SlideShare a Scribd company logo
1 of 15
IDM in Telecom
What is IDM? 
 What is Identity? 
 What is Digital Identity? 
 “Identity Management (IDM) comprises the set of 
business processes, and a supporting infrastructure, 
for the creation, maintenance, and use of digital 
identities within a legal and policy context.” 
http://www.ifour-consultancy.com Offshore software development company India
Key Steps in IDM 
• Authentication : Verification that an entity is who/what it claims to be using a password, biometrics 
such as a fingerprint, or distinctive behaviour such as a gesture pattern on a touchscreen. 
• Authorization : Managing authorization information that defines what operations an entity can 
perform in the context of a specific application. For example, one user might be authorized to enter a 
sales order, while a different user is authorized to approve the credit request for that order. 
• Roles : Roles are groups of operations and/or other roles. Users are granted roles often related to a 
particular job or job function. For example, a user administrator role might be authorized to reset a 
user's password, while a system administrator role might have the ability to assign a user to a specific 
server. 
• Delegation : Delegation allows local administrators or supervisors to perform system modifications 
without a global administrator or for one user to allow another to perform actions on their behalf. For 
example, a user could delegate the right to manage office-related information. 
http://www.ifour-consultancy.com Offshore software development company India
Why IDM in Telecom? 
 Telcos need to manage users efficiently and accurately while granting them access to telecom resources and 
managing the lifecycle of the customer account from the time it is created till it is deleted. 
 Keeping customers loyal through service personalization 
 Manage the flow of users entering, using, and leaving the telecom provider 
 Security improvements that reduce the risk of internal and external attacks. 
 Greater access to information by partners, and customers — 
driving increased productivity, satisfaction, and revenue. 
 Eliminating duplicate identity data can streamline administration processes 
and reduce TCO. 
http://www.ifour-consultancy.com Offshore software development company India
Features 
 Authorization/ Authentication 
 Digital Self-Portal 
 Single Sign-On 
 Attribute Query 
 Identity Linking 
http://www.ifour-consultancy.com Offshore software development company India
Features & Benefits 
IDM Feature End User Benefit Operator Benefit 
Single Sign On/Off  Improved service experience through 
simplified sign-on (less admin time) 
 Fewer barriers (time and sign-on) to use of 
new apps/services 
 Improved security and privacy 
 Greater pull from Web parties to join 
operator’s circle of trust for more revenue 
opportunities 
 Improved customer satisfaction with smooth 
and rich data experience 
Authorization / 
authentication 
 Trusted or strong authentication of end 
user needs (eg. mobile payments) 
 Control of unauthorized activity (eg 
parental control) 
 Faster activation of service with fewer 
barriers to use of new apps/services 
 Revenue stream for providing authentication 
(eg. legal age verification) 
 Improved customer service with 
convenience of additional services (eg. 
mPayments) 
http://www.ifour-consultancy.com Offshore software development company India
Features and Benefits Contd. 
IDM Feature End User Benefit Operator Benefit 
Attribute Query  More personalized services from Web 
providers (quick and easy access to 
chosen services) 
 More relevant advertisements (less spam) 
 Revenue stream from advertisers for shared 
data 
 Revenue stream from Web 2.0 parties for 
valuable attributes like ‘legal age’ to activate a 
service 
 Less lead time to add third party services, for 
faster revenue collection 
Digital self-portal  More control of shared personal data with 
parties involved via single portal (eg 
personal, work etc) 
 Less fear of exploring new services 
 Ability to flag desired personal services to 
range of Web 2.0 parties 
 Increased customer security builds trust in 
operator and more use of services 
 Greater pull from web parties to join 
operator’s circle of trust for more revenue 
sharing opportunities 
http://www.ifour-consultancy.com Offshore software development company India
Business Transformation and the Role 
of Telecom Companies 
Operators 
New 
service opportunities 
Internet players 
(ASPs, third-party software vendors, content 
providers, ad companies) 
Strong relationship 
Identity provider 
• Trusted provider of high-quality 
services 
• Trusted billing 
relationship 
• Unique authentication 
capabilities 
Focus on 
Users 
Identity 
Management 
(IDM) 
1. Controlled access to 
online applications 
2. Portable identities across 
domains 
3. Protected user privacy 
Service provider 
• Countless 
attractive services 
• Need for user authentication 
http://www.ifour-consultancy.com Offshore software development company India
Challenges 
 Kinds of users 
 Insiders 
 Outsiders 
 Providing flexible IDM to the user (data, identity and privacy) 
 IT support 
 Forgotten passwords 
 Intruder lockouts. 
 Access denied errors 
 Change Management 
 Ensuring end-to-end consistency 
 User termination 
http://www.ifour-consultancy.com Offshore software development company India
Solutions 
 Enterprise Single Sign-on 
 Password Management 
 Directories 
 Meta-directories 
 Proper user-provisioning 
 Role-Based access control 
 Identity federation 
 “Diadalos” Architecture 
http://www.ifour-consultancy.com Offshore software development company India
Identity Management Framework 
Network-agnostic identity management 
is the key component of tomorrow’s 
multi-access network 
Identity federation 
Attribute query/push 
Authorization & 
The role of identity information will 
evolve, strengthening the operator’s 
position in 
the value chain 
Customer 
profiles 
Single sign-on (SSO) 
Identity management 
will enable new revenue opportunities, 
and enhance the user experience 
Close & trusted 
relationship with subscribers 
and communities 
Mutual authentication trust management 
http://www.ifour-consultancy.com Offshore software development company India
Case 
Profile 
• The first telecom 
operator 
in Senegal. 
• A France Telecom 
subsidiary. 
Designing a 
complete 
IDM solution 
for 
SONATEL 
Users 
• 2500 employees in 
4 African countries 
• Offices in all of 
Senegal's 
14 regions. 
Benefits 
• Central point to define and 
audit accesses. 
• Major reduction in the 
number of passwords 
used. 
• Quick deletion of useless 
accounts. 
Challenges 
• Simplify and secure 
access. 
• Adapt to the existing 
information system. 
• Scale with market 
growth. 
http://www.ifour-consultancy.com Offshore software development company India
Tool – IBM TAMeb 
 TAMeb: Tivoli Access Manager for e-business 
 Provides an access control management solution to centralize network 
and application security policy for e-business applications. 
 IBM Tivoli Access Manager (TAM) is an authentication and authorization 
solution for corporate web services, operating systems, and existing 
applications. 
 Tivoli Access Manager runs on various operating system platforms such 
as Unix (AIX, Solaris, HP-UX), Linux, and Microsoft Windows. 
http://www.ifour-consultancy.com Offshore software development company India
IBM TAMeb - Architecture 
 The user makes a request for a Tivoli Access Manager 
protected resource. The policy enforcer (in this case 
WebSEAL) intercepts that request and collects the 
appropriate information from the user to verify his or her 
identity. 
 Once the user ID and password is verified against the user 
registry a second call is made to the user registry to create 
the user credential 
 Once the user credential is created it is returned to the policy 
enforcer for authorization 
 Authorization is performed using the authorization database 
replica that resides on the policy enforce 
http://www.ifour-consultancy.com Offshore software development company India
References 
 Offshore software development company India 
 Symbiosis students 
 Preyas Vasavada 
 Nikhil Karkera 
 Prateek Patni 
 Yogesh SHahdadpuri 
http://www.ifour-consultancy.com Offshore software development company India

