SlideShare una empresa de Scribd logo
1 de 57
Descargar para leer sin conexión
Overview of Identity and Access
Management Product Line
Presenters
    Ajay Sharma                           Kamal Narayan
    Product Marketing Manager             Product Manager
                                          Novell, Inc. nkamal@novell.com

    Baber Amin
    Business Line Manager,                Lee Howarth
    Novell, Inc. baber@novell.com         Product Manager,
                                          Novell, Inc. lhowarth@novell.com

    Bob Bentley
    Product Manager
    Novell, Inc. bbentley@novell.com




2   © Novell, Inc. All rights reserved.
Risk to The Enterprise is Rising




3   © Novell, Inc. All rights reserved.
Complex Times, Complex Challenges

    •   How do I manage changes to user identities and access rights?
    •   How do I improve the productivity of my IT staff and end users?
    •   How do I reduce password-related calls to the helpdesk due to
        stronger password policies?
    •   How do I ensure that users have the right access to systems so I
        can minimize risk?
    •   How do I manage access for partners, customers and other users
        outside my organization?
    •   How do I maintain strong, agile control over resource and
        information access to comply with current regulations?


4   © Novell, Inc. All rights reserved.
Novell Identity and Access
                            ®


    Management Solutions



     Novell Identity and Access Management
     solutions help you address the
     fundamental problem of managing “who
     has access to what,” so you can trust that
     your business is secure.




5   © Novell, Inc. All rights reserved.
Identity and Security Solutions



    Identity and Access Management
    Capabilities
    •   User Provisioning and
        Management
    •   Roles Management
    •   Simplified, Secure Access




6   © Novell, Inc. All rights reserved.
Identity and Security Solutions



    Identity and Access Management Products

      •   Novell Identity Manager
                        ®




      •   Novell Access Manager           ™




      •   Novell SecureLogin




7   © Novell, Inc. All rights reserved.
Novell Identity and Access
                            ®



    Management Solutions Capabilities

                  User Provisioning and             Simplified, Secure Access
                      Management



                                            IT      End
                                                    User

                                              Line-of-
                                             Business
                                             Manager



                                          Roles Management



8   © Novell, Inc. All rights reserved.
Novell Identity Manager
                    ®

Overview



Bob Bentley
Product Manager
Novell, Inc./ bbentley@novell.com



Kamal Nayaran
Product Manager
Novell, Inc. /nkamal@novell.com
Novell Identity Manager ®




                                           Enable your organization to be more
                                           open and agile without limiting
                                           security, control or compliance.
                                           Integrate, automate, and secure
                                           access to information for customers,
                                           partners, and employees.
                                           Maintain clear visibility of people,
                                           actions, and compliance, past and
                                           present.
                                           The result: Simplify and secure the
                                           enterprise while controlling costs
                                           and meeting regulatory demands.



10   © Novell, Inc. All rights reserved.
Your Identity Challenges

     •   Provisioning new users - Users wait up to 3 weeks for activated
         accounts
     •   Managing users - Help desk costs $25-40 per call for password
         resets, with 25-35% of calls related to password resets
     •   De-provisioning users - 30-60% of existing accounts are invalid
     •   Deploying new initiatives - Up to 30% of development time is for
         controlling access to applications and data
     •   Reconciling user data - 100+ user data sources at typical firm
         provide out-of-sync and untrustworthy identity data
     •   Protecting trust - Many new privacy and regulatory requirements
         around the world
     •   Achieving compliance – Up to 25% of IT budget is consumed to
         support compliance

11   © Novell, Inc. All rights reserved.
How Does
     Novell Identity Manager Help?
                             ®


     Security                                       Cost
     •   Revoke system access in minutes, not       •   Reduce your help desk costs by 40%
         days
                                                    •   Automate manual processes and work-
     •   Manage all password policies centrally         flows
     •   People get access to only what they need   •   Extend the value of legacy applications
         based on business roles
                                                    •   Simplified implementation and
     •   Eliminate siloed and duplicative systems       administration
                                                    •   End vendor lock-in and high switching costs
     Compliance
     •   Clear visibility into who has access to    Agility
         what, when and how they got it, and who
         approved it                                •   Integrate new businesses in days, not
                                                        months
     •   Historical/forensic review of access
                                                    •   Hire a new employee and have all their
     •   Insightful risk metrics illuminate             systems ready automatically on their start
         compliance conflicts                           date
     •   Easy policy updates to stay current        •   Empower users with provisioning control
     •   Instant documentation for auditors         •   Have business decisions drive IT and not
                                                        the other way round
12   © Novell, Inc. All rights reserved.
Novell Identity Manager 4
                             ®


     Product Family


            Compliance
            Management
            Platform


            IDM 4
            “Dorado”

            IDM 4
            “Capricorn”




13   © Novell, Inc. All rights reserved.
Identity Manager Architecture Logical View

                                  Your Portal/                                                                         Customers/
            Mobile        Webtop Web Services/               Business         CISO        Compliance/    Employees      Partners/    Developers and
                                   Custom                    Managers                       Auditor                    Contractors    Consultants


                                                               Key Functional Capabilities
         White Pages/              Business              Approval Work-       Role-based            Advanced           Role and        Compliance
         Self-Service/             Resource                   flow            User Mgmt/            Reporting           Policy          Content
          Pwd Mgmt                 Request                                    Deleg Admin          and Metrics         Mapping




                                                                        Major Components
         Real-time Data               RBAC                  Identity           Work-flow            Historical                         Deployment
                                                                                                   Reporting           Open APIs        and Mgmt
            Integrity                 Model                  Vault              System
                                                                                                   Warehouse                              Tools




                                                                             Connectors




                                           Directories                   Help Desk                     Databases               Credentialing
                       Applications                         OS and                   Telephone and                 Cloud and SaaS
                                                         File Systems                Building Access

14   © Novell, Inc. All rights reserved.
Identity Manager in Operation

                                                             Promotion
                                           PROVISION                                  ROLE-BASED USER
                                                                                       ADMINISTRATION
        Employee,
        Customer,
        Partner,
        Volunteer

                  Relationship
                    Begins                                                           Move Locations



                                                                                                      Manager,
                           REPORT AND                                                                 Resource
                            MONITOR                                                                   Owner
     Auditor,
     Security Lead
                                                                                       New Project



                                                                                           REQUEST AND
            Relationship
               Ends
                                                                                ?           APPROVAL

                                                         x
              PASSWORD                                                   Forgot Password
             MANAGEMENT
                                                 Password Expires                PASSWORD
                                                                                MANAGEMENT
15   © Novell, Inc. All rights reserved.
Industry- Leading Provisioning

     •   Automated Provisioning
              New employees automatically granted access to
          –
              everything needed on their first day
                                                                       The right people
          –   Robust request and approval workflow system              get access to the
          –   Revoked access occurs in minutes                         right resources at
     •   Role-based Management
                                                                       the right time, and
          –   Automatically assigns and updates resources based
                                                                       nothing else.
              on users' business roles
          –   Respects Segregation of Duties between roles
     •   Identity Data Synchronization
          –   Maintains integrity of user information throughout the
              organization
          –   Enforces authority of identity information—the right
              data from the right sources
          –   Updates propagate within moments

16   © Novell, Inc. All rights reserved.
Powerful User Tools

     •   Password Management
              Enforce system-wide strong password policies
          –
                                                                 Empowering users
              Password management webtop helps users
          –
              change or recover passwords
                                                                 with critical tools
          –   Bi-directional password synchronization
                                                                 while enforcing
                                                                 appropriate
     •   User Self-Service
                                                                 security and
          –   Users can initiate their own access requests and
              password changes                                   reducing your
          –   Significantly reduces management costs and time    costs.
              to productivity
     •   Delegated Administration
          –   Business managers or department leaders can
              manage their users, reducing dependence and
              burden on IT



17   © Novell, Inc. All rights reserved.
Advanced Reporting and Metrics

     •   Insightful reports                                            Meaningful insight
          –   Variety of out-of-the-box report templates               into how your
          –   Reporting on present and past states,
              plus activity over time
                                                                       organization's
          –   Spans both the Identity Vault and connected systems
                                                                       mission critical
          –   Ready report customization through open report
                                                                       user provisioning
              template standards                                       is operating, and
     •   Robust automation                                             the ability to prove
          –   Visual report scheduling – one time or recurring         compliance.
          –   Policy-based data collection and storage
          –   Automatic report distribution to critical stakeholders
              and storage of completed reports
     •   Powerful compliance support
          –   Current and forensic review of identity and user
              provisioning related data

18   © Novell, Inc. All rights reserved.
Policy Mapping and Integration

     •   Role Mapping Administrator                                       Letting business
          –    Automatically discovers authorizations that can be
               granted within your major IT systems
                                                                          users Intelligently
          –    Allows business users (not just consultants, IT staff or
                                                                          connect the
               developers) to define and maintain which authorizations    policy dots
               are associated with business roles
                                                                          between the
               Result: associated authorizations are automatically
          –
               provisioned to business role members
                                                                          major IT systems
                                                                          your organization
     •   Breakthrough innovation in how your identity
         system is “programmed”                                           depends on.
          –    Visual, drag and drop, business-user-friendly tool
          –    Order-of-magnitude reduction in time, effort, cost
          –    Applies to both initial setup and ongoing maintenance
               of policy to keep it business-relevant
     •   Sustainable access compliance
           –   Works between Novell IDM, SAP, SharePoint, etc.
                                           ®



19   © Novell, Inc. All rights reserved.
Ready for Cloud Computing

     •   Uniquely ready for the challenges of the                      Ensuring your
         Cloud Computing                                               organization is
          –   Cloud-ready architecture makes the location of           ready for—and
              resources transparent—on-site, hosted, or both
                                                                       taking full
          –   User organizations enjoy the same security,
              management capabilities and predictability whether       advantage of—
              inside the organization or out in the cloud              cutting edge IT
     •   Seamless integration with SaaS and                            trends.
         hosted solutions
          –   User provisioning/de-provisioning, request/approval
              processes, password changes, identity profile updates,
              reporting, etc.
     •   Powerful tools make the hosted business
         model transparent, scalable and efficient
          –   SaaS application support with scalability and high
              availability to ensure compliant SaaS processes

20   © Novell, Inc. All rights reserved.
Intelligent Content Control

     •   Protects your configuration IP and                              Allows
         simplifies troubleshooting                                      customization of
          –   Leverages and protects your tremendous investments in
              policies, work-flow definitions, and other configuration
                                                                         IDM to your
          –   Alerts you when you're changing something that is used
                                                                         environment
              in multiple places and could have unintended effects       without getting
          –   'Factory Mode' temporarily overrides any changes made      painted into a
              and/or allows return to clean slate
                                                                         corner
     •   Enables content libraries
          –   Capture, archive, share, reuse good policy elements
          –   Integrators can create their unique 'canonical' approach
     •   Future: Out-of-the-box Business Relevance
         via Compliance Content Packs from Novell                   ®




          –   Addressing key compliance needs aligning to regulations
              such as PCI/DSS, SOX, HIPAA, FISMA, GLBA, Basel II,
              FERC/NERC, etc.
21   © Novell, Inc. All rights reserved.
Improved User Experience

     •   Work Dashboard
          –   A single consolidated view bringing together upcoming
              tasks, resource and role assignment, status of           Providing
              outstanding requests, etc.
                                                                       controls in the
          –   “Much less clicking”
                                                                       hands of users
     •   Resource Model and Assignments Dashboard                      to enhance
          –   A clear, easily understood view of who currently has
              access to what
                                                                       productivity
          –   Eliminates the “tech speak gap” for ordinary users who
              need to make decisions about who should get what
     •   Built in SSO Support
          –   Out-of-the-box integration with AD/Kerberos ticket
              systems, SAML assertions, and SAP Logon
              ticket systems
          –   Eliminates the need for an external SSO tool when
              accessing IDM

22   © Novell, Inc. All rights reserved.
New Work Dashboard




23   © Novell, Inc. All rights reserved.
Industry-leading Deployment Tools

     •   Designer                                                  Bringing the
          –   Model, deploy and document identity policies         “industrial
          –   Explore “what if” scenarios                          revolution” to the
          –   Version control, save/archive and reuse efforts      highly manual,
          –   Up to 50% less cost in deployment                    expensive
     •   Analyzer                                                  process of rolling
          –   Evaluate, cleanse and prepare identity data within   out identity
              systems to be managed
                                                                   management.
          –   Up to 80% less time and effort in
              manual-intensive prep work




24   © Novell, Inc. All rights reserved.
Development Platform

     •   True identity services architecture         Easily consume,
         –   Modular, accessible functions           manage and interact
                                                     with identity
     •   Easily consumed into your
         environment (“mashup”)                      management
                                                     functions however
             Your company portal
                                                     you need to.
         –


         –   Custom or mobile application

         –   Help desk or other business processes

     •   Over 100 standards-based
         identity services
         –   REST, SOAP, LDAP, JDBC, etc.

         –   Management and end-user actions



25   © Novell, Inc. All rights reserved.
Award-Winning Technology
     Ahead of the Competition
                               Information Security Magazine 2007 and 2008
                               Reader's Choice Award
                               Novell Identity Manager, this year's identity management winner is widely
                               regarded as the market leader, automating user provisioning to get employees
                               what they need—and only what they need—to get to work quickly.
                               —Second year in a row, Gold Medalist

                                2007 Global Product Excellence Customer Trust Award
                                •   Novell Identity Manager 3.5 for Excellence in Identity Management
                                           ®


                                •   Novell Access Manager for Excellence in Access Management
                                           ®
                                                                ™



                                •   Novell Sentinel 6 for Excellence in Security Management
                                           ®
                                                      ™




                                       2008 SIIA 23rd Annual Codie Awards
                                       “Best Security Solution • Novell Identity and Security Management Portfolio, Novell, Inc.”


                             “For large and growing mid-sized organizations Novell Identity Manager 3.5 is
                             our hands-down choice. For functionality, ease of use, and overall support, we
                             rate this our Best Buy”. - SC Magazine

26   © Novell, Inc. All rights reserved.
Industry's Best Partners




27   © Novell, Inc. All rights reserved.
Nearly 7000 Customers




28   © Novell, Inc. All rights reserved.
www.novell.com/identitymanager




29   © Novell, Inc. All rights reserved.
Novell Access Manager
                    ®
                                    ™




Lee Howarth
Product Manager,
Novell, Inc. /lhowarth@novell.com
Novell Access Manager   ®
                                                    ™




                                           Single solution protects both
                                           Web and enterprise applications
                                           Enables organizations to rapidly
                                           deploy secure online services
                                           Designed to help reduce
                                           management overhead and
                                           infrastructure costs
                                           Integrated Identity Federation –
                                           Out of the box support for all
                                           major specifications




31   © Novell, Inc. All rights reserved.
Customer Pain Points

                   Security and Compliance
                        •   Need to provide secure access to resources
                        •   Need to prove who accessed what
                        •   Users have too many IDs and passwords to remember
                   Cost and Complexity
                        •   Many different Web applications
                        •   Infrastructure costs are too high
                        •   Help desk costs are too high
                   Agility
                        •   Constant changes to the environment: new applications added
                            all the time and identity stores scattered across the enterprise
                        •   Need to deliver partner-enabled services (SSO)
                        •   Acquisitions



32   © Novell, Inc. All rights reserved.
How Does Novell Access Manager Help?   ®
                                                                         ™




             Security                                Cost                 Business
          and Compliance                        and Complexity             Agility

         Protects Web and                  Provides Web SSO          Supports any
         enterprise applications           without modification to   standard HTTP Web
         (Web and SSL VPN)                 Web servers               server
         Provides Web SSO                  No need for separate      Supports multiple
                                           SSL VPN and/or VPN        identity stores in any
         Provides advanced                 solution                  combination
         levels of
         authentication                    Reduces infrastructure    Integrated identity
                                           Costs (SSL certificates   federation
         Provides traceability             and IP addresses)
         (Who logged in and
         where did they go)                Federation enables
                                           existing applications




33   © Novell, Inc. All rights reserved.
Novell Access Manager Components      ™




34   © Novell, Inc. All rights reserved.
Product Milestones Since 2009

     •   Novell Access Manger 3.1 – Jan 2009
                      ®
                                           ™



                     – WS-Federation and Information Card Support
                     – SSL VPN Enhancements
                     – Improved Administration
                     – Additional Platform Support
                     – Additional APIs
     •   Novell Access Manager 3.1 SP1 – July 2009
                     – Identity Server Session Failover
                     – Non-Redirected Login
                     – Full Tunneling SSLVPN
                     – Customized Login Page Enhancements
                     – Session-based Logging

35   © Novell, Inc. All rights reserved.
WS-Federation and Information Cards

     •   Comprehensive SSO
                    – Builds on the strengths of Novell Access Manager 3.0 – out of
                                                        ®
                                                                           ™


                      the box SSO to any standard web server
                    – Adds WS-Federation to SAML and Liberty Alliance support
                    – Adds support for Windows CardSpace (Information Cards)
     •   Microsoft SharePoint Integration
                    – Worked closely with Microsoft to develop an test ADFS-based
                      SSO
                    – Perfect solution for enterprises that use a primary identity store
                      other than Active Directory (Novell eDirectory , Sun etc).
                                                                     ™




                    – Transforms Identity (LDAP / Federation) into ADFS-claims that
                      can be used for policy decisions in MS SharePoint



36   © Novell, Inc. All rights reserved.
Managing Access to SharePoint
     Architectural View

     •   SharePoint user management for multiple communities
          –   Options:
               >   Manual registration / management
               >   Identity management / provisioning
          –   Issues
               >   Increases management overhead
               >   Doesn't support federated access beyond WS-Federation
                                                                              eDirectory
                                                                                       ™


                                                                             “Employees”



                                            Microsoft
                                           SharePoint            Active         Active
                                                                Directory      Directory
                                                              “SharePoint”    “Business
                                                                                Units”


                                                                               Sun One
                                                                             “Customers”



37   © Novell, Inc. All rights reserved.
Managing Access to SharePoint with
     Novell Access Manager   ®
                                                                       ™



     •   Simplified access to MS SharePoint
          –   User authenticates to Access Manager
                                                                                Novell
              (Direct or Federated)                                            Access            eDirectory
                                                                                                          ™

                                                                               Manager          “Employees”
               >   Access Manager can validate identities across
                   multiple identity stores as well as federated
                   authentication from partners using SAML, WS-
                   Fed or Liberty Alliance                                                         Active
                                                                                                  Directory
          –   User accesses SharePoint                                                           “Business
                                                                            Access Manager         Units”
               >   Access Manager transforms LDAP and                       transforms LDAP
                   federated identity into claims that are forwarded          and Federated
                                                                           Identity into ADFS
                   to Active Directory Federation Services (ADFS)                claims
                                                                                                  Sun One
                                                                                                “Customers”
          –   SharePoint Administrator – Mr. Happy
               >   Associates claims to SharePoint groups
               >   No need to manage individual identities for all
                   users that need to access SharePoint
          –   Improved user experience
               >   Single Sign-On to SharePoint and
                                                                               Microsoft
                   other Web resources protected by Access                                         Active
                                                                              SharePoint
                                                                                                  Directory
                   Manager                                                                      “SharePoint”



38   © Novell, Inc. All rights reserved.
SSL VPN Enhancements

     •   Simplified Deployment
                     – Removed dependency on Access Gateway authentication
                       • Perfect for remote offices

     •   Improved Management
                     – Client Integrity Checking Level authorization policies
                     – Role-based control of client (Enterprise or Kiosk)
     •   Security Enhancements
                     – Desktop Cleanup
                       • History, Cache
              – Secure Folder



39   © Novell, Inc. All rights reserved.
Management and Customization

     •   Streamlined Management Interface
                     – Lower level policies to govern delegated administration
     •   Authorization API
                     – Enables integration with non-LDAP policy information
                       points
                     – Adds to existing authentication and identity injection APIs
     •   Additional Platform Support
                     – Windows Server for Identity and Admin Servers
                     – AIX version of J2EE Agent for IBM WebSphere




40   © Novell, Inc. All rights reserved.
Future Releases

     •   Novell Access Manager 3.1 SP2 – April 2010
                         ®
                                            ™



                     – Timeout per protected resource
                     – SAML/eGov Certification
                     – Access Gateway Service
     •   Novell Access Manager futures
                     – Web Agent Enforcement Points
                     – SAML Enhancements (Simplified Configuration)
                     – Performance Optimization in Virtual Environments
                     – Identity Services
                     – Single Box Installation


41   © Novell, Inc. All rights reserved.
www.novell.com/accessmanager




42   © Novell, Inc. All rights reserved.
Novell Secure Login ®




Baber Amin
Business Line Manager,
Novell, Inc. /baber@novell.com
Novell SecureLogin      ®




                                           •   Enable single sign-on to Web, JAVA
                                               and enterprise applications
                                           •   Reduce costs
                                           •   Enhance security with improved
                                               productivity
                                           •   Support compliance efforts




44   © Novell, Inc. All rights reserved.
Novell SecureLogin Mitigates Risk




45   © Novell, Inc. All rights reserved.
Novell SecureLogin Reduces Costs




46   © Novell, Inc. All rights reserved.
Novell SecureLogin      ®



     Improves Productivity




47   © Novell, Inc. All rights reserved.
Novell SecureLogin and Compliance
                             ®




48   © Novell, Inc. All rights reserved.
Novell SecureLogin      ®




49   © Novell, Inc. All rights reserved.
Password Synchronization

       Workstation


                                                                   Mainframe
                                           Username 1 / Password
     Mainframe                                                     Password:
                                                                   123456

                                                                    SAP
                                           Username 2 / Password               Synchronized
       SAP App                                                     Password:   passwords are
                                                                   123456      limited to the
                                                                               “lowest
                                                                    NOS        common
                                           Username 3 / Password
     Network OS                                                    Password:   denominator” of
                                                                   123456      the connected
                                                                               systems.
                                                                    Win32
                                           Username 4 / Password
                                                                   Password:
      Win32 App
                                                                   123456




50   © Novell, Inc. All rights reserved.
Enterprise Single Sign-on
                                                         Partner App

                                                          Password:
                                                          acme01

                                                         Mainframe

                                                          Password:
                                                          123456

                                                           SAP

                                                          Password:      Passwords are
                                                          john077        as strong as
              User
           Workstation
                                                                         each application
                                                           NOS           will permit.
                                              Novell      Password:
                                           SecureLogin    carpediem09

                                                           Win32

                                                          Password:
                                                          surferdude85

                                                           Gmail

                                                          Password:
51   © Novell, Inc. All rights reserved.
                                                          jj2500
Pre-provision User Credentials
     Supplemented by ESSO


                 SAP HR                E-mail          Linux               Mainframe

                                                               Password:           Password:
                                                               FV25I68             mfe009678




                                           Novell Identity Manager

                            Identity & Credential Store (eDirectory)

                                                                                                  Novell
                                                                                               SecureLogin




                                                                                                   User

52   © Novell, Inc. All rights reserved.
Web Access Management
     Supplemented by ESSO
                                                                                 Internal Web
                                                                                 Applications
                                              Novell
                                           SecureLogin                                Expense
                                                                                      Reportin
                                                                                      g
       User

                                                         Portal Interface
                                                                                      Benefits




                                                          Web Access Directory        Time Off
                                                          Management
                                                         Infrastructure

                                                                                 External Web
                                                                                 Applications


                                                                                      Partner App




                                                                                      Web Mail

53   © Novell, Inc. All rights reserved.
Novell SecureLogin       ®




                     1H 2010                               2H 2010                        2H 2010                      2011


                                                                                                                     NSL 7.x
                                                                                                           • eSSO Server / appliance
                                                                                                             offering
                                                                                                           • Zero day upgrade
                                                                                                           • Modular Client
                                                                                                           • Automated patch
                                                                                       NSL 7.x               management

                                                                              • UCF driven reports
                                                                              • Automated patch
                                                                                management
                                                                              • Modular Client
                                                                              • Supporting delegated
                                                       NSL 7.x                  access
                                                                              • Enhanced support for re-
                                            •   Emergency access capability
                                            •                                   authentication
                                                Integrated OTP
                                                                              • FDE support
                                            •   eSSO to SaaS applications
                                            •   Flash application support
           NSL 7.0 SP1
•   Windows 7 support
•   Oracle Forms
•   .NET and basic WPF support
•   SAP environment support



      54      © Novell, Inc. All rights reserved.
For More Information                               Try SecureLogin for
                                                             Yourself
                                                       We'll install SecureLogin on
     •   Visit table A5 in IT Central                   your machine (for free).

