SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
Sun2Oracle: Avea’s Identity
Management Platform
Transformation
Darin Pendergraft, Oracle IDM
Ulvi Bucak, Avea
Mahmut Kucuk, Avea
This document is for informational purposes. It is not a commitment to deliver any material,
    code, or functionality, and should not be relied upon in making purchasing decisions. The
    development, release, and timing of any features or functionality described in this document
    remains at the sole discretion of Oracle. This document in any form, software or printed
    matter, contains proprietary information that is the exclusive property of Oracle. This
    document and information contained herein may not be disclosed, copied, reproduced or
    distributed to anyone outside Oracle without prior written consent of Oracle. This document
    is not part of your license agreement nor can it be incorporated into any contractual
    agreement with Oracle or its subsidiaries or affiliates.




2   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Speakers


      Darin Pendergraft                                                          Ulvi Bucak         Mahmut Küçük




Sr. Director, Product                                                       Security Operations   Security Planning
     Marketing                                                             and Planning Manager      Supervisor


3   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Agenda
                                                                            IDM Drivers
                                                                            Barriers to Adoption
                                                                            Avea Case Study
                                                                            Platform Benefits
                                                                            Resources
                                                                            Q&A

4   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
What is driving your IDM strategy?

                                                                           Mobile Application Security

                                                                                                     Regulatory Compliance

                                                                           Self Service Enterprise

                                                                                             Social Identity Integration

                                                                               Cloud Services



5   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Barriers to Adoption


                                                                            Need to leverage existing IDM investments
                                                                            Uncertain funding
                                                                            Lack of in-house resources
                                                                            Scalability concerns
                                                                            Architectural complexity
                                                                            Service outage




6   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
AVEA
Identity & Access Management
            Project
•   About Avea
•   Business & Technical Requirements
•   What is the scope ?
•   Challenges
•   Lessons Learned
About Avea
• Avea, the sole GSM 1800 mobile operator of Turkey,
  was founded in 2004.
• Member of Turk Telekom Group.
• 12.8 million customers as of the first quarter of 2012.
• Offering services to 98% of Turkey's population
  through its next generation network.
Business & Technical Requirements
• Replace Sun IDM with OIM.
• Implement Role Based Access Control (RBAC) for entire Avea organization.
• Enhanced Self Service Workflows.
• Improve Provisioning Performance.
• Improve Security of Self Service Password Reset.
• Review process for user entitlements periodically.
• Enable new platform to scale . (Project Ph2 is on the way for dealers)
• Build accurate and customized reports.
Challenges
• Business Roles are not defined (OIA)

• Request & Approval processes are not defined.

• User Interface customizations on 11g R1 is not easy.

• Outsourced testing team.

• Migration from existing Sun IDM.
What’s in scope?
• 6300 identites (employees & outsoures)

• 16 Enterprise Systems and Applications Integration
  (SAP, MS AD,Exchange,Siebel CRM, Unix Systems, etc.)


• ~150 of Roles and Access policies are defined

• 23 Request& approval workflow processes

• Attestation & SOD
Avea IDM System Overview
Completed tasks ..
• SAP HR User and Organization reconciliation with RFCs.
   –   Hire,Update,Transfer,Fire,Transfer to Sister Company to User
   –   Create,Update,Delete,Disable Organization
   –   Resolve missing records and synch issues.
   –   Create groups for CC (OrgId+Title+Location)

• New Outsource Management Application is developed
  on SAPHR.
   – To improve data quality
Completed tasks ..
• SMS and IVR voice recognition based Password
  Reset.
• User entitlement structure is changed for Avea
  subscription system.
• HR has role management responsibility.
• Organizational Change Process has been rebuilt.
• Online end user training.
UI Customizations
• CC Role Management UI &Workflows
   –   Create New Access Policy (with template option)
   –   Assign Resource to AP
   –   Assign AP to Groups
   –   Assign User (Temporarily) to a Group
   –   ...
• NonCC UI and Workflows
   – Manage Entitlements (needs Admin approval)
   – Request Resource for User
         • Single or Multi Privileges
   – Request Group for User
   – Password Reset for IT Helpdesk
   – ...
Lessons Learned
• Product and Partner.
• You need role mining (OIA) to define business roles
  and policies.
• Business sponsors.
• Tests must be performed onsite.
• Sun migration was not just an upgrade.
Assess the Business Opportunity


