SlideShare a Scribd company logo
1 of 21
Identitetshåndtering og tilgangskontroll
Business Ready Security Solutions Secure Messaging Secure Endpoint Secure Collaboration Information Protection Identity and Access Management
Business Ready Security Solutions Secure Messaging Secure Endpoint Secure Collaboration Information Protection Identity and Access Management Active Directory®Federation Services
Create Provision user Provision credentials Provision resources Help Desk ,[object Object]
Password Reset
New EntitlementsRetire Policy Management De-provision identities Revoke credentials De-provision resources Policy enforcement Approvals and notifications Audit trails Change Role changes Phone # or titlechange Password and PIN reset Resource requests Identity Lifecycle Management
Today:  Management Burden Is On IT IT Professionals Difficult to manage siloed identities Overloaded with help desk service requests Manually managing accounts and  permissions Poor tools for managing user credentials Information Workers Call help desk for passwordand access requests Wait for days  or  weeks for access Wait for IT to implement business policies Greater Complexity Wrong Contexts Wrong People Higher Costs Developers Complex to develop custom applications  Forced to develop business rules Challenge to learn different development models Hard to integrate systems
Aligning Experiences With The Right People IT Professionals Information Workers Architecture Deployment System administration Governance  Security Add Update Users Access Credentials Business rules & policy Permissions Group & role membership Distribution lists Passwords & PINs Policy Revoke Audit Developers System & application integration & development
Integrated provisioning of identities, credentials, and resources Automated, codeless user provisioning and de-provisioning Self-service and admin Profile Management UserManagement Manage multiple credential types (passwords, certificates, smart cards) Self-service password reset integrated with Windows logon Support for multiple & partner reset gates (q/a, smart card, speech, custom) Credential  Management Delegated & self-service group and distribution list management Information worker self-service experiences through Office and SharePoint Automated group and distribution list updates GroupManagement Visual, natural language process authoring & editing Extensible workflows through Windows Workflow Foundation Integrates with System Center for monitoring and control PolicyManagement FIM 2010 Solution Areas
Forefront Identity Manager in Action Databases Self-Service integration WindowsLog On LOB Applications FIM Portal Policy Management Credential Management User Management  Group Management Custom ISV PartnerSolutions IT Departments Directories
Identity ManagementUser provisioning ,[object Object]
Built-in workflow for identity management
Automatically synchronize all user information to different directories across the enterprise
Automates the process of on-boarding usersActiveDirectory LotusDomino Workflow User Enrollment  LDAP FIM SQLServer Approval HR System Oracle DB FIM CM Manager User provisioned on all allowed systems
Identity ManagementUser de-provisioning ,[object Object]
Built-in workflow for identity management
Real-time de-provisioning from all systems to prevent unauthorized access and information leakageActiveDirectory LotusDomino Workflow User de-provisioned  LDAP FIM SQLServer HR System Oracle DB FIM CM User de-provisioned or disabled on all systems
GivenName Samantha sn Dearing title Coordinator mail someone@example.com employeeID 007 telephone 555-0129 givenName sn title mail employeeID telephone Identity Synchronization and ConsistencyIdentity synchronization across multiple directories HR System FIM Samantha givenName Samantha sn Dearing Dearing title mail Attribute Ownership employeeID 007 007 telephone FirstName LastName EmployeeID SQL Server  DB givenName Samara sn Darling title Coordinator Coordinator mail employeeID 007 telephone Identity Data Aggregation Title Active Directory/  Exchange givenName Sam sn Dearing title Intern mail someone@example.com employeeID 007 telephone E-Mail someone@example.com LDAP givenName Sammy sn Dearling title mail employeeID 008 555-0129 telephone 555-0129 Telephone
Identity Synchronization and ConsistencyIdentity consistency across multiple directories FIM HR System givenName Samantha sn Dearing title mail Attribute Ownership employeeID 007 telephone givenName Bob Samantha Samantha Samantha sn Dearing Dearing Dearing FirstName LastName EmployeeID title Coordinator Coordinator Coordinator Coordinator SQL Server  DB givenName Samara mail someone@example.com someone@example.com someone@example.com someone@example.com sn Darling employeeID 007 title Coordinator telephone 555-0129 555-0129 555-0129 555-0129 mail Incorrect or Missing Information employeeID 007 telephone Identity Data Brokering (Convergence) Title Active Directory /  Exchange givenName Sam sn Dearing title Intern mail someone@example.com employeeID 007 telephone E-Mail LDAP givenName Sammy sn Dearling title mail employeeID 007 telephone 555-0129 Telephone
Customizable Identity Portal SharePoint-based Identity Portal for Management and Self Service How you extend it Add your own portal pages or web parts Build new custom solutions Expose new attributes to manage by extending FIM schema Choose SharePoint theme to customize look and feel
Password Reset And Synchronization MELISSA PASSWORD SYCHRONIZATION WINDOWSMACHINE FIM 2010 iPLANET FINANCEAPPLICATION ACTIVEDIRECTORY FINANCEPORTAL

