SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
Business Development on NetIQ IDM

By Novell Consulting Ukraine (NCU)
Overview on value add of NCU
• Built new integration modules (drivers)
• Build a Risk Assesment System inside NetIQ IDM
• Enhanced user interface features of the portal IDM
UserApplication
• Comprehensive Separation of Duties management on
the application request stage.
• Other examples of enhancements made to NetIQ IDM
Built new drivers
Why ?
Customers demands:
Automation of access permissions and objects management for
Microstrategy (provider of enterprise software platforms for
Data Analytics & Audits).
Who uses Microstrategy: SWIFT, 1st Financial Bank USA, Adidas, First National
Bank, Bayer Healthcare, BNP Paribas, UniCredit, Deutsche Bank AG, DHL, Samsung
Electronics, eBay, Facebook, Hyundai Mortor Company etc.
http://www.microstrategy.com/us/about-us/customers/customer-list
Current NetIQ Deliverables:
None: There are no off shelf integration modules for the leader in
analytic and audit industry: MicroStrategy.
IDM integration module for
Microstrategy
IDM integration module for
Microstrategy
NCU developments:
• Fully-functional driver, built according to IDM and SDK architecture from NetIQ
• Complete Java implementation, uses Java Web API from MicroStrategy SDK
• Allows bi-directional synchronization of User, Group, Report data and other
MicroStrategy metadata with NetIQ IDM
• Delivered with built-in policy set, that lets achieve a result out of box
• Tested with MicroStrategy version 9.x in an actual project in Ukraine
Future NetIQ Deliverables:
Off shelf integration modules for the leader in analytic and audit industry:
MicroStrategy.
• components: IDM 4.x
• deliverables: .jar, .xml
• services: installation, configuration, documentation
• support: updates & upgrades, 2nd line support
IDM integration module for
Microstrategy Deliverables by NCU
Risk Assessment System
inside NetIQ IDM
Why ?
Risk Assessment for applied and
authorized permissions
Customers demands:
Pro-active reaction to redundant permissions risks (do not
allow to apply for the critical permission set on the
access request stage).
Receive comprehensive authorized permissions assessment
for damages forecast and re-assessment planning.
Current NetIQ Deliverables:
There are no Risk Assessment components inside NetIQ IDM.
The feature is arranged in an off-line mode through reporting - and a
refined version through Access Review.
Risk Assessment for applied and
authorized permissions
NCU developments:
• Data and Permissions Risk Assessment module for NetIQ IDM
(Abuse of permissions risk, Permissions loss risk, Permissions
delegation risk, Information distortion risk, Data breach risk etc.)
• Pro-active analysis of risk level feature during access request
application stage
• Worlds best practices in Risk Assessment reports
• Administration setting tools
Future NetIQ Deliverables:
Pro Active Risk Assessment for applied and authorized permissions
inside NetIQ IDM
Risk Assessment System module
Features
●
Risk Assessment based on complex evaluations of object (User,
System, Role, Activity)
●
Operational risk evaluation during role permission assignment in
the request application (form dashboards)
●
Risk Analysis and Assessment (parameterized linked reports/sub-
reports in JasperReport©)
●
Risk Forecasting based on evaluations and executed activities
(permissions assignment and revocation)
Permissions Request Form with Risk
Indicator
Permissions Request Form with Risk
Indicator
Risk Assessment (HeatMap)
Risk Assessment (HeatMap)
Risk Assessment (HeatMap subreport)
Critical Level Analysis
Critical Level Analysis
Critical Level Analysis
Critical Level Analysis
Risk Assessment System module
Conclusion
●
Risk Assessment based on characteristics of the objects used in
access approval and maintenance
●
Prevention/notification during assignment of roles associated with
risks
●
Risk Analysis and Forecasting
●
Assessment Indicator settings according to Customer demands
●
Analysis visualization for critical areas retrieval and assessment
●
“Heat Map” building for analysis acceleration
●
Assessment engine scaling according to object characteristics, risks,
object evaluations
• components: IDM 4.x UserApplication, EAS; Jasper Report
5.6/6.0 (community edition), jqgrid (opensource js-framework)
• deliverables: .war (.jar, .js), .xml (PRD), database schema
(postgresql), report templates
• services: installation, configuration, documentation
• support: updates & upgrades, 2nd line support
Risk Assessment System module
Deliverables by NCU
Enhanced user interface features
of the portal IDM UserApplication
IDM User Application interface
features extension
Customers demands:
The ability not only to manage user group/target system role
membership though IDM, but also to manage (create, edit)
roles/access-groups in target systems WITHOUT system
administrator's help.
Current NetIQ deliverables:
Building tools for Simple forms, suitable for requests with short
number of controls (fields, checkboxes etc.)
Example: User Application + jqGrid
Example: User Application + jqGrid
User Application + jqGrid
• Open Source jqGrid solution integration with
UserApplication Interface.
• jgGrid controls binding with IDM role-based system.
• As a result — ability to build more robust target system
permission management interfaces.
When need such features:
• Integration with systems that does not have native
interfaces for permission grouping or systems with
inconvenient interfaces.
• Demand to create and transfer to business the interfaces
for target system object creation (particularly topical in
banking).
Comprehensive Separation of Duties
management
Customers demands:
Prevent the registration request on conflict roles (SoD), having
invested the role of the lower levels.
Current NetIQ Deliverables:
NetIQ IDM does not check SoD policies in online forms and between
role model levels. NetIQ IDM does not communicate with the user in
case of policy violation.
Avoiding conflict of roles order
SoD Online control from
UserApplication forms
• SoD validation on all built-in
levels in UserApplication
forms.
• SoD violation notification.
• SoD policies creation
interface stays unchanged.
BusinessBusiness
Role 1Role 1
BusinessBusiness
Role 2Role 2
CommonCommon
Role 1Role 1
CommonCommon
Role 2Role 2
CommonCommon
Role 3Role 3
Prohibited
roles combi-
nation (SoD)
Other examples of enhancements
made to NetIQ IDM
• Optimized existing drivers (ActiveDirectory, Lotus Notes)
• Digital Signature solution made inside the approval
processes stage
• Extended and customized IDM reports