                  Security                                                    Efficiency               Scale

                                                                                                  3X



 Compliance                                                                 User Productivity    New Customers
 Internal Governance                                                        Operational Cost     Quality of Service
 Security Risk                                                              Opportunity Cost


18   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Oracle Identity Management 11gR2


Simplified Experience                                                        Modernized Platform

Cloud, Mobile and Social


Extreme Scale

                                                                            Faster        Lower
Clear Upgrade Path
                                                                            Deployment    TCO

19   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Oracle Identity Platform


              Identity                                                      Lifecycle Management & 360 visibility
              Governance                                                    Regular & Privileged identities

            Access                                                          Complete access control Detection
                                                                                              Fraud & SSO

            Management                                                      Converged Policy Administration & Control


            Directory                                                       LDAP, VirtualizationFraud Detection
                                                                                                 & Meta-directory
            Services                                                        Unified Administration & Management



20   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
The Platform Approach makes sense

                                                                            TAKING A
     48%                                              Cost Savings          REDUCES

     46%                                              More
                                                      Responsive
                                                                            INCREASES
                                                                            IMPROVES

     35%                                               Fewer Audit
                                                       Deficiencies


                                                                            Source: Aberdeen “Analyzing point solutions vs. platform” 2011



21   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Resources


                                                                            Blogs.oracle.com/OracleIDM


                                                                            Facebook.com/OracleIDM


                                                                            Twitter@OracleIDM



22   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
23   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
24   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
25   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Más contenido relacionado

La actualidad más candente

Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
OracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
OracleIDM
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
OracleIDM
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
OracleIDM
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
OracleIDM
 
Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2
OracleIDM
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
ruiruitang
 
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Private Cloud
 

La actualidad más candente (15)

Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2
 
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Microsoft Service Manager 2010
Microsoft Service Manager 2010Microsoft Service Manager 2010
Microsoft Service Manager 2010
 
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 

Destacado

베트남 노동법 주요내용
베트남 노동법 주요내용베트남 노동법 주요내용
베트남 노동법 주요내용
Nguyễn Khang
 
Photo album latest slideshow1
Photo album latest slideshow1Photo album latest slideshow1
Photo album latest slideshow1
hussain56
 

Destacado (20)

Identity Management “Who do you think they are?”
Identity Management “Who do you think they are?”Identity Management “Who do you think they are?”
Identity Management “Who do you think they are?”
 
KBACE Applied Identity Management
KBACE Applied Identity ManagementKBACE Applied Identity Management
KBACE Applied Identity Management
 
Ds105 2013 ef_ep_a
Ds105 2013 ef_ep_aDs105 2013 ef_ep_a
Ds105 2013 ef_ep_a
 
Linkedin
LinkedinLinkedin
Linkedin
 
VJ'ing Presentation at CWI
VJ'ing Presentation at CWIVJ'ing Presentation at CWI
VJ'ing Presentation at CWI
 
베트남 노동법 주요내용
베트남 노동법 주요내용베트남 노동법 주요내용
베트남 노동법 주요내용
 
CV VI
CV VICV VI
CV VI
 
Successes2009
Successes2009Successes2009
Successes2009
 
Sd10 nadia alkhazaliah
Sd10   nadia alkhazaliahSd10   nadia alkhazaliah
Sd10 nadia alkhazaliah
 
Photo album latest slideshow1
Photo album latest slideshow1Photo album latest slideshow1
Photo album latest slideshow1
 
Índice de confiança do empresário industrial
Índice de confiança do empresário industrialÍndice de confiança do empresário industrial
Índice de confiança do empresário industrial
 
Thinking & Planning the EPUB 3 Way
Thinking & Planning the EPUB 3 Way Thinking & Planning the EPUB 3 Way
Thinking & Planning the EPUB 3 Way
 
File management 101
File management 101File management 101
File management 101
 
Juego con vene
Juego con veneJuego con vene
Juego con vene
 
Presentació del diccionari grec clàssic català
Presentació del diccionari grec clàssic catalàPresentació del diccionari grec clàssic català
Presentació del diccionari grec clàssic català
 
שימו לב לסגול הרועד
שימו לב לסגול הרועדשימו לב לסגול הרועד
שימו לב לסגול הרועד
 
Правила прийому до Київського Славістичного Університету 2016
Правила прийому до Київського Славістичного Університету 2016Правила прийому до Київського Славістичного Університету 2016
Правила прийому до Київського Славістичного Університету 2016
 