More Related Content

What's hot

5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...IBM Sverige
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_finalSso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_finalGrant Reveal
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote VendorsObserveIT
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overviewtillbrennan
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
CCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalCCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalGreg Posten
 
Active Directory Self-Service Suite Overview
Active Directory Self-Service Suite OverviewActive Directory Self-Service Suite Overview
Active Directory Self-Service Suite OverviewEmpowerID
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionCA API Management
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industryAjit Dadresa
 

What's hot (20)

E Control Summary
E Control   SummaryE Control   Summary
E Control Summary
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...
Simpler, Smoother och Smarter Zecurity för affärsverksamhetens ekosystem - Sm...
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_finalSso security&business tool_2018_issa_infosecsummit_grant_reveal_final
Sso security&business tool_2018_issa_infosecsummit_grant_reveal_final
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
CCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalCCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_Final
 
Active Directory Self-Service Suite Overview
Active Directory Self-Service Suite OverviewActive Directory Self-Service Suite Overview
Active Directory Self-Service Suite Overview
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 

Viewers also liked

Microsoft Forefront - Identity Manager 2010 Datasheet
Microsoft Forefront - Identity Manager 2010 DatasheetMicrosoft Forefront - Identity Manager 2010 Datasheet
Microsoft Forefront - Identity Manager 2010 DatasheetMicrosoft Private Cloud
 
Forefront Identity Manager
Forefront Identity ManagerForefront Identity Manager
Forefront Identity ManagerMASIT MACEDONIA
 
Comparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managersComparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managersInfraMatix Inc.
 
Teaching is like going on a road trip - Kassia Dearing
Teaching is like going on a road trip - Kassia DearingTeaching is like going on a road trip - Kassia Dearing
Teaching is like going on a road trip - Kassia DearingMissdearing
 
Teachers and Teaching Metaphors
Teachers and Teaching MetaphorsTeachers and Teaching Metaphors
Teachers and Teaching MetaphorsBob Cole
 
Scaffold classes and duties (cals)
Scaffold classes and duties (cals)Scaffold classes and duties (cals)
Scaffold classes and duties (cals)robadet
 
CONSTRUCTION OF CEMENT CONCRETE ROAD
CONSTRUCTION OF CEMENT CONCRETE ROADCONSTRUCTION OF CEMENT CONCRETE ROAD
CONSTRUCTION OF CEMENT CONCRETE ROADGLA University
 

Viewers also liked (8)

Microsoft Forefront - Identity Manager 2010 Datasheet
Microsoft Forefront - Identity Manager 2010 DatasheetMicrosoft Forefront - Identity Manager 2010 Datasheet
Microsoft Forefront - Identity Manager 2010 Datasheet
 
Forefront Identity Manager
Forefront Identity ManagerForefront Identity Manager
Forefront Identity Manager
 
Comparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managersComparing forefront identity manager vs. other identity managers
Comparing forefront identity manager vs. other identity managers
 
Pavement Preservation
Pavement PreservationPavement Preservation
Pavement Preservation
 
Teaching is like going on a road trip - Kassia Dearing
Teaching is like going on a road trip - Kassia DearingTeaching is like going on a road trip - Kassia Dearing
Teaching is like going on a road trip - Kassia Dearing
 
Teachers and Teaching Metaphors
Teachers and Teaching MetaphorsTeachers and Teaching Metaphors
Teachers and Teaching Metaphors
 
Scaffold classes and duties (cals)
Scaffold classes and duties (cals)Scaffold classes and duties (cals)
Scaffold classes and duties (cals)
 
CONSTRUCTION OF CEMENT CONCRETE ROAD
CONSTRUCTION OF CEMENT CONCRETE ROADCONSTRUCTION OF CEMENT CONCRETE ROAD
CONSTRUCTION OF CEMENT CONCRETE ROAD
 

Similar to Forefront Identity Manager 2010 (Av Rune Lystad)

IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Upbaselsss
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications WebinarTodd Clayton
 
