Submit Search
Upload
Pre-Con Ed: Five Easy Steps for Migrating to CA Directory
•
1 like
•
501 views
CA Technologies
Follow
Pre-Con Ed: Five Easy Steps for Migrating to CA Directory
Read less
Read more
Technology
Report
Share
Report
Share
1 of 29
Download now
Download to read offline
Recommended
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
CA Technologies
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
CA Technologies
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
CA Technologies
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
CA Technologies
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
Recommended
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
CA Technologies
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
Pre-Con Ed: CA Project & Portfolio Management: Getting the Most from the Appl...
CA Technologies
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
CA Technologies
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
Pre-Con Ed: Taking the "Hard" out of Hardware Asset Management
CA Technologies
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
CA Technologies
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
CA Technologies
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...
CA Technologies
Cisco’s Agile Journey
Cisco’s Agile Journey
CA Technologies
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
CA Technologies
Improving Delivery and Execution at Vantiv
Improving Delivery and Execution at Vantiv
CA Technologies
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Technologies
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
CA Technologies
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
CA Technologies
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
CA Technologies
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
CA Technologies
Transforming your organization to be Value Focused
Transforming your organization to be Value Focused
CA Technologies
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
CA Technologies
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...
CA Technologies
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
CA Technologies
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
CA Technologies
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
CA Technologies
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
CA Technologies
Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)
Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)
Nuno Correia
Día #17
Día #17
agustinfernandezcolon
More Related Content
What's hot
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
CA Technologies
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
CA Technologies
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...
CA Technologies
Cisco’s Agile Journey
Cisco’s Agile Journey
CA Technologies
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
CA Technologies
Improving Delivery and Execution at Vantiv
Improving Delivery and Execution at Vantiv
CA Technologies
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Technologies
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
CA Technologies
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
CA Technologies
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
CA Technologies
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
CA Technologies
Transforming your organization to be Value Focused
Transforming your organization to be Value Focused
CA Technologies
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
CA Technologies
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...
CA Technologies
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
CA Technologies
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
CA Technologies
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
CA Technologies
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
CA Technologies
What's hot
(20)
Securely Enabling the Digital Age
Securely Enabling the Digital Age
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...
Cisco’s Agile Journey
Cisco’s Agile Journey
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Improving Delivery and Execution at Vantiv
Improving Delivery and Execution at Vantiv
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
Transforming your organization to be Value Focused
Transforming your organization to be Value Focused
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Viewers also liked
Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)
Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)
Nuno Correia
Día #17
Día #17
agustinfernandezcolon
Día #7
Día #7
agustinfernandezcolon
Time based security for cloud computing
Time based security for cloud computing
Jorge Sebastiao
발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기
발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기
DoHyun Jung
처음 시작하는 라라벨
처음 시작하는 라라벨
KwangSeob Jeong
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
CA Technologies
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Salesforce Admins
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0
Kelly Grizzle
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
CA Technologies
Menu of Betawi (Jakarta) Culture by Wahyu Arief
Menu of Betawi (Jakarta) Culture by Wahyu Arief
Wahyu Arief
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
BeyondTrust
Ficha 3 tipo de erupções
Ficha 3 tipo de erupções
Luís Filipe Marinho
Medienbildung an Grundschulen in Baden-Württemberg
Medienbildung an Grundschulen in Baden-Württemberg
Univention GmbH
c.a.p.e. IT KIX4OTRS - Die Service App im UCS
c.a.p.e. IT KIX4OTRS - Die Service App im UCS
Univention GmbH
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
Society of Women Engineers
Urbanização brasileira
Urbanização brasileira
Carolina Corrêa
Aula metamorfismo
Aula metamorfismo
Carolina Corrêa
Viewers also liked
(18)
Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)
Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)
Día #17
Día #17
Día #7
Día #7
Time based security for cloud computing
Time based security for cloud computing
발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기
발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기
처음 시작하는 라라벨
처음 시작하는 라라벨
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Menu of Betawi (Jakarta) Culture by Wahyu Arief
Menu of Betawi (Jakarta) Culture by Wahyu Arief
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Ficha 3 tipo de erupções
Ficha 3 tipo de erupções
Medienbildung an Grundschulen in Baden-Württemberg
Medienbildung an Grundschulen in Baden-Württemberg
c.a.p.e. IT KIX4OTRS - Die Service App im UCS
c.a.p.e. IT KIX4OTRS - Die Service App im UCS
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
Urbanização brasileira
Urbanização brasileira
Aula metamorfismo
Aula metamorfismo
Similar to Pre-Con Ed: Five Easy Steps for Migrating to CA Directory
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
CA Technologies
Tech Talk: Coty Transforms from Event Management to Service Operations Manage...
Tech Talk: Coty Transforms from Event Management to Service Operations Manage...
CA Technologies
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
CA Technologies
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®
CA Technologies
Introduction to Service Virtualization
Introduction to Service Virtualization
CA Technologies
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
CA Technologies
Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...
Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...
CA Technologies
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
CA Technologies
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
CA Technologies
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
CA Technologies
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
CA Technologies
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
CA Technologies
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
CA Technologies
Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...
Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...
CA Technologies
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
CA Technologies
Microservices Built for Digital Consumption
Microservices Built for Digital Consumption
CA Technologies
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
CA Technologies
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
CA Technologies
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
CA Technologies
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
CA Technologies
Similar to Pre-Con Ed: Five Easy Steps for Migrating to CA Directory
(20)
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Coty Transforms from Event Management to Service Operations Manage...
Tech Talk: Coty Transforms from Event Management to Service Operations Manage...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®
Introduction to Service Virtualization
Introduction to Service Virtualization
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...
Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...
Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
Microservices Built for Digital Consumption
Microservices Built for Digital Consumption
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
More from CA Technologies
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
More from CA Technologies
(20)
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
Recently uploaded
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Precisely
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
null - The Open Security Community
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Competition Advisory Services (India) LLP
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
Neo4j
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
Recently uploaded
(20)
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Pre-Con Ed: Five Easy Steps for Migrating to CA Directory
1.
World® ’16 Five Easy Steps for Migrating to CA Directory Greg Vickery, Principal Services Consultant, CA Technologies SCX12E SECURITY
2.
2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty.
The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
3.
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Join us for a discussion on the steps for migrating your current User Store or Policy Store to CA Directory. We will discuss discovery and project scoping, along with Building the CA Directory environment, Schema (Data Type) migration, Data clean-up and Application Team sign-off. Greg Vickery CA Technologies Principal Services Consultant
4.
4 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda WHY MIGRATE TO CA DIRECTORY DESIGN THE NEW DIRECTORY GO LIVE! LDAP TO CA DIRECTORY TASKS MIGRATING DATABASE TO CA DIRECTORY TASKS APPLICATION TESTING 1 2 3 4 5 6
5.
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Directory Review § Application communicating with a data store –
Via protocol - LDAP § Data store may contain: – policy information – Authentication Info – Authorization Info – or Any other Data Level set the conversation Application Layer LDAP
6.
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Why CA Directory § Performance –
Replication – all Directories are synced (often measured in milliseconds) § Small footprint – Very large environments w/ fewer servers § Scalability – 50++ million is OK – Only Limited by hardware – Can horizontally scale (virtually no limits) CA experiencing a larger migration to CA Directory
7.
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Why CA Directory § Monitoring multiple ways –
Log files for accurate record of activity – Time log to validate performance – Real-time monitoring with SNMP § Including SNMP tool § Operational Advantages (easy to manage) – Data and indexes need no tuning – Very fast backup and restore – Few moving parts CA experiencing a larger migration to CA Directory
8.
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Types of Migration § Existing LDAP environment to CA Directory –
Most common Migration for User Store environments – May have very short project lengths (quick) § Existing Database environment to CA Directory – Generally requires more tasks – More Benefits are realized § Replication in directory much faster than databases § Datacenter to Datacenter (WAN) replication is easy Two migration types from the field
9.
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD 5 Steps of Migration § Architect the New CA Directory environment §
Schema (Data Definition) Migration § Data Migration § Application Testing § Go Live! Overview of Tasks
10.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrating Existing LDAP to CA Directory
11.
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Architecting the CA Directory solution § CA Directory Architecture –
Typically requires less servers than LDAP Servers – Don’t be afraid to design for the strengths of the CA Directory § One to One replacement could be bad design § AND - Departure from old design my allow us to optimize the design – Hardware Requirements (Server Specs) may change § CA Directory is a memory resident directory § Changing O/S may be an option View as a chance to optimize
12.
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrating the Schema § Schema Migration –
CA Directory tools § dxschemaldif - extracts schema from existing LDAP servers § ldif2dxc – formats LDIF to CA Directory configuration – Focus is on your custom schema § Although we have had to change standard schema to support apps – Most LDAP Servers have relaxed schema § May have text OID § Tools will supply valid OIDs during conversion Define Tasks
13.
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrating the Data § Export Data From existing LDAP Server –
In most cases use existing LDAP Server tools to pull the data – Some other vendor tools may be able to exclude proprietary data § Clean Data – Could be the most time consuming portion of migration – Create or adapt existing data clean tool – Remove LDAP Server specific Data (proprietary data) § Import – May find more data issues here – Update clean tool and run again Cleaning the data for import
14.