More Related Content

What's hot

Zurich Files - Weapon Of Mass Destruction
Zurich Files - Weapon Of Mass DestructionZurich Files - Weapon Of Mass Destruction
Zurich Files - Weapon Of Mass DestructionZurich Files
 
2. η περιοδοσ τησ λατινοκρατιασ και τα ελληνικα κρατη
2. η περιοδοσ τησ λατινοκρατιασ και τα ελληνικα κρατη2. η περιοδοσ τησ λατινοκρατιασ και τα ελληνικα κρατη
2. η περιοδοσ τησ λατινοκρατιασ και τα ελληνικα κρατηmavraroda
 
ΔΙΑΦΩΤΙΣΜΟΣ
ΔΙΑΦΩΤΙΣΜΟΣΔΙΑΦΩΤΙΣΜΟΣ
ΔΙΑΦΩΤΙΣΜΟΣarischatzis
 
Zealot Files - Masons Bravely Speak Out
Zealot Files - Masons Bravely Speak OutZealot Files - Masons Bravely Speak Out
Zealot Files - Masons Bravely Speak OutZurich Files
 
PATRIMÔNIO CULTURAL, DIREITO E MEIO AMBIENTE. UM DEBATE SOBRE A GLOBALIZAÇÃO,...
PATRIMÔNIO CULTURAL, DIREITO E MEIO AMBIENTE. UM DEBATE SOBRE A GLOBALIZAÇÃO,...PATRIMÔNIO CULTURAL, DIREITO E MEIO AMBIENTE. UM DEBATE SOBRE A GLOBALIZAÇÃO,...
PATRIMÔNIO CULTURAL, DIREITO E MEIO AMBIENTE. UM DEBATE SOBRE A GLOBALIZAÇÃO,...Carlos Henrique de Oliveira
 
Ο Ηράκλειος και η δυναστεία του ( 610- 717)
Ο Ηράκλειος και η δυναστεία του ( 610- 717)Ο Ηράκλειος και η δυναστεία του ( 610- 717)
Ο Ηράκλειος και η δυναστεία του ( 610- 717)Evangelia Patera
 
Killuminati- Tupac Exposing the illuminati
Killuminati- Tupac Exposing the illuminatiKilluminati- Tupac Exposing the illuminati
Killuminati- Tupac Exposing the illuminatiRBG Communiversity
 
λατινοκρατια και ελληνικα κρατη.
λατινοκρατια και ελληνικα κρατη.λατινοκρατια και ελληνικα κρατη.
λατινοκρατια και ελληνικα κρατη.Ελενη Ζαχου
 

What's hot (9)

Zurich Files - Weapon Of Mass Destruction
Zurich Files - Weapon Of Mass DestructionZurich Files - Weapon Of Mass Destruction
Zurich Files - Weapon Of Mass Destruction
 
2. η περιοδοσ τησ λατινοκρατιασ και τα ελληνικα κρατη
2. η περιοδοσ τησ λατινοκρατιασ και τα ελληνικα κρατη2. η περιοδοσ τησ λατινοκρατιασ και τα ελληνικα κρατη
2. η περιοδοσ τησ λατινοκρατιασ και τα ελληνικα κρατη
 
3. Η έκρηξη και η εξέλιξη της γαλλικής επανάστασης. Η α΄ φάση (1789-1792)
3. Η έκρηξη και η εξέλιξη της γαλλικής επανάστασης. Η α΄ φάση (1789-1792)3. Η έκρηξη και η εξέλιξη της γαλλικής επανάστασης. Η α΄ φάση (1789-1792)
3. Η έκρηξη και η εξέλιξη της γαλλικής επανάστασης. Η α΄ φάση (1789-1792)
 
ΔΙΑΦΩΤΙΣΜΟΣ
ΔΙΑΦΩΤΙΣΜΟΣΔΙΑΦΩΤΙΣΜΟΣ
ΔΙΑΦΩΤΙΣΜΟΣ
 
Zealot Files - Masons Bravely Speak Out
Zealot Files - Masons Bravely Speak OutZealot Files - Masons Bravely Speak Out
Zealot Files - Masons Bravely Speak Out
 
PATRIMÔNIO CULTURAL, DIREITO E MEIO AMBIENTE. UM DEBATE SOBRE A GLOBALIZAÇÃO,...
PATRIMÔNIO CULTURAL, DIREITO E MEIO AMBIENTE. UM DEBATE SOBRE A GLOBALIZAÇÃO,...PATRIMÔNIO CULTURAL, DIREITO E MEIO AMBIENTE. UM DEBATE SOBRE A GLOBALIZAÇÃO,...
PATRIMÔNIO CULTURAL, DIREITO E MEIO AMBIENTE. UM DEBATE SOBRE A GLOBALIZAÇÃO,...
 
Ο Ηράκλειος και η δυναστεία του ( 610- 717)
Ο Ηράκλειος και η δυναστεία του ( 610- 717)Ο Ηράκλειος και η δυναστεία του ( 610- 717)
Ο Ηράκλειος και η δυναστεία του ( 610- 717)
 
Killuminati- Tupac Exposing the illuminati
Killuminati- Tupac Exposing the illuminatiKilluminati- Tupac Exposing the illuminati
Killuminati- Tupac Exposing the illuminati
 
λατινοκρατια και ελληνικα κρατη.
λατινοκρατια και ελληνικα κρατη.λατινοκρατια και ελληνικα κρατη.
λατινοκρατια και ελληνικα κρατη.
 

