SlideShare a Scribd company logo
1 of 16
Download to read offline
1 Hitachi ID Suite
Managing the User Lifecycle
Across On-Premises and
Cloud-Hosted Applications
Hitachi ID Suite 9.0 Features and Technology.
2 Overview
• Hitachi ID Suite 9.0 is a major release. Almost all components of the software have seen some
enhancements.
• Major new capabilities:
– Mobile access.
– Actionable analytics.
– Check-out account sets.
– More interactive UI.
– Moved to 64-bit platform.
• Next release will be 10.0 – ETA Q4/2015.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 1
Slide Presentation
3 Enhancements in 9.0
General HiPAM HiIM
• Move platform to 64-bit.
• Stronger default crypto
(AES-256, SHA-512).
• Support new MSSQL,
Oracle back ends.
• Mobile: skin, iOS and
Android apps.
• Usability improvements:
JS in UI, clickable
objects, sortable report
output, ...
• Analytics: report output
→ request input.
• Many new reports, some
with graphical
dashboards.
• Account-set check-out.
• Run commands across
managed systems.
• LWS improved
scalability.
• HiPAM reference build.
• Certification via arbitrary
relationships.
• Hierarchical attributes.
• Usability improvements
to PDRs.
• Photo upload.
• VCARD links on user
profiles.
• Deployability:
componentize reference
builds.
4 Mobile / BYOD
4.1 Mobile UI for web apps
Enabling a mobile UI to an enterprise app is a two part problem.
• The UI has to fit on small screens:
– Narrow width.
– Vertical scroll.
• Connectivity is required:
– The device is on the public Internet.
– Hitachi ID Privileged Access Manager server is usually on a private network.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 2
Slide Presentation
4.2 Mobile app architecture (1/4)
DMZ
Private
Corporate
Network
Public
Internet
Personal
Device
Mon, 15 June 2015
3:06 PM
Type to search...
4G 70%
IAM
Server
Firewall Firewall
• The user’s phone probably has no VPN client installed.
• The phone – via a data plan – is connected to the public Internet.
• The IAM system is attached to the corporate network, behind multiple firewalls.
4.3 Mobile app architecture (2/4)
Simple, uncontroversial firewall configuration
Risky, controversial, likely not allowed
DMZ
Private
Corporate
Network
Public
Internet
Personal
Device
Mon, 15 June 2015
3:06 PM
Type to search...
4G 70%
IAM
Server
Firewall Firewall
• Firewalls are designed to block inbound connections.
• Outbound connections are usually allowed or easily justified.
• Inbound connections would require:
– Port forwarding; or
– A reverse web proxy.
• We want to minimize the set of attackers who can probe the IAM system.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 3
Slide Presentation
4.4 Mobile app architecture (3/4)
How can a smart phone app, without a VPN,
access an API or web UI published by an
on-premise application server?
Simple, uncontroversial firewall configuration
Risky, controversial, likely not allowed
DMZ
Private
Corporate
Network
Public
Internet
Personal
Device
Mon, 15 June 2015
3:06 PM
Type to search...
4G 70%
IAM
Server
Firewall Firewall
4.5 Mobile app architecture (4/4)
DMZ
Private
Corporate
Network
Public
Internet
Firewall Firewall
Messaging passing system:
“Exchange requests”
Worker thread:
“Give me an HTTP
request”
HTTPS request:
“Includes userID,
deviceID”
Cloud
Proxy
Personal
Device
Mon, 15 June 2015
3:06 PM
Type to search...
4G 70%
IAM
Server
2
3
1
• The solution is to insert a proxy between the BYOD and IAM system.