Adco teaser
Adco teaserAdco teaser
Adco teaser
 
SBPS Staff Survey
SBPS Staff SurveySBPS Staff Survey
SBPS Staff Survey
 
Egoera: La economía de Bizkaia - Mayo 2016 - nº22. Cámara de Comercio de Bilbao
Egoera: La economía de Bizkaia - Mayo 2016 - nº22. Cámara de Comercio de BilbaoEgoera: La economía de Bizkaia - Mayo 2016 - nº22. Cámara de Comercio de Bilbao
Egoera: La economía de Bizkaia - Mayo 2016 - nº22. Cámara de Comercio de Bilbao
 

Similar a Sun2 oracle avea's identity management platform transformation

Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
OracleIDM
 
Ebs em con9053_pdf_9053_0001
Ebs em con9053_pdf_9053_0001Ebs em con9053_pdf_9053_0001
Ebs em con9053_pdf_9053_0001
jucaab
 
Fusion app tech_con8707_pdf_8707_0001
Fusion app tech_con8707_pdf_8707_0001Fusion app tech_con8707_pdf_8707_0001
Fusion app tech_con8707_pdf_8707_0001
jucaab
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
Eucalyptus Systems, Inc.
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
Eucalyptus Systems, Inc.
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
Eucalyptus Systems, Inc.
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
OracleIDM
 
Oracle enterprise architects day
Oracle enterprise architects dayOracle enterprise architects day
Oracle enterprise architects day
Ayodele Peter Boglo
 

Similar a Sun2 oracle avea's identity management platform transformation (20)

Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
Oracle Fusion Middleware,foundation for innovation
Oracle Fusion Middleware,foundation for innovationOracle Fusion Middleware,foundation for innovation
Oracle Fusion Middleware,foundation for innovation
 
Fusion Middleware 11g Keynote Foundation For Innovation
Fusion Middleware 11g Keynote Foundation For InnovationFusion Middleware 11g Keynote Foundation For Innovation
Fusion Middleware 11g Keynote Foundation For Innovation
 
Business Integration for the 21st Century
Business Integration for the 21st Century Business Integration for the 21st Century
Business Integration for the 21st Century
 
2012 year Siebel CRM Strategy and Roadmap (outdated)
2012 year Siebel CRM Strategy and Roadmap (outdated)2012 year Siebel CRM Strategy and Roadmap (outdated)
2012 year Siebel CRM Strategy and Roadmap (outdated)
 
Ebs em con9053_pdf_9053_0001
Ebs em con9053_pdf_9053_0001Ebs em con9053_pdf_9053_0001
Ebs em con9053_pdf_9053_0001
 
Fusion app tech_con8707_pdf_8707_0001
Fusion app tech_con8707_pdf_8707_0001Fusion app tech_con8707_pdf_8707_0001
Fusion app tech_con8707_pdf_8707_0001
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Implementing Applications with SOA and Application Integration Architecture
Implementing Applications with SOA and Application Integration ArchitectureImplementing Applications with SOA and Application Integration Architecture
Implementing Applications with SOA and Application Integration Architecture
 
Oracle enterprise architects day
Oracle enterprise architects dayOracle enterprise architects day
Oracle enterprise architects day
 
Keynote by Mario Derba at OpenXperience event in Brussels, October 25 2012
Keynote by Mario Derba at OpenXperience event in Brussels, October 25 2012Keynote by Mario Derba at OpenXperience event in Brussels, October 25 2012
Keynote by Mario Derba at OpenXperience event in Brussels, October 25 2012
 
Day 2 p3 - automation
Day 2   p3 - automationDay 2   p3 - automation
Day 2 p3 - automation
 
Day 2 p3 - automation
Day 2   p3 - automationDay 2   p3 - automation
Day 2 p3 - automation
 
Übersicht Cloud Control - EM 12c
Übersicht Cloud Control - EM 12cÜbersicht Cloud Control - EM 12c
Übersicht Cloud Control - EM 12c
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 

Más de OracleIDM

Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
OracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
OracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 