Más contenido relacionado

La actualidad más candente

Water management portal
Water management portalWater management portal
Water management portal
Pradeep Kiran
 
Data Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware PlatformData Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware Platform
WSO2
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0
John Bernhard
 
Oosd shopping (1)
Oosd shopping (1)Oosd shopping (1)
Oosd shopping (1)
shaj13
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
Conference Papers
 
SYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEMSYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEM
Nitish Xavier Tirkey
 
Software Requirement Specification - Interest Rate Management
Software Requirement Specification - Interest Rate ManagementSoftware Requirement Specification - Interest Rate Management
Software Requirement Specification - Interest Rate Management
Sharad Srivastava
 

La actualidad más candente (19)

Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
online banking system
online banking systemonline banking system
online banking system
 
Water management portal
Water management portalWater management portal
Water management portal
 
Srs present
Srs presentSrs present
Srs present
 
Data Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware PlatformData Entitlement with WSO2 Enterprise Middleware Platform
Data Entitlement with WSO2 Enterprise Middleware Platform
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
 
bank transaction system
bank transaction systembank transaction system
bank transaction system
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0
 
Its resource estimate for work request v c
Its resource estimate for work request v c Its resource estimate for work request v c
Its resource estimate for work request v c
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of III
 
Oosd shopping (1)
Oosd shopping (1)Oosd shopping (1)
Oosd shopping (1)
 
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
 
Web–based crm application with interactive graphs
Web–based crm application with interactive graphsWeb–based crm application with interactive graphs
Web–based crm application with interactive graphs
 
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
 
Demystifying Robotic Process Automation (RPA) & Automation Testing
Demystifying Robotic Process Automation (RPA) & Automation TestingDemystifying Robotic Process Automation (RPA) & Automation Testing
Demystifying Robotic Process Automation (RPA) & Automation Testing
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
 
SYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEMSYNOPSIS ON BANK MANAGEMENT SYSTEM
SYNOPSIS ON BANK MANAGEMENT SYSTEM
 
scom
scomscom
scom
 
Software Requirement Specification - Interest Rate Management
Software Requirement Specification - Interest Rate ManagementSoftware Requirement Specification - Interest Rate Management
Software Requirement Specification - Interest Rate Management
 

Similar a NCU Business Development on NetIQ IDM

CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ - Consortium for IT Software Quality
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
IBM Security
 
Akshay_salvi_Resume (1)
Akshay_salvi_Resume (1)Akshay_salvi_Resume (1)
Akshay_salvi_Resume (1)
Akshay Salvi
 
System Proposal(Personal Information & Leave Management System)
System Proposal(Personal Information & Leave Management System)System Proposal(Personal Information & Leave Management System)
System Proposal(Personal Information & Leave Management System)
Akila Jayarathna
 
Appalanaidu_4.4 Years Exp in DotNet Technology
Appalanaidu_4.4 Years Exp in DotNet TechnologyAppalanaidu_4.4 Years Exp in DotNet Technology
Appalanaidu_4.4 Years Exp in DotNet Technology
APPALANAIDU KONDALA
 