• The proxy is on the Internet, so reachable by both.
• Connections from both ends are authenticated.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 4
Slide Presentation
4.6 Security features
Problem Solution
• Only accept connections
from activated devices.
• Deploy an app to the device.
• Install a personal key at activation time.
• Proxy rejects connections with a bad/missing key.
• IAM system only receives valid traffic.
• Denial of service attacks • Proxy is efficient but somewhat vulnerable.
• Attackers have no key – DDoS attacks never reach the
IAM system.
• Lost/stolen device • Keys can be revoked.
• Users still need to authenticate.
• Two factor authentication • Use of a valid key is a first authentication step.
• Follow up with password, security questions, etc.
4.7 Activate Mobile Access
Animation: ../../pics/camtasia/v9/enable-mobile-device-1/enable-mobile-device-1.mp4
5 Mobile use cases
5.1 Add contact to phone
Animation: ../../pics/camtasia/v9/add-contact-to-phone-1/add-contact-to-phone-1.mp4
5.2 Scan contact QR code
Animation: ../../pics/camtasia/v9/find-download-contact-info-1/find-download-contact-info-1.mp4
5.3 Mobile request approval
Animation: ../../pics/camtasia/v9/approve-request-group-membership-via-mobile-access-app-1/approve-request-group-me
© 2015 Hitachi ID Systems, Inc. All rights reserved. 5
Slide Presentation
5.4 Unlock pre-boot password
Animation: ../../pics/camtasia/v9/unlock-epo-pba-password-1/unlock-epo-pba-password-1.mp4
5.5 Request groupset
Animation: ../../pics/camtasia/v9/request-groupset-1/request-groupset-1.mp4
5.6 Password display
Animation: ../../pics/camtasia/v9/pw-disp-scaled-1/pw-disp-scaled-1.mp4
6 UI: AJAX and clickable objects
6.1 Hierarchical attributes
© 2015 Hitachi ID Systems, Inc. All rights reserved. 6
Slide Presentation
6.2 Dynamic report output
6.3 Clickable objects in UI
© 2015 Hitachi ID Systems, Inc. All rights reserved. 7
Slide Presentation
6.4 Object types – visible detail
Object in UI Click for details Object in UI Click for details
User name • User ID
• Profile attributes.
• Entitlements.
Group name • Target system
• Membership.
• Owner/authorizers.
• History.
Request ID • Meta data.
• Authorizers.
• Operations.
Role • ID, description.
• Entitlements.
• Users with the role.
• Owner/authorizers.
Managed
system (HiPAM)
• Attributes.
• Attached policy.
• Groups, services and
accounts.
• Attached policies.
Managed
account
(HiPAM)
• Attributes.
• Groups and services.
• Managed system.
• Attached policies.
7 More and more powerful reports
© 2015 Hitachi ID Systems, Inc. All rights reserved. 8
Slide Presentation
7.1 Report output to request input
7.2 Graphical report summaries
© 2015 Hitachi ID Systems, Inc. All rights reserved. 9
Slide Presentation
7.3 Many built-in reports
• More than 150 built-in report programs.
• Some reports have as many as 10 different modes.
– (orphan accounts / orphan profiles / dormant accounts / dormant profiles).
• Various areas of the product:
– 20 HiPAM specific.
– 10 data quality.
– 7 entitlement analysis.
– etc.
• Reports callable via API
– Integration with enterprise dashboards.
7.4 Hitachi ID Privileged Access Manager Reports
Operation Policy, configuration Trends
© 2015 Hitachi ID Systems, Inc. All rights reserved. 10
Slide Presentation
7.5 Workflow Trend Dashboard
8 Actionable Analytics
8.1 PDR: New Employee
Animation: ../../pics/camtasia/v9/pdr-config-new-employee-1/pdr-config-new-employee-1.mp4
8.2 Report2PDR: Onboard employees