Similar to IDM in telecom industry

Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect DesignRajat Jain
 
Identity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingIdentity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingCiente
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Paris Salesforce Developer Group
 
2012 1 wp securit trustbuilder two-factor authentication
2012 1 wp securit trustbuilder two-factor authentication2012 1 wp securit trustbuilder two-factor authentication
2012 1 wp securit trustbuilder two-factor authenticationHai Nguyen
 
Secure Identity: The Future is Now
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is NowLane Billings
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iPrecisely
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 

Similar to IDM in telecom industry (20)

Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
Co p
Co pCo p
Co p
 
Co p
Co pCo p
Co p
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
Identity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingIdentity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud Computing
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
unit4.pptx
unit4.pptxunit4.pptx
unit4.pptx
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
 
2012 1 wp securit trustbuilder two-factor authentication
2012 1 wp securit trustbuilder two-factor authentication2012 1 wp securit trustbuilder two-factor authentication
2012 1 wp securit trustbuilder two-factor authentication
 
Secure Identity: The Future is Now
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is Now
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 

More from Ajit Dadresa

Mandatory access control for information security
Mandatory access control for information securityMandatory access control for information security
Mandatory access control for information securityAjit Dadresa
 
Unique identification authority of india uid
Unique identification authority of india   uidUnique identification authority of india   uid
Unique identification authority of india uidAjit Dadresa
 
Demo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scannerDemo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scannerAjit Dadresa
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSOAjit Dadresa
 
Role based access control - RBAC
Role based access control - RBACRole based access control - RBAC
Role based access control - RBACAjit Dadresa
 

More from Ajit Dadresa (6)

Mandatory access control for information security
Mandatory access control for information securityMandatory access control for information security
Mandatory access control for information security
 
Unique identification authority of india uid
Unique identification authority of india   uidUnique identification authority of india   uid
Unique identification authority of india uid
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
 
Demo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scannerDemo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scanner
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSO
 
Role based access control - RBAC
Role based access control - RBACRole based access control - RBAC
Role based access control - RBAC
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

IDM in telecom industry

  • 2. What is IDM?  What is Identity?  What is Digital Identity?  “Identity Management (IDM) comprises the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities within a legal and policy context.” http://www.ifour-consultancy.com Offshore software development company India
  • 3. Key Steps in IDM • Authentication : Verification that an entity is who/what it claims to be using a password, biometrics such as a fingerprint, or distinctive behaviour such as a gesture pattern on a touchscreen. • Authorization : Managing authorization information that defines what operations an entity can perform in the context of a specific application. For example, one user might be authorized to enter a sales order, while a different user is authorized to approve the credit request for that order. • Roles : Roles are groups of operations and/or other roles. Users are granted roles often related to a particular job or job function. For example, a user administrator role might be authorized to reset a user's password, while a system administrator role might have the ability to assign a user to a specific server. • Delegation : Delegation allows local administrators or supervisors to perform system modifications without a global administrator or for one user to allow another to perform actions on their behalf. For example, a user could delegate the right to manage office-related information. http://www.ifour-consultancy.com Offshore software development company India
  • 4. Why IDM in Telecom?  Telcos need to manage users efficiently and accurately while granting them access to telecom resources and managing the lifecycle of the customer account from the time it is created till it is deleted.  Keeping customers loyal through service personalization  Manage the flow of users entering, using, and leaving the telecom provider  Security improvements that reduce the risk of internal and external attacks.  Greater access to information by partners, and customers — driving increased productivity, satisfaction, and revenue.  Eliminating duplicate identity data can streamline administration processes and reduce TCO. http://www.ifour-consultancy.com Offshore software development company India
  • 5. Features  Authorization/ Authentication  Digital Self-Portal  Single Sign-On  Attribute Query  Identity Linking http://www.ifour-consultancy.com Offshore software development company India
  • 6. Features & Benefits IDM Feature End User Benefit Operator Benefit Single Sign On/Off  Improved service experience through simplified sign-on (less admin time)  Fewer barriers (time and sign-on) to use of new apps/services  Improved security and privacy  Greater pull from Web parties to join operator’s circle of trust for more revenue opportunities  Improved customer satisfaction with smooth and rich data experience Authorization / authentication  Trusted or strong authentication of end user needs (eg. mobile payments)  Control of unauthorized activity (eg parental control)  Faster activation of service with fewer barriers to use of new apps/services  Revenue stream for providing authentication (eg. legal age verification)  Improved customer service with convenience of additional services (eg. mPayments) http://www.ifour-consultancy.com Offshore software development company India
  • 7. Features and Benefits Contd. IDM Feature End User Benefit Operator Benefit Attribute Query  More personalized services from Web providers (quick and easy access to chosen services)  More relevant advertisements (less spam)  Revenue stream from advertisers for shared data  Revenue stream from Web 2.0 parties for valuable attributes like ‘legal age’ to activate a service  Less lead time to add third party services, for faster revenue collection Digital self-portal  More control of shared personal data with parties involved via single portal (eg personal, work etc)  Less fear of exploring new services  Ability to flag desired personal services to range of Web 2.0 parties  Increased customer security builds trust in operator and more use of services  Greater pull from web parties to join operator’s circle of trust for more revenue sharing opportunities http://www.ifour-consultancy.com Offshore software development company India
  • 8. Business Transformation and the Role of Telecom Companies Operators New service opportunities Internet players (ASPs, third-party software vendors, content providers, ad companies) Strong relationship Identity provider • Trusted provider of high-quality services • Trusted billing relationship • Unique authentication capabilities Focus on Users Identity Management (IDM) 1. Controlled access to online applications 2. Portable identities across domains 3. Protected user privacy Service provider • Countless attractive services • Need for user authentication http://www.ifour-consultancy.com Offshore software development company India
  • 9. Challenges  Kinds of users  Insiders  Outsiders  Providing flexible IDM to the user (data, identity and privacy)  IT support  Forgotten passwords  Intruder lockouts.  Access denied errors  Change Management  Ensuring end-to-end consistency  User termination http://www.ifour-consultancy.com Offshore software development company India
  • 10. Solutions  Enterprise Single Sign-on  Password Management  Directories  Meta-directories  Proper user-provisioning  Role-Based access control  Identity federation  “Diadalos” Architecture http://www.ifour-consultancy.com Offshore software development company India
  • 11. Identity Management Framework Network-agnostic identity management is the key component of tomorrow’s multi-access network Identity federation Attribute query/push Authorization & The role of identity information will evolve, strengthening the operator’s position in the value chain Customer profiles Single sign-on (SSO) Identity management will enable new revenue opportunities, and enhance the user experience Close & trusted relationship with subscribers and communities Mutual authentication trust management http://www.ifour-consultancy.com Offshore software development company India
  • 12. Case Profile • The first telecom operator in Senegal. • A France Telecom subsidiary. Designing a complete IDM solution for SONATEL Users • 2500 employees in 4 African countries • Offices in all of Senegal's 14 regions. Benefits • Central point to define and audit accesses. • Major reduction in the number of passwords used. • Quick deletion of useless accounts. Challenges • Simplify and secure access. • Adapt to the existing information system. • Scale with market growth. http://www.ifour-consultancy.com Offshore software development company India
  • 13. Tool – IBM TAMeb  TAMeb: Tivoli Access Manager for e-business  Provides an access control management solution to centralize network and application security policy for e-business applications.  IBM Tivoli Access Manager (TAM) is an authentication and authorization solution for corporate web services, operating systems, and existing applications.  Tivoli Access Manager runs on various operating system platforms such as Unix (AIX, Solaris, HP-UX), Linux, and Microsoft Windows. http://www.ifour-consultancy.com Offshore software development company India
  • 14. IBM TAMeb - Architecture  The user makes a request for a Tivoli Access Manager protected resource. The policy enforcer (in this case WebSEAL) intercepts that request and collects the appropriate information from the user to verify his or her identity.  Once the user ID and password is verified against the user registry a second call is made to the user registry to create the user credential  Once the user credential is created it is returned to the policy enforcer for authorization  Authorization is performed using the authorization database replica that resides on the policy enforce http://www.ifour-consultancy.com Offshore software development company India
  • 15. References  Offshore software development company India  Symbiosis students  Preyas Vasavada  Nikhil Karkera  Prateek Patni  Yogesh SHahdadpuri http://www.ifour-consultancy.com Offshore software development company India