SlideShare a Scribd company logo
1 of 7
Download to read offline
1 Hitachi ID Group Manager



                                                          Managing the User Lifecycle
                                                          Across On-Premises and
                                                          Cloud-Hosted Applications




Self service management of security group membership.




2 Agenda
  •   Introductions.
  •   Hitachi ID corporate overview.
  •   ID Management Suite overview.
  •   Managing membership in large numbers of AD groups.
  •   The Hitachi ID Group Manager solution.
  •   Animated demonstration.




                                            © 2012 Hitachi ID Systems, Inc.. All rights reserved.   1
Slide Presentation




3 Hitachi ID Corporate Overview


   Hitachi ID is a leading provider of identity
   and access management solutions.
       • Founded as M-Tech in 1992.
       • A division of Hitachi, Ltd. since 2008.
       • Over 900 customers.
       • More than 11M+ licensed users.
       • Offices in North America, Europe and
         APAC.
       • Partners globally.




4 Representative Hitachi ID Customers




                                                  © 2012 Hitachi ID Systems, Inc.. All rights reserved.       2
Slide Presentation




5 ID Management Suite




6 Problem: Too Many Security Groups
  Medium to large AD environments have             It is challenging to manage group
  thousands of security groups:                    membership on this scale:
     • Control access to printers, shares and          •   User needs constantly change.
       folders.                                        •   Users do not understand groups or ACLs.
     • Membership in mail distribution lists.          •   Users don’t know which groups they need.
                                                       •   Who authorizes membership in each
                                                           group?




                                            © 2012 Hitachi ID Systems, Inc.. All rights reserved.       3
Slide Presentation




7 Group Manager: Self service management of security group mem-
  bership
  • Hitachi ID Group Manager enables users to request access to network resources such as
    applications or file folders using an intuitive Web-based interface.
  • Behind the scenes, Group Manager creates requests for security group membership and
    automatically tracks authorization by the appropriate stake-holders.
  • Group Manager makes administration of security entitlements simple and efficient and so fosters
    collaboration and reduces security administration workload.




8 Group Manager Features
Hitachi ID Group Manager enables self service administration of user access to network resources –
shares, folders, etc.:
   • Intercept:
        – The Windows "Access Denied" error dialog and send users to the appropriate workflow /
          group membership request screen.
   • Browse:
        – Users find the resources they want using Group Manager.
   • Request:

        – Users ask for access to a resource (no knowledge of groups required).
   • Map:
        – Group Manager maps user requests to group membership.
   • Route:

        – A workflow request is created dynamically and sent to the group’s owner plus anyone else
          specified by policy.
   • Provision:
        – Upon approval, the user is added to the appropriate group.
   • Notify:

        – Users and authorizers are sent thank-you notes.




                                             © 2012 Hitachi ID Systems, Inc.. All rights reserved.       4
Slide Presentation




9 The 50/50 Rule
A simple rule that illustrates cost savings from each Hitachi ID Group Manager feature:



                                                                                                                 Net help desk
    Feature                                            Impact                                                    workload reduction
    Self-service access requests:                      Eliminates 50% of calls.                                  50%
    Simplified resolution of                            Shortens call duration by                                 75%
    access problems:                                   50%.




                                                                                                                 Net workload
    Scenario                                           Impact                                                    reduction
    Conservative estimate:                             50/50                                                     75%
    Optimized deployment:                              60/80                                                     92%




10 Multi-Master Architecture
                                                                      ,
                                                                   nix
                                                                , U 0,
                                                              AD S/39 P,
                                                            d   O DA 0
                                                        e
                                                     tiv or        L S40                                                                     d,
                                                   Na assw ge        A                                                                   st e
                                                     p han              Password
                                                                                                                                      -ho pps
                          User                          c
                                                                        Synch                                                      ud a
                                                                        Trigger                       Target Systems            Clo aaS
                                                                        Systems
                                                                                                                                  S
                                                                                                      with local agent:
                                                                                                      OS/390, Unix,
                                                              PW
                    Reverse                             ate        Hitachi ID                         older RSA
                                                    lid
                    Web Proxy                     Va               Application
           VPN                                                                                            s               Target Systems
                                                                   Server(s)                            ce
           Server                                                                                    rvi                  with remote agent:
 IVR                                                                     SQL
                                                                                                 b Se
 Server                                                                  DB
                                                                                               We                         AD, SQL, SAP, Notes, etc

                                                                                                                          ork
                                       Load
                                                          SQL

                                                                                                                       etw
                                       Balancer           DB

                                                                                                                     lN
                                                                                                                ca
                                           ails                                                               Lo
                                                                                                                                                  Target Systems
                                         Em                                                                                                                r
                                                                                                                                                       nte
                                                                   SQL/Oracle
                                                                                                  Firewall
                                SMTP or
                                                             ke
                                                                ts
                                                                                           r                                                      a Ce
                                Notes Mail               Tic                             ge                                                     t
                                                                                                                                             Da
                                                                                     g
                                                                                 Tri
                                         Incident
                                                               up
                                                                  &
                                                                                                                                        te
   TCP/IP + AES                          Management       Lo
                                                             ok
                                                                                                                                      mo
   Various Protocols
                                         System   System of                                     Firewall                         Re
                                                              Record                                          Proxy Server
   Secure Native Protocol
                                                                                                              (if needed)
   HTTPS




                                                                          © 2012 Hitachi ID Systems, Inc.. All rights reserved.                                    5
Slide Presentation




11 Windows access denied dialog leading to group membership re-
   quest


Animation: ../pics/camtasia/shell-extension/A-Request-Folder.cam4




12 Authorization of a request for security group membership


Animation: ../pics/camtasia/shell-extension/B-Request-Approve.cam4




13 Request approved, user can access the folder


Animation: ../pics/camtasia/shell-extension/C-approve-open-file.cam4




14 ID Management Suite Overview
  • Hitachi ID Group Manager is a component of ID Management Suite.
  • ID Management Suite is designed to streamline management of users and passwords for enterprise
    users.
  • A rich suite of identity and access management products, with over 11M licensed users, that can:
      –   Discover and connect user objects from every system.
      –   Streamline administration of users, entitlements and login credentials.
      –   Construct and maintain OrgChart data.
      –   Secure access to privileged accounts on thousands of systems.




                                               © 2012 Hitachi ID Systems, Inc.. All rights reserved.       6
Slide Presentation




               15 Summary
                 Hitachi ID Group Manager helps organizations to more quickly, efficiently and intuitively manage
                 membership in large numbers of Active Directory groups:
                      •   Users focus on network resources, not groups.
                      •   Group owners, not IT, authorize requests for resource access.
                      •   IT security administrators manage the process, not individual requests.
                      •   Auditors can monitor current group membership and how users came to have the rights they do.
                 Learn more at Hitachi-ID.com/Group-Manager.
                 ... or ... E-mail sales@Hitachi-ID.com




500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com


                                                                                              File: PRCS:pres
www.Hitachi-ID.com                                                                            Date: March 1, 2012

More Related Content

More from Hitachi ID Systems, Inc.

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication ManagementHitachi ID Systems, Inc.
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 

More from Hitachi ID Systems, Inc. (20)

Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Hitachi ID Group Manager: Reduce support cost with self-service AD group management

  • 1. 1 Hitachi ID Group Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Self service management of security group membership. 2 Agenda • Introductions. • Hitachi ID corporate overview. • ID Management Suite overview. • Managing membership in large numbers of AD groups. • The Hitachi ID Group Manager solution. • Animated demonstration. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 1
  • 2. Slide Presentation 3 Hitachi ID Corporate Overview Hitachi ID is a leading provider of identity and access management solutions. • Founded as M-Tech in 1992. • A division of Hitachi, Ltd. since 2008. • Over 900 customers. • More than 11M+ licensed users. • Offices in North America, Europe and APAC. • Partners globally. 4 Representative Hitachi ID Customers © 2012 Hitachi ID Systems, Inc.. All rights reserved. 2
  • 3. Slide Presentation 5 ID Management Suite 6 Problem: Too Many Security Groups Medium to large AD environments have It is challenging to manage group thousands of security groups: membership on this scale: • Control access to printers, shares and • User needs constantly change. folders. • Users do not understand groups or ACLs. • Membership in mail distribution lists. • Users don’t know which groups they need. • Who authorizes membership in each group? © 2012 Hitachi ID Systems, Inc.. All rights reserved. 3
  • 4. Slide Presentation 7 Group Manager: Self service management of security group mem- bership • Hitachi ID Group Manager enables users to request access to network resources such as applications or file folders using an intuitive Web-based interface. • Behind the scenes, Group Manager creates requests for security group membership and automatically tracks authorization by the appropriate stake-holders. • Group Manager makes administration of security entitlements simple and efficient and so fosters collaboration and reduces security administration workload. 8 Group Manager Features Hitachi ID Group Manager enables self service administration of user access to network resources – shares, folders, etc.: • Intercept: – The Windows "Access Denied" error dialog and send users to the appropriate workflow / group membership request screen. • Browse: – Users find the resources they want using Group Manager. • Request: – Users ask for access to a resource (no knowledge of groups required). • Map: – Group Manager maps user requests to group membership. • Route: – A workflow request is created dynamically and sent to the group’s owner plus anyone else specified by policy. • Provision: – Upon approval, the user is added to the appropriate group. • Notify: – Users and authorizers are sent thank-you notes. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 4
  • 5. Slide Presentation 9 The 50/50 Rule A simple rule that illustrates cost savings from each Hitachi ID Group Manager feature: Net help desk Feature Impact workload reduction Self-service access requests: Eliminates 50% of calls. 50% Simplified resolution of Shortens call duration by 75% access problems: 50%. Net workload Scenario Impact reduction Conservative estimate: 50/50 75% Optimized deployment: 60/80 92% 10 Multi-Master Architecture , nix , U 0, AD S/39 P, d O DA 0 e tiv or L S40 d, Na assw ge A st e p han Password -ho pps User c Synch ud a Trigger Target Systems Clo aaS Systems S with local agent: OS/390, Unix, PW Reverse ate Hitachi ID older RSA lid Web Proxy Va Application VPN s Target Systems Server(s) ce Server rvi with remote agent: IVR SQL b Se Server DB We AD, SQL, SAP, Notes, etc ork Load SQL etw Balancer DB lN ca ails Lo Target Systems Em r nte SQL/Oracle Firewall SMTP or ke ts r a Ce Notes Mail Tic ge t Da g Tri Incident up & te TCP/IP + AES Management Lo ok mo Various Protocols System System of Firewall Re Record Proxy Server Secure Native Protocol (if needed) HTTPS © 2012 Hitachi ID Systems, Inc.. All rights reserved. 5
  • 6. Slide Presentation 11 Windows access denied dialog leading to group membership re- quest Animation: ../pics/camtasia/shell-extension/A-Request-Folder.cam4 12 Authorization of a request for security group membership Animation: ../pics/camtasia/shell-extension/B-Request-Approve.cam4 13 Request approved, user can access the folder Animation: ../pics/camtasia/shell-extension/C-approve-open-file.cam4 14 ID Management Suite Overview • Hitachi ID Group Manager is a component of ID Management Suite. • ID Management Suite is designed to streamline management of users and passwords for enterprise users. • A rich suite of identity and access management products, with over 11M licensed users, that can: – Discover and connect user objects from every system. – Streamline administration of users, entitlements and login credentials. – Construct and maintain OrgChart data. – Secure access to privileged accounts on thousands of systems. © 2012 Hitachi ID Systems, Inc.. All rights reserved. 6
  • 7. Slide Presentation 15 Summary Hitachi ID Group Manager helps organizations to more quickly, efficiently and intuitively manage membership in large numbers of Active Directory groups: • Users focus on network resources, not groups. • Group owners, not IT, authorize requests for resource access. • IT security administrators manage the process, not individual requests. • Auditors can monitor current group membership and how users came to have the rights they do. Learn more at Hitachi-ID.com/Group-Manager. ... or ... E-mail sales@Hitachi-ID.com 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com File: PRCS:pres www.Hitachi-ID.com Date: March 1, 2012