Animation: ../../pics/camtasia/v9/report2pdr-new-user-1/report2pdr-new-user-1.mp4
8.3 Report2PDR: Approve and first login
Animation: ../../pics/camtasia/v9/approve-new-employee-first-login-1/approve-new-employee-first-login-1.mp4
8.4 Report2PDR: Disable orphan accounts
Animation: ../../pics/camtasia/v9/report2pdr-disable-orphan-accounts-1/report2pdr-disable-orphan-accounts-1.mp4
9 Account sets
© 2015 Hitachi ID Systems, Inc. All rights reserved. 11
Slide Presentation
9.1 Account sets
Definitions Use cases
• A saved search.
• Returns managed accounts on managed
systems.
• Example: search on OS, subnet, login ID.
• Can also include accounts, systems
individually.
• Check out multiple accounts at once:
– e.g., all systems requiring a patch.
– e.g., all systems supporting an n-tier
app.
• Launch multiple login sessions at once:
– RDP, SSH, vSphere, SQL Studio,
Toad, etc.
• Push commands to run on all checked out
systems, accounts:
– Retrieve status from end systems.
– Make configuration changes.
– Apply patches.
9.2 Account set checkout
Animation: ../../pics/camtasia/v9/account-set-checkout-1/account-set-checkout-1.mp4
10 Reference builds
10.1 Need but hate code
• Most enterprise-scale deployments require some business logic.
• In practice, business logic looks like either script code or intricate flow charts.
• Nobody wants to write or maintain these things:
– Costly.
– Risky.
– Easy to make mistakes.
– Hard to find/keep staff with the skills.
• Reference builds are intended to eliminate this.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 12
Slide Presentation
10.2 HiPAM Reference Build
Business decisions: Policy rules:
• What authentication processes should be
allowed for this user, at this time, from this
IP and device?
• What systems can a user see?
• What accounts and group sets can a user
request?
• Is access pre-authorized?
• Who must approve access?
• If authorizers do not respond, who should
we escalate to?
• What disclosure mechanisms should be
allowed?
• What, if any, session data should be
recorded?
• All rules tables have two parts:
– Left: match on the current session
on request.
– Right: make a policy decision or take
action.
• Authentication chain selection.
• System/account filter (visibility).
• Authorizer selection and threshold setting.
• Escalation routing.
• Disclosure mechanism selection.
• Session data stream selection.
10.3 Authorization policy
© 2015 Hitachi ID Systems, Inc. All rights reserved. 13
Slide Presentation
10.4 Example authorization policy rules
If ... ... Then If ... ... Then
• Account
request,
• Recipient
matches
EMERGENCY-
RECOVERY.
• Empty
authorizer list,
• Auto-approve,
• No more rules.
• Account
request,
• Recipient
matches
UNIX-ADMINS,
• MSPID is UNIX-
SYSTEMS.
• Auto-approve,
• Empty
authorizer list,
• No more rules.
• Groupset
request,
• Recipient
matches
VENDORS.
• Add authorizers
from VENDOR-
ACCESS,
• Sample 3,
• Minimum 1.
• Accountset
request,
• MSPID is UNIX-
SYSTEMS.
• Add authorizers
from
UNIX-ADMINS,
• Sample 2,
• Minimum 1.
10.5 Sample rule: emergency access
11 Identity Manager
© 2015 Hitachi ID Systems, Inc. All rights reserved. 14
Slide Presentation
11.1 Certifier/user via relationship
11.2 More interactive input fields
© 2015 Hitachi ID Systems, Inc. All rights reserved. 15
Slide Presentation
11.3 Picture upload
12 Discussion
www.Hitachi-ID.com
500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com
Date: May 22, 2015 File: PRCS:pres