     •   Attend the following complementary sessions:
          –   BOF106: SecureLogin in the Real World Panel Discussion
          –   IAM205: Novell SecureLogin Installation, Deployment and Lifecycle
              Management
          –   IAM207: SecureLogin and Your Active Directory Setup
          –   IAM302: Using Hard Disk Encryption and SecureLogin
          –   IAM303: Enhancing SecureLogin with Multi-factor Authentication
          –   IAM304: Securing Shared Workstation with SecureLogin
     •   Walk through the SecureLogin demo in the
         Installation and Migration Depot
     •   Visit www.novell.com/securelogin

55   © Novell, Inc. All rights reserved.
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Más contenido relacionado

La actualidad más candente

Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...IBM Security
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference ArchitectureHannu Kasanen
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsBertrand Carlier
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Round table guide
Round table guideRound table guide
Round table guideOracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 

La actualidad más candente (17)

Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Round table guide
Round table guideRound table guide
Round table guide
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 

Destacado

Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
 
GraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access ManagementGraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access ManagementNeo4j
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a serviceDell World
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Active Directory File Permissions. Get Fast Answers to Who? What?
Active Directory File Permissions. Get Fast Answers to Who? What?Active Directory File Permissions. Get Fast Answers to Who? What?
Active Directory File Permissions. Get Fast Answers to Who? What?SolarWinds
 
SCIM 2.0 - Choose your own identity adventure
SCIM 2.0 - Choose your own identity adventureSCIM 2.0 - Choose your own identity adventure
SCIM 2.0 - Choose your own identity adventureKelly Grizzle
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionCA API Management
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationWSO2
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security ProgramSeccuris Inc.
 
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017Amazon Web Services
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Amazon Web Services
 

Destacado (20)

Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
GraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access ManagementGraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access Management
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Lecture 8 permissions
Lecture 8   permissionsLecture 8   permissions
Lecture 8 permissions
 
Active Directory File Permissions. Get Fast Answers to Who? What?
Active Directory File Permissions. Get Fast Answers to Who? What?Active Directory File Permissions. Get Fast Answers to Who? What?
Active Directory File Permissions. Get Fast Answers to Who? What?
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
SCIM 2.0 - Choose your own identity adventure
SCIM 2.0 - Choose your own identity adventureSCIM 2.0 - Choose your own identity adventure
SCIM 2.0 - Choose your own identity adventure
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
 
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
 

Similar a Overview of Identity and Access Management Product Line

What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0Novell
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportPaul Muller
 
The Evolution of Customer License Management
The Evolution of Customer License ManagementThe Evolution of Customer License Management
The Evolution of Customer License ManagementFlexera
 
Net@Work Client Presentation with Security
Net@Work Client Presentation with Security Net@Work Client Presentation with Security
Net@Work Client Presentation with Security Ray Glass
 
Maximizing the Revenue from Your Digital Goods Principles of High Performance...
Maximizing the Revenue from Your Digital Goods Principles of High Performance...Maximizing the Revenue from Your Digital Goods Principles of High Performance...
Maximizing the Revenue from Your Digital Goods Principles of High Performance...Flexera
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
Tech strategies keynote final for dc
Tech strategies keynote final for dcTech strategies keynote final for dc
Tech strategies keynote final for dcrickschultz
 
Mortgage Cadence Orchestrator Presentation
Mortgage Cadence Orchestrator PresentationMortgage Cadence Orchestrator Presentation
Mortgage Cadence Orchestrator PresentationJohnjdetwiler
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generationmuratc2a
 
Siebel to Salesforce
Siebel to Salesforce Siebel to Salesforce
Siebel to Salesforce Pactera_US
 
ProcessGene GRC Software Suite
ProcessGene GRC Software SuiteProcessGene GRC Software Suite
ProcessGene GRC Software SuiteProcessGene Ltd
 
Infopulse presentation
Infopulse presentation Infopulse presentation
Infopulse presentation HI-TECH_Org_Ua
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
 

Similar a Overview of Identity and Access Management Product Line (20)

What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Amazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team SportAmazing Winter Keynote - IT as a Team Sport
Amazing Winter Keynote - IT as a Team Sport
 
The Evolution of Customer License Management
The Evolution of Customer License ManagementThe Evolution of Customer License Management
The Evolution of Customer License Management
 
Net@Work Client Presentation with Security
Net@Work Client Presentation with Security Net@Work Client Presentation with Security
Net@Work Client Presentation with Security
 
Option One Case Study
Option One Case StudyOption One Case Study
Option One Case Study
 
Maximizing the Revenue from Your Digital Goods Principles of High Performance...
Maximizing the Revenue from Your Digital Goods Principles of High Performance...Maximizing the Revenue from Your Digital Goods Principles of High Performance...
Maximizing the Revenue from Your Digital Goods Principles of High Performance...
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Mindshare Managed It Services Intro V.1
Mindshare Managed It Services Intro V.1Mindshare Managed It Services Intro V.1
Mindshare Managed It Services Intro V.1
 
Tech strategies keynote final for dc
Tech strategies keynote final for dcTech strategies keynote final for dc
Tech strategies keynote final for dc
 
Mortgage Cadence Orchestrator Presentation
Mortgage Cadence Orchestrator PresentationMortgage Cadence Orchestrator Presentation
Mortgage Cadence Orchestrator Presentation
 
Uid101 intro preso
Uid101 intro presoUid101 intro preso
Uid101 intro preso
 
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document GenerationOracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
Oracle Insurance Insbridge Rating & Underwriting + Documaker Document Generation
 
Siebel to Salesforce
Siebel to Salesforce Siebel to Salesforce
Siebel to Salesforce
 
ProcessGene GRC Software Suite
ProcessGene GRC Software SuiteProcessGene GRC Software Suite
ProcessGene GRC Software Suite
 
Infopulse presentation
Infopulse presentation Infopulse presentation
Infopulse presentation
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 