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpHybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpNicole Bray
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentationdanhsmith
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnRiddhi Sood
 
Insurance Vertical Presentation
Insurance Vertical PresentationInsurance Vertical Presentation
Insurance Vertical PresentationMurty NSN
 
Certificate Management Made Easy
Certificate Management Made EasyCertificate Management Made Easy
Certificate Management Made EasyJason Newell
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonJoel Oleson
 
Ecom Nets Ms Dynamics Gp
Ecom Nets   Ms Dynamics GpEcom Nets   Ms Dynamics Gp
Ecom Nets Ms Dynamics Gpnveeravalli
 
Pg presentation for steph
Pg presentation for stephPg presentation for steph
Pg presentation for stephKjohnson33
 
Fim datasheet 0210
Fim datasheet 0210Fim datasheet 0210
Fim datasheet 0210Sergio ChEco
 
OWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptOWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptwebhostingguy
 
User Manager
User ManagerUser Manager
User ManagerEmpowerID
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 
Microsoft Online Services Partner Core Deck
Microsoft Online Services Partner Core DeckMicrosoft Online Services Partner Core Deck
Microsoft Online Services Partner Core Deckjessiethe3rd
 

Similar to Forefront Identity Manager 2010 (Av Rune Lystad) (20)

Iam
IamIam
Iam
 
Iam
IamIam
Iam
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow UpHybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
Hybrid Identity Made Simple - Microsoft World Partner Conference 2016 Follow Up
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign On
 
Insurance Vertical Presentation
Insurance Vertical PresentationInsurance Vertical Presentation
Insurance Vertical Presentation
 
Certificate Management Made Easy
Certificate Management Made EasyCertificate Management Made Easy
Certificate Management Made Easy
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 
Ecom Nets Ms Dynamics Gp
Ecom Nets   Ms Dynamics GpEcom Nets   Ms Dynamics Gp
Ecom Nets Ms Dynamics Gp
 
Pg presentation for steph
Pg presentation for stephPg presentation for steph
Pg presentation for steph
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Fim datasheet 0210
Fim datasheet 0210Fim datasheet 0210
Fim datasheet 0210
 
OWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptOWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.ppt
 
User Manager
User ManagerUser Manager
User Manager
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Microsoft Online Services Partner Core Deck
Microsoft Online Services Partner Core DeckMicrosoft Online Services Partner Core Deck
Microsoft Online Services Partner Core Deck
 

More from Microsoft Norge AS

Microsoft Dynamics AX 2012 brosjyre
Microsoft Dynamics AX 2012 brosjyreMicrosoft Dynamics AX 2012 brosjyre
Microsoft Dynamics AX 2012 brosjyreMicrosoft Norge AS
 
Micr00542 komm brosj_3101_godkjent
Micr00542 komm brosj_3101_godkjentMicr00542 komm brosj_3101_godkjent
Micr00542 komm brosj_3101_godkjentMicrosoft Norge AS
 
Microsoft dynamics crm brosjyre 2011
Microsoft dynamics crm brosjyre 2011Microsoft dynamics crm brosjyre 2011
Microsoft dynamics crm brosjyre 2011Microsoft Norge AS
 
Norske skog finansavisen jan 24 2011
Norske skog finansavisen jan 24 2011Norske skog finansavisen jan 24 2011
Norske skog finansavisen jan 24 2011Microsoft Norge AS
 
Sparer 15 millioner på ny ikt plattform
Sparer 15 millioner på ny ikt plattformSparer 15 millioner på ny ikt plattform
Sparer 15 millioner på ny ikt plattformMicrosoft Norge AS
 
Seniornett åpner klubb nummer 100
Seniornett åpner klubb nummer 100Seniornett åpner klubb nummer 100
Seniornett åpner klubb nummer 100Microsoft Norge AS
 
Hvorfor vi vedder alt på nettskyen, og hvilke fordeler det kan gi deg
Hvorfor vi vedder alt på nettskyen, og hvilke fordeler det kan gi degHvorfor vi vedder alt på nettskyen, og hvilke fordeler det kan gi deg
Hvorfor vi vedder alt på nettskyen, og hvilke fordeler det kan gi degMicrosoft Norge AS
 
Communications server 14 ep groadmap3
Communications server 14 ep groadmap3Communications server 14 ep groadmap3
Communications server 14 ep groadmap3Microsoft Norge AS
 
Communications server 14 ep groadmap3
Communications server 14 ep groadmap3Communications server 14 ep groadmap3
Communications server 14 ep groadmap3Microsoft Norge AS
 