More Related Content

What's hot

IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication ManagementHitachi ID Systems, Inc.
 
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiCrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiIBM Sverige
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Systems, Inc.
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device J
 
Enhancing your mobile enterprise security with ibm worklight tips
Enhancing your mobile enterprise security with ibm worklight tipsEnhancing your mobile enterprise security with ibm worklight tips
Enhancing your mobile enterprise security with ibm worklight tipsbupbechanhgmail
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 

What's hot (20)

IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiCrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Enhancing your mobile enterprise security with ibm worklight tips
Enhancing your mobile enterprise security with ibm worklight tipsEnhancing your mobile enterprise security with ibm worklight tips
Enhancing your mobile enterprise security with ibm worklight tips
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 

Viewers also liked

Grace Under Pressure
Grace Under PressureGrace Under Pressure
Grace Under PressureVanguard
 
Arise EMEA - My Story Video Contest
Arise EMEA - My Story Video ContestArise EMEA - My Story Video Contest
Arise EMEA - My Story Video ContestArise International
 
Innovation management -by Sudhakar Ram
Innovation management -by Sudhakar RamInnovation management -by Sudhakar Ram
Innovation management -by Sudhakar RamMastek Ltd
 
Linking Open Government Data at Scale
Linking Open Government Data at Scale Linking Open Government Data at Scale
Linking Open Government Data at Scale Bernadette Hyland-Wood
 
Connectin - An Enterprise Knowledge Management Solution
Connectin - An Enterprise Knowledge Management SolutionConnectin - An Enterprise Knowledge Management Solution
Connectin - An Enterprise Knowledge Management SolutionAssyst International Pvt Ltd.
 
Fabasoft at go international.at (November 2010)
Fabasoft at go international.at (November 2010)Fabasoft at go international.at (November 2010)
Fabasoft at go international.at (November 2010)Fabasoft eGov Suite
 
Security event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalSecurity event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalCal Net Technology Group
 
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEsCloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEsEasynet Connect
 
Get Your Head in the Cloud
Get Your Head in the CloudGet Your Head in the Cloud
Get Your Head in the CloudClaris Networks
 
Embracing Mobile First
Embracing Mobile FirstEmbracing Mobile First
Embracing Mobile FirstCoreMedia
 

Viewers also liked (16)

Christmas 2015
Christmas 2015Christmas 2015
Christmas 2015
 
Product Engineering
Product EngineeringProduct Engineering
Product Engineering
 
Grace Under Pressure
Grace Under PressureGrace Under Pressure
Grace Under Pressure
 
Arise EMEA - My Story Video Contest
Arise EMEA - My Story Video ContestArise EMEA - My Story Video Contest
Arise EMEA - My Story Video Contest
 
Innovation management -by Sudhakar Ram
Innovation management -by Sudhakar RamInnovation management -by Sudhakar Ram
Innovation management -by Sudhakar Ram
 
Agile - Scrum
Agile - ScrumAgile - Scrum
Agile - Scrum
 
Linking Open Government Data at Scale
Linking Open Government Data at Scale Linking Open Government Data at Scale
Linking Open Government Data at Scale
 
Connectin - An Enterprise Knowledge Management Solution
Connectin - An Enterprise Knowledge Management SolutionConnectin - An Enterprise Knowledge Management Solution
Connectin - An Enterprise Knowledge Management Solution
 
What's New with vSphere 4
What's New with vSphere 4What's New with vSphere 4
What's New with vSphere 4
 
Fabasoft at go international.at (November 2010)
Fabasoft at go international.at (November 2010)Fabasoft at go international.at (November 2010)
Fabasoft at go international.at (November 2010)
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Security event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalSecurity event presentation 3.4.2016-final
Security event presentation 3.4.2016-final
 
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEsCloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEs
 
Get Your Head in the Cloud
Get Your Head in the CloudGet Your Head in the Cloud
Get Your Head in the Cloud
 
Embracing Mobile First
Embracing Mobile FirstEmbracing Mobile First
Embracing Mobile First
 
InSync Website Portfolio
InSync Website PortfolioInSync Website Portfolio
InSync Website Portfolio
 

Similar to Hitachi ID Suite 9.0 Features and Technology

Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Securing Microservices in Hybrid Cloud
Securing Microservices in Hybrid CloudSecuring Microservices in Hybrid Cloud
Securing Microservices in Hybrid CloudVMware Tanzu
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessHelpSystems
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iPrecisely
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural OverviewBrian Dickhaus
 
How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ HiveMQ
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
Top 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & TricksTop 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & TricksAppDynamics
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Teemu Tiainen
 

Similar to Hitachi ID Suite 9.0 Features and Technology (20)

Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Securing Microservices in Hybrid Cloud
Securing Microservices in Hybrid CloudSecuring Microservices in Hybrid Cloud
Securing Microservices in Hybrid Cloud
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC Access
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural Overview
 
How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ How to Monitor and Observe IoT and MQTT Applications with HiveMQ
How to Monitor and Observe IoT and MQTT Applications with HiveMQ
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Top 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & TricksTop 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & Tricks
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
 

More from Hitachi ID Systems, Inc.

How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Systems, Inc.
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Systems, Inc.
 

More from Hitachi ID Systems, Inc. (13)

Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
 
Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Hitachi ID Suite 9.0 Features and Technology

  • 1. 1 Hitachi ID Suite Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Hitachi ID Suite 9.0 Features and Technology. 2 Overview • Hitachi ID Suite 9.0 is a major release. Almost all components of the software have seen some enhancements. • Major new capabilities: – Mobile access. – Actionable analytics. – Check-out account sets. – More interactive UI. – Moved to 64-bit platform. • Next release will be 10.0 – ETA Q4/2015. © 2015 Hitachi ID Systems, Inc. All rights reserved. 1
  • 2. Slide Presentation 3 Enhancements in 9.0 General HiPAM HiIM • Move platform to 64-bit. • Stronger default crypto (AES-256, SHA-512). • Support new MSSQL, Oracle back ends. • Mobile: skin, iOS and Android apps. • Usability improvements: JS in UI, clickable objects, sortable report output, ... • Analytics: report output → request input. • Many new reports, some with graphical dashboards. • Account-set check-out. • Run commands across managed systems. • LWS improved scalability. • HiPAM reference build. • Certification via arbitrary relationships. • Hierarchical attributes. • Usability improvements to PDRs. • Photo upload. • VCARD links on user profiles. • Deployability: componentize reference builds. 4 Mobile / BYOD 4.1 Mobile UI for web apps Enabling a mobile UI to an enterprise app is a two part problem. • The UI has to fit on small screens: – Narrow width. – Vertical scroll. • Connectivity is required: – The device is on the public Internet. – Hitachi ID Privileged Access Manager server is usually on a private network. © 2015 Hitachi ID Systems, Inc. All rights reserved. 2
  • 3. Slide Presentation 4.2 Mobile app architecture (1/4) DMZ Private Corporate Network Public Internet Personal Device Mon, 15 June 2015 3:06 PM Type to search... 4G 70% IAM Server Firewall Firewall • The user’s phone probably has no VPN client installed. • The phone – via a data plan – is connected to the public Internet. • The IAM system is attached to the corporate network, behind multiple firewalls. 4.3 Mobile app architecture (2/4) Simple, uncontroversial firewall configuration Risky, controversial, likely not allowed DMZ Private Corporate Network Public Internet Personal Device Mon, 15 June 2015 3:06 PM Type to search... 4G 70% IAM Server Firewall Firewall • Firewalls are designed to block inbound connections. • Outbound connections are usually allowed or easily justified. • Inbound connections would require: – Port forwarding; or – A reverse web proxy. • We want to minimize the set of attackers who can probe the IAM system. © 2015 Hitachi ID Systems, Inc. All rights reserved. 3
  • 4. Slide Presentation 4.4 Mobile app architecture (3/4) How can a smart phone app, without a VPN, access an API or web UI published by an on-premise application server? Simple, uncontroversial firewall configuration Risky, controversial, likely not allowed DMZ Private Corporate Network Public Internet Personal Device Mon, 15 June 2015 3:06 PM Type to search... 4G 70% IAM Server Firewall Firewall 4.5 Mobile app architecture (4/4) DMZ Private Corporate Network Public Internet Firewall Firewall Messaging passing system: “Exchange requests” Worker thread: “Give me an HTTP request” HTTPS request: “Includes userID, deviceID” Cloud Proxy Personal Device Mon, 15 June 2015 3:06 PM Type to search... 4G 70% IAM Server 2 3 1 • The solution is to insert a proxy between the BYOD and IAM system. • The proxy is on the Internet, so reachable by both. • Connections from both ends are authenticated. © 2015 Hitachi ID Systems, Inc. All rights reserved. 4