Más de Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 

Más de Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

Overview of Identity and Access Management Product Line

  • 1. Overview of Identity and Access Management Product Line
  • 2. Presenters Ajay Sharma Kamal Narayan Product Marketing Manager Product Manager Novell, Inc. nkamal@novell.com Baber Amin Business Line Manager, Lee Howarth Novell, Inc. baber@novell.com Product Manager, Novell, Inc. lhowarth@novell.com Bob Bentley Product Manager Novell, Inc. bbentley@novell.com 2 © Novell, Inc. All rights reserved.
  • 3. Risk to The Enterprise is Rising 3 © Novell, Inc. All rights reserved.
  • 4. Complex Times, Complex Challenges • How do I manage changes to user identities and access rights? • How do I improve the productivity of my IT staff and end users? • How do I reduce password-related calls to the helpdesk due to stronger password policies? • How do I ensure that users have the right access to systems so I can minimize risk? • How do I manage access for partners, customers and other users outside my organization? • How do I maintain strong, agile control over resource and information access to comply with current regulations? 4 © Novell, Inc. All rights reserved.
  • 5. Novell Identity and Access ® Management Solutions Novell Identity and Access Management solutions help you address the fundamental problem of managing “who has access to what,” so you can trust that your business is secure. 5 © Novell, Inc. All rights reserved.
  • 6. Identity and Security Solutions Identity and Access Management Capabilities • User Provisioning and Management • Roles Management • Simplified, Secure Access 6 © Novell, Inc. All rights reserved.
  • 7. Identity and Security Solutions Identity and Access Management Products • Novell Identity Manager ® • Novell Access Manager ™ • Novell SecureLogin 7 © Novell, Inc. All rights reserved.
  • 8. Novell Identity and Access ® Management Solutions Capabilities User Provisioning and Simplified, Secure Access Management IT End User Line-of- Business Manager Roles Management 8 © Novell, Inc. All rights reserved.
  • 9. Novell Identity Manager ® Overview Bob Bentley Product Manager Novell, Inc./ bbentley@novell.com Kamal Nayaran Product Manager Novell, Inc. /nkamal@novell.com
  • 10. Novell Identity Manager ® Enable your organization to be more open and agile without limiting security, control or compliance. Integrate, automate, and secure access to information for customers, partners, and employees. Maintain clear visibility of people, actions, and compliance, past and present. The result: Simplify and secure the enterprise while controlling costs and meeting regulatory demands. 10 © Novell, Inc. All rights reserved.
  • 11. Your Identity Challenges • Provisioning new users - Users wait up to 3 weeks for activated accounts • Managing users - Help desk costs $25-40 per call for password resets, with 25-35% of calls related to password resets • De-provisioning users - 30-60% of existing accounts are invalid • Deploying new initiatives - Up to 30% of development time is for controlling access to applications and data • Reconciling user data - 100+ user data sources at typical firm provide out-of-sync and untrustworthy identity data • Protecting trust - Many new privacy and regulatory requirements around the world • Achieving compliance – Up to 25% of IT budget is consumed to support compliance 11 © Novell, Inc. All rights reserved.
  • 12. How Does Novell Identity Manager Help? ® Security Cost • Revoke system access in minutes, not • Reduce your help desk costs by 40% days • Automate manual processes and work- • Manage all password policies centrally flows • People get access to only what they need • Extend the value of legacy applications based on business roles • Simplified implementation and • Eliminate siloed and duplicative systems administration • End vendor lock-in and high switching costs Compliance • Clear visibility into who has access to Agility what, when and how they got it, and who approved it • Integrate new businesses in days, not months • Historical/forensic review of access • Hire a new employee and have all their • Insightful risk metrics illuminate systems ready automatically on their start compliance conflicts date • Easy policy updates to stay current • Empower users with provisioning control • Instant documentation for auditors • Have business decisions drive IT and not the other way round 12 © Novell, Inc. All rights reserved.
  • 13. Novell Identity Manager 4 ® Product Family Compliance Management Platform IDM 4 “Dorado” IDM 4 “Capricorn” 13 © Novell, Inc. All rights reserved.
  • 14. Identity Manager Architecture Logical View Your Portal/ Customers/ Mobile Webtop Web Services/ Business CISO Compliance/ Employees Partners/ Developers and Custom Managers Auditor Contractors Consultants Key Functional Capabilities White Pages/ Business Approval Work- Role-based Advanced Role and Compliance Self-Service/ Resource flow User Mgmt/ Reporting Policy Content Pwd Mgmt Request Deleg Admin and Metrics Mapping Major Components Real-time Data RBAC Identity Work-flow Historical Deployment Reporting Open APIs and Mgmt Integrity Model Vault System Warehouse Tools Connectors Directories Help Desk Databases Credentialing Applications OS and Telephone and Cloud and SaaS File Systems Building Access 14 © Novell, Inc. All rights reserved.
  • 15. Identity Manager in Operation Promotion PROVISION ROLE-BASED USER ADMINISTRATION Employee, Customer, Partner, Volunteer Relationship Begins Move Locations Manager, REPORT AND Resource MONITOR Owner Auditor, Security Lead New Project REQUEST AND Relationship Ends ? APPROVAL x PASSWORD Forgot Password MANAGEMENT Password Expires PASSWORD MANAGEMENT 15 © Novell, Inc. All rights reserved.
  • 16. Industry- Leading Provisioning • Automated Provisioning New employees automatically granted access to – everything needed on their first day The right people – Robust request and approval workflow system get access to the – Revoked access occurs in minutes right resources at • Role-based Management the right time, and – Automatically assigns and updates resources based nothing else. on users' business roles – Respects Segregation of Duties between roles • Identity Data Synchronization – Maintains integrity of user information throughout the organization – Enforces authority of identity information—the right data from the right sources – Updates propagate within moments 16 © Novell, Inc. All rights reserved.
  • 17. Powerful User Tools • Password Management Enforce system-wide strong password policies – Empowering users Password management webtop helps users – change or recover passwords with critical tools – Bi-directional password synchronization while enforcing appropriate • User Self-Service security and – Users can initiate their own access requests and password changes reducing your – Significantly reduces management costs and time costs. to productivity • Delegated Administration – Business managers or department leaders can manage their users, reducing dependence and burden on IT 17 © Novell, Inc. All rights reserved.