System Analysis And Design_FinalPPT_NirmishaK
System Analysis And Design_FinalPPT_NirmishaKSystem Analysis And Design_FinalPPT_NirmishaK
System Analysis And Design_FinalPPT_NirmishaK
Shehla Ghori
 
Singh durgesh projectppt
Singh durgesh projectpptSingh durgesh projectppt
Singh durgesh projectppt
Durgesh Singh
 
Jyoti_Java_Developer_5 year 9 month of experience
Jyoti_Java_Developer_5 year 9 month of experienceJyoti_Java_Developer_5 year 9 month of experience
Jyoti_Java_Developer_5 year 9 month of experience
jyoti mishra
 

Similar a NCU Business Development on NetIQ IDM (20)

Risk assessment system inside NetIQ. NCU development
Risk assessment system inside NetIQ.  NCU developmentRisk assessment system inside NetIQ.  NCU development
Risk assessment system inside NetIQ. NCU development
 
Banking Management System SDS
Banking Management System SDSBanking Management System SDS
Banking Management System SDS
 
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.
 
A CASE Lab Report - Project File on "ATM - Banking System"
A CASE Lab Report - Project File on  "ATM - Banking System"A CASE Lab Report - Project File on  "ATM - Banking System"
A CASE Lab Report - Project File on "ATM - Banking System"
 
Future fashion report
Future fashion reportFuture fashion report
Future fashion report
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
 
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
CISQ and Software Quality Measurement - Software Assurance Forum (March 2010)
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
 
Akshay_salvi_Resume (1)
Akshay_salvi_Resume (1)Akshay_salvi_Resume (1)
Akshay_salvi_Resume (1)
 
System Proposal(Personal Information & Leave Management System)
System Proposal(Personal Information & Leave Management System)System Proposal(Personal Information & Leave Management System)
System Proposal(Personal Information & Leave Management System)
 
Appalanaidu_4.4 Years Exp in DotNet Technology
Appalanaidu_4.4 Years Exp in DotNet TechnologyAppalanaidu_4.4 Years Exp in DotNet Technology
Appalanaidu_4.4 Years Exp in DotNet Technology
 
Arul_Resume
Arul_ResumeArul_Resume
Arul_Resume
 
Design and Development of a Headless Content Management System
Design and Development of a Headless Content Management SystemDesign and Development of a Headless Content Management System
Design and Development of a Headless Content Management System
 
System Analysis And Design_FinalPPT_NirmishaK
System Analysis And Design_FinalPPT_NirmishaKSystem Analysis And Design_FinalPPT_NirmishaK
System Analysis And Design_FinalPPT_NirmishaK
 
Singh durgesh projectppt
Singh durgesh projectpptSingh durgesh projectppt
Singh durgesh projectppt
 
Singh durgesh projectppt
Singh durgesh projectpptSingh durgesh projectppt
Singh durgesh projectppt
 
CV_Nitin_Kumar_2022
CV_Nitin_Kumar_2022CV_Nitin_Kumar_2022
CV_Nitin_Kumar_2022
 
IRJET - College Event Management System
IRJET - College Event Management SystemIRJET - College Event Management System
IRJET - College Event Management System
 
Developing dynamic ui using react
Developing dynamic ui using reactDeveloping dynamic ui using react
Developing dynamic ui using react
 
Jyoti_Java_Developer_5 year 9 month of experience
Jyoti_Java_Developer_5 year 9 month of experienceJyoti_Java_Developer_5 year 9 month of experience
Jyoti_Java_Developer_5 year 9 month of experience
 

Último

Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Último (20)

