Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

DSS ITSEC 2013 Conference 07.11.2013 - DPA - ORACLE Identity Management


Published on

Presentation from one of the remarkable IT Security events in the Baltic States organized by “Data Security Solutions” ( ) Event took place in Riga, on 7th of November, 2013 and was visited by more than 400 participants at event place and more than 300 via online live streaming.

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

DSS ITSEC 2013 Conference 07.11.2013 - DPA - ORACLE Identity Management

  1. 1. Oracle Identity Governance Complete Identity Lifecycle Management M.Sc.Eng. Mārtiņš Orinskis, DPA Ltd lead project manager 07.11.2013
  2. 2. About me M.Sc.Eng. Mārtiņš Orinskis DPA Ltd lead project manager Value of information Quality of service Importance of identity Team work
  3. 3. Our story DPA Ltd founded in Lithuania Ukraine Belarus Georgia Estonia
  4. 4. Our specialties IT security policy, IT audit, ISO 27001 Custom development / Business processes streamline/ automatization User repositories and user management Product implementation Biometry solutions Software licensing
  5. 5. Our experience in identity management SSO and multi factor authentication Casino Face recognition Federated enterprise authentication Biometrical physical access SOA and enterprise processes ISO 27001 IT policy development Biometrical data processing system Digital identity provisioning
  6. 6. Agenda Identity Complete identity lifecycle Vision of complete identity governance Technology for identity management
  7. 7. Physical and digital identity
  8. 8. Complete Identity Lifecycle – its a process New employee Change password Role modification New role Block account Change events Delete account IT infrastructu re / information New account Attribute change Access request IT resource change Physical access change Employee leave Partner and client interaction
  9. 9. Vision of complete identity governance Physical identity Authentication and SSO Authorization Federation Account provisioning Fraud detection Self service On-line auditing On-line monitoring Role governance Automated requests and approvals Physical identity Compliance Reconciliation and certification Segregation of duties Software (access and identification) Platform security Devices
  10. 10. 1. Get access in time - productivity Physical access to premises for employees and guests Access to business applications Fast partnership / on boarding / off boarding Password management
  11. 11. 2. IT system protection from back doors and developers - safety Authorization AUTHZ platform Authentication AUTHN platform
  12. 12. 3. Know who is accessing your assets Certification Real time auditing Information classification Real time access monitoring
  13. 13. 4. Streamline business processes Approval and request management Provisioning / deprovisioning Delegated administration Trust your partners Self service Single sign on
  14. 14. 5. Physical access, security and surveillance Streamline logical and physical security Real-time fraud detection unauthorized changes Physical person identification security
  15. 15. 6. Protect the information Attestation Compliance Risks Segregation of duties Reconciliation Role management
  16. 16. Oracle Identity Governance Authorization Oracle Identity Governance products Technology Storage Federation Provisioning De-provisioning Identity admin Trust Identity services Authentication Role mgmt Policy mgmt OIM OAAM OIF OAM OES OPSS OIA OWSM SOA BI DB UI LDAP Adapter Custom OVD File
  17. 17. Oracle Identity Governance and biometrics Security policy Biometrics: Finger veins, Iris, Voice, Palm veins, Palm-prints, Fingerprints Location, Badges, Tokens, Passwords, RFID, Certificate, Smart cards Role, business identity and access management Enterprise access, Enterprise SSO, Federated access Enterprise physical access, identification Authentication services, Authorization services, User provisioning, User de-provisioning, Password management, Infrastructure services Alarms / messages Reports, Monitoring, Analytics, Risks, User Auditing, Compliance, Policy Fraud detection, Governance
  18. 18. Summary Streamlined access (logical and physical) Streamlined business processes Control improvement IT risk minimization
  19. 19. Every journey starts with a first steps... Account provisioning to critical systems Streamline physical and logical access Implement Biometrics Streamline business processes Improve onboarding and offboarding
  20. 20. Thank You! Mārtiņš Orinskis: LinkedIn: Twitter: Facebook: Blog: