via telephone at the help Some users like to call or need to fix desk phone number. their VPN. Excellent Enable SSPR over temporary VPN for Password reset for cached credentials is mobile users. hard! © 2012 Hitachi ID Systems, Inc.. All rights reserved. 4
  • 5. Slide Presentation 3.4 Willingness: motivate users to comply • Users will only change their behavior if they have a good reason to do so. • Incentives: – Prizes, contests to get users enrolled. – Improved user service – e.g., easier to fix a password problem. – Fewer passwords to manage – e.g., synchronized. – Make security question enrollment a routine part of performance reviews. • Dis-incentives: – After self-service is available, make password-support calls take longer at the help desk. – Charge-back for assisted service, but not for self-service. • Always explain why the process is changing: – "We are automating password resets, so that they are easier to do and available 24x7. Here’s what you’ll have to do..." 4 Best practices 4.1 Engage users • E-mail invitations and reminders to get users to enroll. • Web popups for users who failed to respond to e-mail. • Forced enrollment if management approves (e.g., after 2 e-mails and 3 web popups). 4.2 Make it hard to miss • Add a link to password management to the Intranet. • Add a link to password reset to application login screens. • Add a button for password reset to workstation login screens. • Modify error dialogs to link to password reset. 4.3 User awareness and education • Remind users of the benefits of the system though personalized e-mails. • Provide help pages tailored to your deployment. • Explain the benefits to both users and IT support. • Record and publish movies showing how the system is used. 4.4 Incentives and dis-incentives • Synchronize passwords – users are motivated by fewer passwords to remember. • Implement promotional campaigns, prizes, etc. for enrollment. • Integrate enrollment with the new-hire onboarding process and with performance reviews. • Make users wait for service if they call the help desk – and play back a recording about self-service. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 5
  • 6. Slide Presentation 4.5 Control invitations • If the system invites 10,000 users to enroll on a single day: – 5,000 of them might try to sign in at the same time. – 500 of them might call the help desk for assistance. – The help desk will have a record call volume! • To avoid this: – Limit the invitations sent per day (e.g., 500). – Limit the frequency of invitations per user (e.g., weekly). – Avoid sending invitations on weekends and holidays. 5 Pitfalls to avoid 5.1 Just SSPR for AD via web Implement a simple web application for self-service password reset (SSPR) on Active Directory. • Users expect more: – Password synchronization between AD and their various other passwords. – Access to SSPR from their locked out workstation login screen. – Advanced features such as smart card PIN reset and hard disk key recovery. • Failing to meet user expectations inevitably leads to project failure. 5.2 Expecting users to volunteer Without executive sponsorship, some projects fail to implement a system that proactively invites users to enroll and use the system. • Users never volunteer! – If the system does not repeatedly remind users to enroll, then it is certain that enrollment and adoption rates will approach zero. – No user adoption == no value. • Inviting users to complete their profile is mandatory! • Getting an executive mandate is an important step early in the project! 5.3 Password reset but no synchronization Enabling users to reset forgotten passwords but not synchronizing passwords. • Users have too many passwords – help them! • Users with fewer passwords to remember have fewer password problems. • Users will ignore the system if it does not offer them value. Fewer passwords is value for users! • Synchronization means as many integrations as possible. Maximize the value for users! • If you give users something, they will respond by increasing user adoption and ROI. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 6
  • 7. Slide Presentation 5.4 Web-only user interface It’s easy to offer password reset from a web browser and it’s hard to extend this service to the login prompt. • About 40% of password problems are due to users who cannot sign into their workstation. ROI is severely impacted if this problem is not automated! • A smaller number of problems is due to mobile users who are locked out, but the impact on users is very expensive! • It is essential to provide SSPR to locked out users, via telephone, secure kiosk account, GINA service or Credential Provider. • In many organizations, it is even more important to provide SSPR to users who are away from the office. 6 Effective project management 6.1 Clear objectives • Users respond better when they know why , not just what . • Different objectives will dictate different strategies: – Regulatory compliance: mandatory enrollment/use – Cost savings: urge users to enroll – Improved user service: advise users of availability • Having executive sponsorship helps both during deployment (to motivate system owners / administrators) and during roll-out (to motivate user adoption). 6.2 Measure cost savings • Measure baseline and ongoing variables, to: – Quantify project successes. – Identify and respond to problem areas. • Useful variables to track: – Total number of users in the organization. – Number of enrolled users. – Rates of successful and failed self-service logins. – Rates of successful and failed password synchronization attempts. – Rates of successful and failed self-service password reset attempts. – Rates of successful and failed assisted password reset attempts. – Average duration of a user session performing self-service password reset. – Average duration of a support analyst session performing assisted password reset. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 7
  • 8. Slide Presentation 7 Realistic goals Users enrolled 90% Users taking advantage of password synchronization 100% Problem incidents eliminated through password synchronization 75% Users taking advantage of self-service password reset 60% Total call volume reduction (100-75%)x(100-60%) 90% 8 Summary • Users don’t magically cooperate – a plan is needed to drive adoption. • Executive sponsorship, effective communication, a friendly and pervasive system all contribute to a successful project. • Over 90% of password-related help desk calls can be eliminated in a well managed project. 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com File: PRCS:pres www.Hitachi-ID.com Date: March 1, 2012