  • 18. Advanced Reporting and Metrics • Insightful reports Meaningful insight – Variety of out-of-the-box report templates into how your – Reporting on present and past states, plus activity over time organization's – Spans both the Identity Vault and connected systems mission critical – Ready report customization through open report user provisioning template standards is operating, and • Robust automation the ability to prove – Visual report scheduling – one time or recurring compliance. – Policy-based data collection and storage – Automatic report distribution to critical stakeholders and storage of completed reports • Powerful compliance support – Current and forensic review of identity and user provisioning related data 18 © Novell, Inc. All rights reserved.
  • 19. Policy Mapping and Integration • Role Mapping Administrator Letting business – Automatically discovers authorizations that can be granted within your major IT systems users Intelligently – Allows business users (not just consultants, IT staff or connect the developers) to define and maintain which authorizations policy dots are associated with business roles between the Result: associated authorizations are automatically – provisioned to business role members major IT systems your organization • Breakthrough innovation in how your identity system is “programmed” depends on. – Visual, drag and drop, business-user-friendly tool – Order-of-magnitude reduction in time, effort, cost – Applies to both initial setup and ongoing maintenance of policy to keep it business-relevant • Sustainable access compliance – Works between Novell IDM, SAP, SharePoint, etc. ® 19 © Novell, Inc. All rights reserved.
  • 20. Ready for Cloud Computing • Uniquely ready for the challenges of the Ensuring your Cloud Computing organization is – Cloud-ready architecture makes the location of ready for—and resources transparent—on-site, hosted, or both taking full – User organizations enjoy the same security, management capabilities and predictability whether advantage of— inside the organization or out in the cloud cutting edge IT • Seamless integration with SaaS and trends. hosted solutions – User provisioning/de-provisioning, request/approval processes, password changes, identity profile updates, reporting, etc. • Powerful tools make the hosted business model transparent, scalable and efficient – SaaS application support with scalability and high availability to ensure compliant SaaS processes 20 © Novell, Inc. All rights reserved.
  • 21. Intelligent Content Control • Protects your configuration IP and Allows simplifies troubleshooting customization of – Leverages and protects your tremendous investments in policies, work-flow definitions, and other configuration IDM to your – Alerts you when you're changing something that is used environment in multiple places and could have unintended effects without getting – 'Factory Mode' temporarily overrides any changes made painted into a and/or allows return to clean slate corner • Enables content libraries – Capture, archive, share, reuse good policy elements – Integrators can create their unique 'canonical' approach • Future: Out-of-the-box Business Relevance via Compliance Content Packs from Novell ® – Addressing key compliance needs aligning to regulations such as PCI/DSS, SOX, HIPAA, FISMA, GLBA, Basel II, FERC/NERC, etc. 21 © Novell, Inc. All rights reserved.
  • 22. Improved User Experience • Work Dashboard – A single consolidated view bringing together upcoming tasks, resource and role assignment, status of Providing outstanding requests, etc. controls in the – “Much less clicking” hands of users • Resource Model and Assignments Dashboard to enhance – A clear, easily understood view of who currently has access to what productivity – Eliminates the “tech speak gap” for ordinary users who need to make decisions about who should get what • Built in SSO Support – Out-of-the-box integration with AD/Kerberos ticket systems, SAML assertions, and SAP Logon ticket systems – Eliminates the need for an external SSO tool when accessing IDM 22 © Novell, Inc. All rights reserved.
  • 23. New Work Dashboard 23 © Novell, Inc. All rights reserved.
  • 24. Industry-leading Deployment Tools • Designer Bringing the – Model, deploy and document identity policies “industrial – Explore “what if” scenarios revolution” to the – Version control, save/archive and reuse efforts highly manual, – Up to 50% less cost in deployment expensive • Analyzer process of rolling – Evaluate, cleanse and prepare identity data within out identity systems to be managed management. – Up to 80% less time and effort in manual-intensive prep work 24 © Novell, Inc. All rights reserved.
  • 25. Development Platform • True identity services architecture Easily consume, – Modular, accessible functions manage and interact with identity • Easily consumed into your environment (“mashup”) management functions however Your company portal you need to. – – Custom or mobile application – Help desk or other business processes • Over 100 standards-based identity services – REST, SOAP, LDAP, JDBC, etc. – Management and end-user actions 25 © Novell, Inc. All rights reserved.
  • 26. Award-Winning Technology Ahead of the Competition Information Security Magazine 2007 and 2008 Reader's Choice Award Novell Identity Manager, this year's identity management winner is widely regarded as the market leader, automating user provisioning to get employees what they need—and only what they need—to get to work quickly. —Second year in a row, Gold Medalist 2007 Global Product Excellence Customer Trust Award • Novell Identity Manager 3.5 for Excellence in Identity Management ® • Novell Access Manager for Excellence in Access Management ® ™ • Novell Sentinel 6 for Excellence in Security Management ® ™ 2008 SIIA 23rd Annual Codie Awards “Best Security Solution • Novell Identity and Security Management Portfolio, Novell, Inc.” “For large and growing mid-sized organizations Novell Identity Manager 3.5 is our hands-down choice. For functionality, ease of use, and overall support, we rate this our Best Buy”. - SC Magazine 26 © Novell, Inc. All rights reserved.
  • 27. Industry's Best Partners 27 © Novell, Inc. All rights reserved.
  • 28. Nearly 7000 Customers 28 © Novell, Inc. All rights reserved.
  • 29. www.novell.com/identitymanager 29 © Novell, Inc. All rights reserved.
  • 30. Novell Access Manager ® ™ Lee Howarth Product Manager, Novell, Inc. /lhowarth@novell.com
  • 31. Novell Access Manager ® ™ Single solution protects both Web and enterprise applications Enables organizations to rapidly deploy secure online services Designed to help reduce management overhead and infrastructure costs Integrated Identity Federation – Out of the box support for all major specifications 31 © Novell, Inc. All rights reserved.
  • 32. Customer Pain Points Security and Compliance • Need to provide secure access to resources • Need to prove who accessed what • Users have too many IDs and passwords to remember Cost and Complexity • Many different Web applications • Infrastructure costs are too high • Help desk costs are too high Agility • Constant changes to the environment: new applications added all the time and identity stores scattered across the enterprise • Need to deliver partner-enabled services (SSO) • Acquisitions 32 © Novell, Inc. All rights reserved.
  • 33. How Does Novell Access Manager Help? ® ™ Security Cost Business and Compliance and Complexity Agility Protects Web and Provides Web SSO Supports any enterprise applications without modification to standard HTTP Web (Web and SSL VPN) Web servers server Provides Web SSO No need for separate Supports multiple SSL VPN and/or VPN identity stores in any Provides advanced solution combination levels of authentication Reduces infrastructure Integrated identity Costs (SSL certificates federation Provides traceability and IP addresses) (Who logged in and where did they go) Federation enables existing applications 33 © Novell, Inc. All rights reserved.
  • 34. Novell Access Manager Components ™ 34 © Novell, Inc. All rights reserved.
  • 35. Product Milestones Since 2009 • Novell Access Manger 3.1 – Jan 2009 ® ™ – WS-Federation and Information Card Support – SSL VPN Enhancements – Improved Administration – Additional Platform Support – Additional APIs • Novell Access Manager 3.1 SP1 – July 2009 – Identity Server Session Failover – Non-Redirected Login – Full Tunneling SSLVPN – Customized Login Page Enhancements – Session-based Logging 35 © Novell, Inc. All rights reserved.
  • 36. WS-Federation and Information Cards • Comprehensive SSO – Builds on the strengths of Novell Access Manager 3.0 – out of ® ™ the box SSO to any standard web server – Adds WS-Federation to SAML and Liberty Alliance support – Adds support for Windows CardSpace (Information Cards) • Microsoft SharePoint Integration – Worked closely with Microsoft to develop an test ADFS-based SSO – Perfect solution for enterprises that use a primary identity store other than Active Directory (Novell eDirectory , Sun etc). ™ – Transforms Identity (LDAP / Federation) into ADFS-claims that can be used for policy decisions in MS SharePoint 36 © Novell, Inc. All rights reserved.
  • 37. Managing Access to SharePoint Architectural View • SharePoint user management for multiple communities – Options: > Manual registration / management > Identity management / provisioning – Issues > Increases management overhead > Doesn't support federated access beyond WS-Federation eDirectory ™ “Employees” Microsoft SharePoint Active Active Directory Directory “SharePoint” “Business Units” Sun One “Customers” 37 © Novell, Inc. All rights reserved.
  • 38. Managing Access to SharePoint with Novell Access Manager ® ™ • Simplified access to MS SharePoint – User authenticates to Access Manager Novell (Direct or Federated) Access eDirectory ™ Manager “Employees” > Access Manager can validate identities across multiple identity stores as well as federated authentication from partners using SAML, WS- Fed or Liberty Alliance Active Directory – User accesses SharePoint “Business Access Manager Units” > Access Manager transforms LDAP and transforms LDAP federated identity into claims that are forwarded and Federated Identity into ADFS to Active Directory Federation Services (ADFS) claims Sun One “Customers” – SharePoint Administrator – Mr. Happy > Associates claims to SharePoint groups > No need to manage individual identities for all users that need to access SharePoint – Improved user experience > Single Sign-On to SharePoint and Microsoft other Web resources protected by Access Active SharePoint Directory Manager “SharePoint” 38 © Novell, Inc. All rights reserved.
  • 39. SSL VPN Enhancements • Simplified Deployment – Removed dependency on Access Gateway authentication • Perfect for remote offices • Improved Management – Client Integrity Checking Level authorization policies – Role-based control of client (Enterprise or Kiosk) • Security Enhancements – Desktop Cleanup • History, Cache – Secure Folder 39 © Novell, Inc. All rights reserved.
  • 40. Management and Customization • Streamlined Management Interface – Lower level policies to govern delegated administration • Authorization API – Enables integration with non-LDAP policy information points – Adds to existing authentication and identity injection APIs • Additional Platform Support – Windows Server for Identity and Admin Servers – AIX version of J2EE Agent for IBM WebSphere 40 © Novell, Inc. All rights reserved.
  • 41. Future Releases • Novell Access Manager 3.1 SP2 – April 2010 ® ™ – Timeout per protected resource – SAML/eGov Certification – Access Gateway Service • Novell Access Manager futures – Web Agent Enforcement Points – SAML Enhancements (Simplified Configuration) – Performance Optimization in Virtual Environments – Identity Services – Single Box Installation 41 © Novell, Inc. All rights reserved.
  • 42. www.novell.com/accessmanager 42 © Novell, Inc. All rights reserved.
  • 43. Novell Secure Login ® Baber Amin Business Line Manager, Novell, Inc. /baber@novell.com
  • 44. Novell SecureLogin ® • Enable single sign-on to Web, JAVA and enterprise applications • Reduce costs • Enhance security with improved productivity • Support compliance efforts 44 © Novell, Inc. All rights reserved.
  • 45. Novell SecureLogin Mitigates Risk 45 © Novell, Inc. All rights reserved.
  • 46. Novell SecureLogin Reduces Costs 46 © Novell, Inc. All rights reserved.
  • 47. Novell SecureLogin ® Improves Productivity 47 © Novell, Inc. All rights reserved.
  • 48. Novell SecureLogin and Compliance ® 48 © Novell, Inc. All rights reserved.
  • 49. Novell SecureLogin ® 49 © Novell, Inc. All rights reserved.
  • 50. Password Synchronization Workstation Mainframe Username 1 / Password Mainframe Password: 123456 SAP Username 2 / Password Synchronized SAP App Password: passwords are 123456 limited to the “lowest NOS common Username 3 / Password Network OS Password: denominator” of 123456 the connected systems. Win32 Username 4 / Password Password: Win32 App 123456 50 © Novell, Inc. All rights reserved.
  • 51. Enterprise Single Sign-on Partner App Password: acme01 Mainframe Password: 123456 SAP Password: Passwords are john077 as strong as User Workstation each application NOS will permit. Novell Password: SecureLogin carpediem09 Win32 Password: surferdude85 Gmail Password: 51 © Novell, Inc. All rights reserved. jj2500
  • 52. Pre-provision User Credentials Supplemented by ESSO SAP HR E-mail Linux Mainframe Password: Password: FV25I68 mfe009678 Novell Identity Manager Identity & Credential Store (eDirectory) Novell SecureLogin User 52 © Novell, Inc. All rights reserved.
  • 53. Web Access Management Supplemented by ESSO Internal Web Applications Novell SecureLogin Expense Reportin g User Portal Interface Benefits Web Access Directory Time Off Management Infrastructure External Web Applications Partner App Web Mail 53 © Novell, Inc. All rights reserved.
  • 54. Novell SecureLogin ® 1H 2010 2H 2010 2H 2010 2011 NSL 7.x • eSSO Server / appliance offering • Zero day upgrade • Modular Client • Automated patch NSL 7.x management • UCF driven reports • Automated patch management • Modular Client • Supporting delegated NSL 7.x access • Enhanced support for re- • Emergency access capability • authentication Integrated OTP • FDE support • eSSO to SaaS applications • Flash application support NSL 7.0 SP1 • Windows 7 support • Oracle Forms • .NET and basic WPF support • SAP environment support 54 © Novell, Inc. All rights reserved.
  • 55. For More Information Try SecureLogin for Yourself We'll install SecureLogin on • Visit table A5 in IT Central your machine (for free). • Attend the following complementary sessions: – BOF106: SecureLogin in the Real World Panel Discussion – IAM205: Novell SecureLogin Installation, Deployment and Lifecycle Management – IAM207: SecureLogin and Your Active Directory Setup – IAM302: Using Hard Disk Encryption and SecureLogin – IAM303: Enhancing SecureLogin with Multi-factor Authentication – IAM304: Securing Shared Workstation with SecureLogin • Walk through the SecureLogin demo in the Installation and Migration Depot • Visit www.novell.com/securelogin 55 © Novell, Inc. All rights reserved.
  • 56.
  • 57. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.