Más de OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 

Sun2 oracle avea's identity management platform transformation

  • 1. Sun2Oracle: Avea’s Identity Management Platform Transformation Darin Pendergraft, Oracle IDM Ulvi Bucak, Avea Mahmut Kucuk, Avea
  • 2. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates. 2 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 3. Speakers Darin Pendergraft Ulvi Bucak Mahmut Küçük Sr. Director, Product Security Operations Security Planning Marketing and Planning Manager Supervisor 3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 4. Agenda  IDM Drivers  Barriers to Adoption  Avea Case Study  Platform Benefits  Resources  Q&A 4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 5. What is driving your IDM strategy? Mobile Application Security Regulatory Compliance Self Service Enterprise Social Identity Integration Cloud Services 5 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 6. Barriers to Adoption  Need to leverage existing IDM investments  Uncertain funding  Lack of in-house resources  Scalability concerns  Architectural complexity  Service outage 6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 7. AVEA Identity & Access Management Project
  • 8. About Avea • Business & Technical Requirements • What is the scope ? • Challenges • Lessons Learned
  • 9. About Avea • Avea, the sole GSM 1800 mobile operator of Turkey, was founded in 2004. • Member of Turk Telekom Group. • 12.8 million customers as of the first quarter of 2012. • Offering services to 98% of Turkey's population through its next generation network.
  • 10. Business & Technical Requirements • Replace Sun IDM with OIM. • Implement Role Based Access Control (RBAC) for entire Avea organization. • Enhanced Self Service Workflows. • Improve Provisioning Performance. • Improve Security of Self Service Password Reset. • Review process for user entitlements periodically. • Enable new platform to scale . (Project Ph2 is on the way for dealers) • Build accurate and customized reports.
  • 11. Challenges • Business Roles are not defined (OIA) • Request & Approval processes are not defined. • User Interface customizations on 11g R1 is not easy. • Outsourced testing team. • Migration from existing Sun IDM.
  • 12. What’s in scope? • 6300 identites (employees & outsoures) • 16 Enterprise Systems and Applications Integration (SAP, MS AD,Exchange,Siebel CRM, Unix Systems, etc.) • ~150 of Roles and Access policies are defined • 23 Request& approval workflow processes • Attestation & SOD
  • 13. Avea IDM System Overview
  • 14. Completed tasks .. • SAP HR User and Organization reconciliation with RFCs. – Hire,Update,Transfer,Fire,Transfer to Sister Company to User – Create,Update,Delete,Disable Organization – Resolve missing records and synch issues. – Create groups for CC (OrgId+Title+Location) • New Outsource Management Application is developed on SAPHR. – To improve data quality
  • 15. Completed tasks .. • SMS and IVR voice recognition based Password Reset. • User entitlement structure is changed for Avea subscription system. • HR has role management responsibility. • Organizational Change Process has been rebuilt. • Online end user training.
  • 16. UI Customizations • CC Role Management UI &Workflows – Create New Access Policy (with template option) – Assign Resource to AP – Assign AP to Groups – Assign User (Temporarily) to a Group – ... • NonCC UI and Workflows – Manage Entitlements (needs Admin approval) – Request Resource for User • Single or Multi Privileges – Request Group for User – Password Reset for IT Helpdesk – ...
  • 17. Lessons Learned • Product and Partner. • You need role mining (OIA) to define business roles and policies. • Business sponsors. • Tests must be performed onsite. • Sun migration was not just an upgrade.
  • 18. Assess the Business Opportunity Security Efficiency Scale 3X  Compliance  User Productivity  New Customers  Internal Governance  Operational Cost  Quality of Service  Security Risk  Opportunity Cost 18 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 19. Oracle Identity Management 11gR2 Simplified Experience Modernized Platform Cloud, Mobile and Social Extreme Scale Faster Lower Clear Upgrade Path Deployment TCO 19 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 20. Oracle Identity Platform Identity Lifecycle Management & 360 visibility Governance Regular & Privileged identities Access Complete access control Detection Fraud & SSO Management Converged Policy Administration & Control Directory LDAP, VirtualizationFraud Detection & Meta-directory Services Unified Administration & Management 20 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 21. The Platform Approach makes sense TAKING A 48% Cost Savings REDUCES 46% More Responsive INCREASES IMPROVES 35% Fewer Audit Deficiencies Source: Aberdeen “Analyzing point solutions vs. platform” 2011 21 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 22. Resources Blogs.oracle.com/OracleIDM Facebook.com/OracleIDM Twitter@OracleIDM 22 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 23. 23 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 24. 24 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 25. 25 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.