Service Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustextService Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustextMicrosoft Norge AS
 
Part2 DC Man Vision and Roadmap Finalcustext
Part2 DC Man Vision and Roadmap FinalcustextPart2 DC Man Vision and Roadmap Finalcustext
Part2 DC Man Vision and Roadmap FinalcustextMicrosoft Norge AS
 
Case dagens it - grønn it konkurranse - final
Case   dagens it - grønn it konkurranse - finalCase   dagens it - grønn it konkurranse - final
Case dagens it - grønn it konkurranse - finalMicrosoft Norge AS
 
C:\fakepath\4 5 skryseth-aserud
C:\fakepath\4 5 skryseth-aserudC:\fakepath\4 5 skryseth-aserud
C:\fakepath\4 5 skryseth-aserudMicrosoft Norge AS
 
Microsoft Magasinet nr 1 2010; "Aktuelt og etter jobb"
Microsoft Magasinet nr 1 2010; "Aktuelt og etter jobb"Microsoft Magasinet nr 1 2010; "Aktuelt og etter jobb"
Microsoft Magasinet nr 1 2010; "Aktuelt og etter jobb"Microsoft Norge AS
 

More from Microsoft Norge AS (20)

Microsoft Dynamics AX 2012 brosjyre
Microsoft Dynamics AX 2012 brosjyreMicrosoft Dynamics AX 2012 brosjyre
Microsoft Dynamics AX 2012 brosjyre
 
Micr00542 komm brosj_3101_godkjent
Micr00542 komm brosj_3101_godkjentMicr00542 komm brosj_3101_godkjent
Micr00542 komm brosj_3101_godkjent
 
Microsoft dynamics crm brosjyre 2011
Microsoft dynamics crm brosjyre 2011Microsoft dynamics crm brosjyre 2011
Microsoft dynamics crm brosjyre 2011
 
Nyhetsbrev IKT i samfunnet
Nyhetsbrev IKT i samfunnetNyhetsbrev IKT i samfunnet
Nyhetsbrev IKT i samfunnet
 
Norske skog finansavisen jan 24 2011
Norske skog finansavisen jan 24 2011Norske skog finansavisen jan 24 2011
Norske skog finansavisen jan 24 2011
 
Sparer 15 millioner på ny ikt plattform
Sparer 15 millioner på ny ikt plattformSparer 15 millioner på ny ikt plattform
Sparer 15 millioner på ny ikt plattform
 
Exchange online test pc world
Exchange online test pc worldExchange online test pc world
Exchange online test pc world
 
Ms webfourm nettskyen okt2010
Ms webfourm   nettskyen okt2010Ms webfourm   nettskyen okt2010
Ms webfourm nettskyen okt2010
 
Microsoft Dynamics CRM
Microsoft Dynamics CRMMicrosoft Dynamics CRM
Microsoft Dynamics CRM
 
Sony vaio tilbud
Sony vaio tilbudSony vaio tilbud
Sony vaio tilbud
 
Seniornett i hundre
Seniornett i hundreSeniornett i hundre
Seniornett i hundre
 
Seniornett åpner klubb nummer 100
Seniornett åpner klubb nummer 100Seniornett åpner klubb nummer 100
Seniornett åpner klubb nummer 100
 
Hvorfor vi vedder alt på nettskyen, og hvilke fordeler det kan gi deg
Hvorfor vi vedder alt på nettskyen, og hvilke fordeler det kan gi degHvorfor vi vedder alt på nettskyen, og hvilke fordeler det kan gi deg
Hvorfor vi vedder alt på nettskyen, og hvilke fordeler det kan gi deg
 
Communications server 14 ep groadmap3
Communications server 14 ep groadmap3Communications server 14 ep groadmap3
Communications server 14 ep groadmap3
 
Communications server 14 ep groadmap3
Communications server 14 ep groadmap3Communications server 14 ep groadmap3
Communications server 14 ep groadmap3
 
Service Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustextService Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustext
 
Part2 DC Man Vision and Roadmap Finalcustext
Part2 DC Man Vision and Roadmap FinalcustextPart2 DC Man Vision and Roadmap Finalcustext
Part2 DC Man Vision and Roadmap Finalcustext
 
Case dagens it - grønn it konkurranse - final
Case   dagens it - grønn it konkurranse - finalCase   dagens it - grønn it konkurranse - final
Case dagens it - grønn it konkurranse - final
 