%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 

NCU Business Development on NetIQ IDM

  • 1. Business Development on NetIQ IDM  By Novell Consulting Ukraine (NCU)
  • 2. Overview on value add of NCU • Built new integration modules (drivers) • Build a Risk Assesment System inside NetIQ IDM • Enhanced user interface features of the portal IDM UserApplication • Comprehensive Separation of Duties management on the application request stage. • Other examples of enhancements made to NetIQ IDM
  • 4. Customers demands: Automation of access permissions and objects management for Microstrategy (provider of enterprise software platforms for Data Analytics & Audits). Who uses Microstrategy: SWIFT, 1st Financial Bank USA, Adidas, First National Bank, Bayer Healthcare, BNP Paribas, UniCredit, Deutsche Bank AG, DHL, Samsung Electronics, eBay, Facebook, Hyundai Mortor Company etc. http://www.microstrategy.com/us/about-us/customers/customer-list Current NetIQ Deliverables: None: There are no off shelf integration modules for the leader in analytic and audit industry: MicroStrategy. IDM integration module for Microstrategy
  • 5. IDM integration module for Microstrategy NCU developments: • Fully-functional driver, built according to IDM and SDK architecture from NetIQ • Complete Java implementation, uses Java Web API from MicroStrategy SDK • Allows bi-directional synchronization of User, Group, Report data and other MicroStrategy metadata with NetIQ IDM • Delivered with built-in policy set, that lets achieve a result out of box • Tested with MicroStrategy version 9.x in an actual project in Ukraine Future NetIQ Deliverables: Off shelf integration modules for the leader in analytic and audit industry: MicroStrategy.
  • 6. • components: IDM 4.x • deliverables: .jar, .xml • services: installation, configuration, documentation • support: updates & upgrades, 2nd line support IDM integration module for Microstrategy Deliverables by NCU
  • 8. Risk Assessment for applied and authorized permissions Customers demands: Pro-active reaction to redundant permissions risks (do not allow to apply for the critical permission set on the access request stage). Receive comprehensive authorized permissions assessment for damages forecast and re-assessment planning. Current NetIQ Deliverables: There are no Risk Assessment components inside NetIQ IDM. The feature is arranged in an off-line mode through reporting - and a refined version through Access Review.
  • 9. Risk Assessment for applied and authorized permissions NCU developments: • Data and Permissions Risk Assessment module for NetIQ IDM (Abuse of permissions risk, Permissions loss risk, Permissions delegation risk, Information distortion risk, Data breach risk etc.) • Pro-active analysis of risk level feature during access request application stage • Worlds best practices in Risk Assessment reports • Administration setting tools Future NetIQ Deliverables: Pro Active Risk Assessment for applied and authorized permissions inside NetIQ IDM
  • 10. Risk Assessment System module Features ● Risk Assessment based on complex evaluations of object (User, System, Role, Activity) ● Operational risk evaluation during role permission assignment in the request application (form dashboards) ● Risk Analysis and Assessment (parameterized linked reports/sub- reports in JasperReport©) ● Risk Forecasting based on evaluations and executed activities (permissions assignment and revocation)
  • 11. Permissions Request Form with Risk Indicator
  • 12. Permissions Request Form with Risk Indicator
  • 20. Risk Assessment System module Conclusion ● Risk Assessment based on characteristics of the objects used in access approval and maintenance ● Prevention/notification during assignment of roles associated with risks ● Risk Analysis and Forecasting ● Assessment Indicator settings according to Customer demands ● Analysis visualization for critical areas retrieval and assessment ● “Heat Map” building for analysis acceleration ● Assessment engine scaling according to object characteristics, risks, object evaluations
  • 21. • components: IDM 4.x UserApplication, EAS; Jasper Report 5.6/6.0 (community edition), jqgrid (opensource js-framework) • deliverables: .war (.jar, .js), .xml (PRD), database schema (postgresql), report templates • services: installation, configuration, documentation • support: updates & upgrades, 2nd line support Risk Assessment System module Deliverables by NCU
  • 22. Enhanced user interface features of the portal IDM UserApplication
  • 23. IDM User Application interface features extension Customers demands: The ability not only to manage user group/target system role membership though IDM, but also to manage (create, edit) roles/access-groups in target systems WITHOUT system administrator's help. Current NetIQ deliverables: Building tools for Simple forms, suitable for requests with short number of controls (fields, checkboxes etc.)
  • 26. User Application + jqGrid • Open Source jqGrid solution integration with UserApplication Interface. • jgGrid controls binding with IDM role-based system. • As a result — ability to build more robust target system permission management interfaces. When need such features: • Integration with systems that does not have native interfaces for permission grouping or systems with inconvenient interfaces. • Demand to create and transfer to business the interfaces for target system object creation (particularly topical in banking).
  • 27. Comprehensive Separation of Duties management
  • 28. Customers demands: Prevent the registration request on conflict roles (SoD), having invested the role of the lower levels. Current NetIQ Deliverables: NetIQ IDM does not check SoD policies in online forms and between role model levels. NetIQ IDM does not communicate with the user in case of policy violation. Avoiding conflict of roles order
  • 29. SoD Online control from UserApplication forms • SoD validation on all built-in levels in UserApplication forms. • SoD violation notification. • SoD policies creation interface stays unchanged. BusinessBusiness Role 1Role 1 BusinessBusiness Role 2Role 2 CommonCommon Role 1Role 1 CommonCommon Role 2Role 2 CommonCommon Role 3Role 3 Prohibited roles combi- nation (SoD)
  • 30. Other examples of enhancements made to NetIQ IDM • Optimized existing drivers (ActiveDirectory, Lotus Notes) • Digital Signature solution made inside the approval processes stage • Extended and customized IDM reports