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrating the Data (continued) § A large number of hours could be involved with this process –
Ongoing process, tool may be updated several times. § The data clean process will be run in multiple environments – Dev, QA, Staging, etc. before Production (Go Live) – Each environment may have unique data anomalies § Opportunity to re-organize or remove unwanted data – Legacy /unused attributes can be removed – Often find attributes that are misused § Example: telephoneNumber (attribute) with a value of ‘out of the country’ Case Study (field experiences)
15.
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrating the Data (continued) § Do you plan to sync old and new environments? –
“One foot in the boat, one foot on the dock” – CA Directory has some limited ability to sync (DXLink) – Sync may introduce an new (3rd) component to the environment § May require additional expertise § Will have performance implications (slowing the new environment) – Sync tool may be slower than new directory server – Highly likely the old environment may be slower than the new environment § If sync process fails – is this cause for rollback? – Manual recovery (rollback) may be faster Other Considerations
16.
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Application Verification § Identify Applications for testing and verification –
Typically sample group of representative applications will be used § Develop a test plan for testing applications § Identify Required Resources (personnel) needed for rollout § The process should be run (and refined) in multiple environments before production – Time all phases, can the process be executed within our outage window Test Plan to verify applications work with new environment
17.
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Go Live § Pre-Go Live (sometime before GO Live): –
Transform the test plan into rollout script and check list (process) – The process should be run in multiple environments before production – Include a Roll-back Plan in case of issues or unexpected disruptions – Verify the correct personnel are available § Directory Team, Operations, Application owners, Vendors, etc. § Execute rollout script – Success! - Meet the next day with the entire team to review Cutover to Production
18.
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrating Existing Database to CA Directory
19.
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrating Database to CA Directory § User Store –
CA Directory has faster replication (Datacenter to Datacenter) § Policy Store (CA SSO) – Very Cost effective § Session Store (CA SSO) – CA Directory is the only Directory / LDAP server supported as session store – Datacenter to Datacenter Database synchronization is expensive Advantages to migrate the different environments
20.
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrating Database to CA Directory § Involves more tasks than LDAP User store conversion §
Create CA Directory Schema § No Schema to export § Convert Fields to attributes § Convert Tables to objectClasses § May be able to use CA Directory ‘Views’ configuration to replace stored procedures Migrating User Store From Database
21.
21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrating Database to CA Directory § CA Directory ‘Views’ Configuration –
‘Views’ configuration may be able to replace certain stored procedures § Views are pre-defined searches with multiple ‘phases’ § Application conversion § Applications will need to be LDAP enabled § Develop as LDAP Requests (different than SQL Requests) § Testing the functionality – Start at beginning of project – More complete set of use cases Migrating User Store From Database (continued)
22.
22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrating Database to CA Directory § Steps for migration of Policy Store Data –
Build CA Directory Server environment (in CA SSO Guide) § Build DIT (Tree) structure for Policy Store data § Add Policy Data Schema files to CA Directory – Extract Data from current Policy Store § Use the available CA SSO Tools to export the policies § This process is the same whether Database or LDAP Server – Configure CA SSO Policy Server for new Policy Store – Import Policies into CA Directory § Using the CA SSO Import tool CA SSO (formerly SiteMinder) Policy Store
23.
23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Migrating Database to CA Directory § Steps for migration of Session Store Data –
Add Session Data Schema files to CA Directory – Determine performance requirements: § Calculate number of concurrent sessions § Factor the session timeout (or average session life) – CA Directory as a session store has specialized configuration § Documentation outlines the specific settings – Hardware intensive for high demand environments § Consult CA for hardware guidelines – Configure CA SSO Policy Server to use CA Directory CA SSO Session Store
24.
24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Review of Migration Steps § Architect the new solution –
Don’t be afraid to change from old design § Schema Migration – Utilize CA Directory tools § Data Migration – May be time consuming § Test Application § GO Live Quick Recap
25.
25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE
DATE/TIME SCT45T How Fast is your Directory? 11/16/2016 at 4:30 pm SCX20S CA Roadmap: Advanced Authentication, Single Sign-On, Directory 11/16/2016 at 1:45 pm SCT44T WAM & Federation (Tech Talk) 11/17/2016 at 4:30 pm
26.
26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Don’t Miss Our INTERACTIVE Security Demo Experience! SNEAK PEEK! 26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
27.
@CAWORLD #CAWORLD © 2016 CA. All RIGHTS RESERVED.27 @CAWORLD #CAWORLD Security For more information on Security, please visit: http://cainc.to/EtfYyw
28.
28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
29.
29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Thank you. Stay connected at communities.ca.com
Download now