C:\fakepath\4 5 skryseth-aserud
C:\fakepath\4 5 skryseth-aserudC:\fakepath\4 5 skryseth-aserud
C:\fakepath\4 5 skryseth-aserud
 
Microsoft Magasinet nr 1 2010; "Aktuelt og etter jobb"
Microsoft Magasinet nr 1 2010; "Aktuelt og etter jobb"Microsoft Magasinet nr 1 2010; "Aktuelt og etter jobb"
Microsoft Magasinet nr 1 2010; "Aktuelt og etter jobb"
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Forefront Identity Manager 2010 (Av Rune Lystad)

  • 2. Business Ready Security Solutions Secure Messaging Secure Endpoint Secure Collaboration Information Protection Identity and Access Management
  • 3. Business Ready Security Solutions Secure Messaging Secure Endpoint Secure Collaboration Information Protection Identity and Access Management Active Directory®Federation Services
  • 4.
  • 6. New EntitlementsRetire Policy Management De-provision identities Revoke credentials De-provision resources Policy enforcement Approvals and notifications Audit trails Change Role changes Phone # or titlechange Password and PIN reset Resource requests Identity Lifecycle Management
  • 7. Today: Management Burden Is On IT IT Professionals Difficult to manage siloed identities Overloaded with help desk service requests Manually managing accounts and permissions Poor tools for managing user credentials Information Workers Call help desk for passwordand access requests Wait for days or weeks for access Wait for IT to implement business policies Greater Complexity Wrong Contexts Wrong People Higher Costs Developers Complex to develop custom applications Forced to develop business rules Challenge to learn different development models Hard to integrate systems
  • 8. Aligning Experiences With The Right People IT Professionals Information Workers Architecture Deployment System administration Governance Security Add Update Users Access Credentials Business rules & policy Permissions Group & role membership Distribution lists Passwords & PINs Policy Revoke Audit Developers System & application integration & development
  • 9. Integrated provisioning of identities, credentials, and resources Automated, codeless user provisioning and de-provisioning Self-service and admin Profile Management UserManagement Manage multiple credential types (passwords, certificates, smart cards) Self-service password reset integrated with Windows logon Support for multiple & partner reset gates (q/a, smart card, speech, custom) Credential Management Delegated & self-service group and distribution list management Information worker self-service experiences through Office and SharePoint Automated group and distribution list updates GroupManagement Visual, natural language process authoring & editing Extensible workflows through Windows Workflow Foundation Integrates with System Center for monitoring and control PolicyManagement FIM 2010 Solution Areas
  • 10. Forefront Identity Manager in Action Databases Self-Service integration WindowsLog On LOB Applications FIM Portal Policy Management Credential Management User Management Group Management Custom ISV PartnerSolutions IT Departments Directories
  • 11.
  • 12. Built-in workflow for identity management
  • 13. Automatically synchronize all user information to different directories across the enterprise
  • 14. Automates the process of on-boarding usersActiveDirectory LotusDomino Workflow User Enrollment LDAP FIM SQLServer Approval HR System Oracle DB FIM CM Manager User provisioned on all allowed systems
  • 15.
  • 16. Built-in workflow for identity management
  • 17. Real-time de-provisioning from all systems to prevent unauthorized access and information leakageActiveDirectory LotusDomino Workflow User de-provisioned LDAP FIM SQLServer HR System Oracle DB FIM CM User de-provisioned or disabled on all systems
  • 18. GivenName Samantha sn Dearing title Coordinator mail someone@example.com employeeID 007 telephone 555-0129 givenName sn title mail employeeID telephone Identity Synchronization and ConsistencyIdentity synchronization across multiple directories HR System FIM Samantha givenName Samantha sn Dearing Dearing title mail Attribute Ownership employeeID 007 007 telephone FirstName LastName EmployeeID SQL Server DB givenName Samara sn Darling title Coordinator Coordinator mail employeeID 007 telephone Identity Data Aggregation Title Active Directory/ Exchange givenName Sam sn Dearing title Intern mail someone@example.com employeeID 007 telephone E-Mail someone@example.com LDAP givenName Sammy sn Dearling title mail employeeID 008 555-0129 telephone 555-0129 Telephone
  • 19. Identity Synchronization and ConsistencyIdentity consistency across multiple directories FIM HR System givenName Samantha sn Dearing title mail Attribute Ownership employeeID 007 telephone givenName Bob Samantha Samantha Samantha sn Dearing Dearing Dearing FirstName LastName EmployeeID title Coordinator Coordinator Coordinator Coordinator SQL Server DB givenName Samara mail someone@example.com someone@example.com someone@example.com someone@example.com sn Darling employeeID 007 title Coordinator telephone 555-0129 555-0129 555-0129 555-0129 mail Incorrect or Missing Information employeeID 007 telephone Identity Data Brokering (Convergence) Title Active Directory / Exchange givenName Sam sn Dearing title Intern mail someone@example.com employeeID 007 telephone E-Mail LDAP givenName Sammy sn Dearling title mail employeeID 007 telephone 555-0129 Telephone
  • 20. Customizable Identity Portal SharePoint-based Identity Portal for Management and Self Service How you extend it Add your own portal pages or web parts Build new custom solutions Expose new attributes to manage by extending FIM schema Choose SharePoint theme to customize look and feel
  • 21. Password Reset And Synchronization MELISSA PASSWORD SYCHRONIZATION WINDOWSMACHINE FIM 2010 iPLANET FINANCEAPPLICATION ACTIVEDIRECTORY FINANCEPORTAL
  • 22.
  • 23. Simplify certificate and SmartCard management using Forefront Identity Manager (FIM)User is validated using multi-factor authentication FIM policy triggers request for FIM CM to issue certificate or SmartCard Certificate is issued to user and written to either machine or smart card SmartCard EndUser End User FIM CM Active Directory Certificate Services (AD CS) FIM SmartCard FIM Certificate Management (CM) requests certificate creation from AD CS User ID andPassword Multi-Factor Authentication User Enrollment and Authentication request sent by HR System HR System
  • 24. Certificate Lifecycle Management Single administration point for digital certificatesand smart cards Configurable policy-based workflows for common tasks Enroll/renew/update Recover/card replacement Revoke Retire/disable smart card Issue temporary/duplicate smart card Personalize smart card Detailed auditing and reporting Support for both centralized and self-service scenarios Integration with existing infrastructure investments Windows Active Directory; Windows Certificate Services
  • 25. End User Scenarios Example Scenario FIM 2010 Advantages UserManagement Automatic routing of multiple approvals Approval process through Office Audit trail of approvals CFO gives final approval for newuser to access app with associated SOX compliance requirement Automatic updating of business applications No need to call help desk Faster time to resolution Credential Management User changes cell phone number GroupManagement Request process through Office No waiting for help desk Faster time to resolution User asks to join secure distribution list for newproduct development Integration with Windows logon No need to call help desk Faster time to resolution PolicyManagement Self-service smart card provisioning & management
  • 26. IT Administrator Scenarios Example Scenario FIM 2010 Advantages UserManagement Centralized management Automatic policy enforcement across systems Author policy to require HRapproval for job title change Automatic policy enforcement across systems Management of role changes & retirements Credential Management Automatically provision new employees with identity, mailbox, and credentials Automatic management of group membership Secure access to departmental resources, with audit trail GroupManagement Design policy to automatically create departmental security groups Generation and delivery of initialone-time use password Integration of smart card & cert enrollment with provisioning Create workflow to automatically issue passwords and smart cards to new users PolicyManagement
  • 27. Software for policy-based management of identities,credentials, and resources across heterogeneous environments Provides self-service tools SharePoint admin console to manage identities Greater productivity through faster time to resolution Empowers People Reduces costs through automation and self-service Maximizes existing investments in Identity Infrastructure Integrates with familiar developer tools to enable new scenarios Delivers Agility and Efficiency Integrates identity, credential, and access management Rich permissions and delegation model Enables system auditing and compliance Increases Security and Compliance Summary: FIM 2010
  • 28. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Editor's Notes

  1. There are six (6) core solutions that make up Business Ready Security. Each one delivers an integrated, identity-based platform that helps organizations reduce IT costs while enabling new capabilities:Secure MessagingEnable secure business communication from virtually anywhere and on any device, while preventing unauthorized use of confidential information.Secure CollaborationEnable secure business collaboration from virtually anywhere and on any device, while preventing unauthorized use of confidential information.Secure EndpointProtect client and server operating systems from emerging threats and information loss, while enabling secure access from virtually anywhere and any deviceInformation ProtectionDiscover, protect, and manage confidential data throughout your business with a comprehensive solution integrated with the computing platform and applicationsIdentity and Access ManagementEnable secure, seamless access to on-premise and cloud infrastructure and applications from any location or deviceIntegrated SecurityProtect information and infrastructure across your business through a comprehensive solution that is easier to manage and control
  2. How do customers think about IDA management? What are the scenarios they are solving for? The lifecycle of identities, credentials and access from hire to retire…Customers are asking us for comprehensive solutions that span identities, credentials, and resources across the enterprise.
  3. One reason IdM projects fail is that the burden is always on IT to get management tasks done. Why is the state of the art failing to deliver? Today’s offerings are…Verynarrow view of the problem. Identity management is not about dropping another expensive box into IT. Failing to empower the right people at the right time with the right tools and information.Siloed, with separate applications for identity, access and credential management. This drives complexity and cost.Lack a end-to-end view of IDA across the enterprise because of the lack of integration, lack of comprehensive scope. Result…IT is overloaded, cannot move IT to a strategic asset.End users are not empoweredDevelopers don’t have an identity platform or tools to build on…Detail…Challenges for usersThis slide sets the stage for exploring the present state of identity management in a typically large enterprise through the lens of a new employee or partner coming in to the enterprise. New users, businesses, and partners are not productive from day one because they do not have access to the right resources due to a lack of identity management processes. When you think about all of the business processes, IT infrastructure, IT services, and IT processes that are required to bring that new employee, contract or partner into the enterprise, you need toEnable them to be productive in a secure and efficient manner right from day oneManage their needs over their entire lifecycle within the enterpriseManage de-provisioning when they choose to leave or the contract endsManaging identity across the enterpriseChallenges for IT professionalsLack unified view of identity across the enterpriseUnable to automate systems; have to provision access in an ad-hoc manner, which drives up cost and increases risk We also have a set of challenges, needs, or domains of the enterprise that are separate for the specific end users, but then it’s all about managing identity across the enterprise. In any large enterprise, many business applications that contain identity information have to be synchronized, monitored, maintained, purported, and audited. Since they are responsible for managing these processes and domains, IT Pros should Be experts in all the business processes so they can respond to the demands of individual users Maintain the architecture and infrastructure of the enterprise Merge multiple applications, systems, and processes securely in mergers and acquisitions Manage all the governance and security associated with these systems and processes Handle everyday challenges, such as creating and deleting user accounts Manage provisioning and de-provisioning. One of the big challenges we have in identity management is that when new employees join, they are provisioned in an average of 16 applications. When those employees leave, they are only de-provisioned in about 10 applications. Over time, these create significant numbers of personal accounts that, from identity management standpoint, represent risks and security gaps because these systems are siloed, manual, and not integrated. This is the burden that the modern enterprise is dealing with today, so developers are brought in to stitch together these process applications and systems—at great cost. When all these systems are not working perfectly they get in the way of IWs being productive in driving business. With changing compliance, it’s difficult to cater to needs of IWs and users effectivelyChallenges for developers Unable to integrate security and policies into their application, which leads to complexity and dissatisfaction Must maintain provisioning, de-provisioning and Identity management, so the current state forces developers to use tools that are Application Platform specific limits their ability to develop identity-aware applications that can serve the needs of the organization
  4. With automated user provisioning through Forefront Identity Manager, IT can automatically give and update rights to resources and business applications as per the user’s profile. It becomes easy to provision user identity to only those resources and applications which user is suppose to work and prevent from unauthorized use.Organizations using Forefront Identity Manager can define policies that automatically create user accounts, mail boxes, and group memberships in real time so that new employees are productive immediately. When a user changes roles within an organization, Forefront Identity Manager automatically makes the necessary changes in heterogeneous target systems to add and remove access rights.For example, if a user moves from a role in sales to a role in marketing, Forefront Identity Manager can remove them from sales-specific groups and add them to marketing-specific groups to deliver appropriate access permissions to perform their job function.
  5. With Forefront Identity Manager (FIM), organizations can define automatic policy enforcement for removing user accounts, mail boxes, and group memberships in real time, which minimizes the risk of information leakage from unauthorized access to resources and confidential information. With FIM, de-provisioning for users leaving the enterprise also becomes centralized and less complicated, which makes it easier to ensure complete de-provisioning to handle future compliance audits.For example, if a user leaves the organization, the HR system forwards a de-provisioning request to FIM. FIM follows approval workflow. With the manager’s approval, FIM automatically removes all rights, account information, mail boxes, and memberships from all relevant applications, groups, and different directories.
  6. Organizations can also use FIM to synchronize e-mail address lists that are maintained by heterogeneous e-mail systems, such as Microsoft Exchange Server 2000, Exchange Server 2007, and Lotus Notes. Organizations that have multiple Active Directory Domain Services and Exchange forests can use FIM to build a single address book. This increases the value of identity integration by simplifying collaboration as well as increasing IT control.Note:FIM 2010 provides a simplified single sign on experience through its identity synchronization capabilities, delivering the ability to synchronize passwords across heterogeneous systems.The policy-based management system of FIM manages users’ identity lifecycle and protects corporate assets against misuse as users move between roles or leave the organization. http://www.microsoft.com/forefront/identitymanager/en/us/features.aspxhttp://download.microsoft.com/download/3/2/A/32A7B77A-7D3A-4D24-ACE7-5AA3A908B95E/Understanding%20FIM%202010.docx
  7. Combining identity data across multiple directories and systems yields automated account reconciliation and consistency management for user accounts, credentials, and attributes. This means organizations with many different directories and other data repositories, such as an HR application, can use Forefront Identity Manager to synchronize user accounts across systems.
  8. Key points we want to illustrate: Melissa is a new employee starting her first day of work at Contoso. She sits down in her assigned office to begin her work which is heavily dependent on LOB applications and being ‘plugged in’ to key DLs.Rather than calling the help desk to get access, groups, etc. Melissa’s accounts and mailbox are automatically provisioned and available at first login, due to preconfigured rules in FIM 2010She is automatically granted access to the LOB apps relevant to her roleShe is dynamically added to key DLsAnimation flow:Data flows in from HR system. Would like a file to pass from HR to FIM 2010 with information on the new hire like Name = Melissa Meyers, Employee ID = 122145, Dept = Finance, Title = Analyst, Employee Type = Full Time.Data flows to each of the target systems. For Exchange a mailbox is created. I want icons to travel along the arrow to represent the data passed to Exchange as well mailbox created. Her email address should be filled in as mmeyers@contoso.com.For AD, a password is assigned and sent to her manager. She is also given membership in the “Finance,” “New Hire” and “FTE” groups in AD. I want icons to travel along the arrow to represent the data passed to AD as well as the password and new groups created.A smart card is also provisioned so for remote access and for her to access the finance appFor the other accounts show the data passing along the arrows. Show only her name, employee ID, and department being passed to iPlanet, and show her Name, ID, and Employee Type passing to the mainframe.
  9. Active Directory Certificate Services (AD CS) provides an integrated public key infrastructure that enables the secure exchange of information. With strong security and easy administration across the Internet, extranets, intranets, and applications, AD CS provides customizable services for issuing and managing the certificates used in software security systems employing public key technologies.BenefitsIncrease access security with better security than username and password solutions, and verify the validity of certificates using the Online Certificate Status Protocol (OCSP).Reduce cost of ownership by taking advantage of Active Directory integration for enrollment, storage, and revocation processes.Simplify certificate management using a single information store that comes from full integration with Microsoft Management Console.Streamline deployment by enrolling user and computer certificates without user intervention.Client retrieves certificate policy from Active Directory.Client submits certificate request to Certificate Server based on policy.Certificate Server retrieves user information from Active Directory.Certificate Server returns signed digital certificate to the client.
  10. Some example scenarios for each pillar, for end users. These are examples and non-exhaustive. Policy ManagementApprovals integrated in Outlook. The right person, in this case the CFO, can easily approve access within their scope of responsibilities and within agreed upon company policies. Credential ManagementIn addition to PW and PIN reset integrated with Windows, end users can provision their own smart cards through an easy to use self-service interface. One example of how this could be configured: FIM can send the user a one-time use password that the user could use with FIM to bring the right certificates down to their smart card. User Management Manage own identity profile. In this case end users could be given permission to manage their mobile phone number. This makes it easy for other end users to find one another, especially in cases where workers work remotely and operate using mobile phones frequently. Of course, other attributes could also be delegated to end users to manage. Group ManagementCreate and manage approvals for group membership in Office. End user can make requests to join groups, or create their own groups from a button in the Outlook ribbon.
  11. Exemplary but non-exhaustive list of scenarios for IT professionals…Policy ManagementIT can use UI tools to generate policies to enforce required business approvals. Example: The policy is that a GM must approve VPN access for non employees (e.g., contractors). ILM will not grant VPN access to a contractor until they have received the required approval from the GM.Credential ManagementAs part of the policy to provision new users, the issuance of multiple types of credentials can be easily incorporated. User ManagementUser Provisioning Policy . Example: All FTEs should receive an AD account, Exchange mailbox, become a member of the “FTE” security group, and get a smart card. Group ManagementDynamic groups. FIM can create security groups or DLs based on attributes such as what department someone is in. In this case FIM would automatically create and populate a group for each department in a company.