  • 5. Slide Presentation 4.6 Security features Problem Solution • Only accept connections from activated devices. • Deploy an app to the device. • Install a personal key at activation time. • Proxy rejects connections with a bad/missing key. • IAM system only receives valid traffic. • Denial of service attacks • Proxy is efficient but somewhat vulnerable. • Attackers have no key – DDoS attacks never reach the IAM system. • Lost/stolen device • Keys can be revoked. • Users still need to authenticate. • Two factor authentication • Use of a valid key is a first authentication step. • Follow up with password, security questions, etc. 4.7 Activate Mobile Access Animation: ../../pics/camtasia/v9/enable-mobile-device-1/enable-mobile-device-1.mp4 5 Mobile use cases 5.1 Add contact to phone Animation: ../../pics/camtasia/v9/add-contact-to-phone-1/add-contact-to-phone-1.mp4 5.2 Scan contact QR code Animation: ../../pics/camtasia/v9/find-download-contact-info-1/find-download-contact-info-1.mp4 5.3 Mobile request approval Animation: ../../pics/camtasia/v9/approve-request-group-membership-via-mobile-access-app-1/approve-request-group-me © 2015 Hitachi ID Systems, Inc. All rights reserved. 5
  • 6. Slide Presentation 5.4 Unlock pre-boot password Animation: ../../pics/camtasia/v9/unlock-epo-pba-password-1/unlock-epo-pba-password-1.mp4 5.5 Request groupset Animation: ../../pics/camtasia/v9/request-groupset-1/request-groupset-1.mp4 5.6 Password display Animation: ../../pics/camtasia/v9/pw-disp-scaled-1/pw-disp-scaled-1.mp4 6 UI: AJAX and clickable objects 6.1 Hierarchical attributes © 2015 Hitachi ID Systems, Inc. All rights reserved. 6
  • 7. Slide Presentation 6.2 Dynamic report output 6.3 Clickable objects in UI © 2015 Hitachi ID Systems, Inc. All rights reserved. 7
  • 8. Slide Presentation 6.4 Object types – visible detail Object in UI Click for details Object in UI Click for details User name • User ID • Profile attributes. • Entitlements. Group name • Target system • Membership. • Owner/authorizers. • History. Request ID • Meta data. • Authorizers. • Operations. Role • ID, description. • Entitlements. • Users with the role. • Owner/authorizers. Managed system (HiPAM) • Attributes. • Attached policy. • Groups, services and accounts. • Attached policies. Managed account (HiPAM) • Attributes. • Groups and services. • Managed system. • Attached policies. 7 More and more powerful reports © 2015 Hitachi ID Systems, Inc. All rights reserved. 8
  • 9. Slide Presentation 7.1 Report output to request input 7.2 Graphical report summaries © 2015 Hitachi ID Systems, Inc. All rights reserved. 9
  • 10. Slide Presentation 7.3 Many built-in reports • More than 150 built-in report programs. • Some reports have as many as 10 different modes. – (orphan accounts / orphan profiles / dormant accounts / dormant profiles). • Various areas of the product: – 20 HiPAM specific. – 10 data quality. – 7 entitlement analysis. – etc. • Reports callable via API – Integration with enterprise dashboards. 7.4 Hitachi ID Privileged Access Manager Reports Operation Policy, configuration Trends © 2015 Hitachi ID Systems, Inc. All rights reserved. 10
  • 11. Slide Presentation 7.5 Workflow Trend Dashboard 8 Actionable Analytics 8.1 PDR: New Employee Animation: ../../pics/camtasia/v9/pdr-config-new-employee-1/pdr-config-new-employee-1.mp4 8.2 Report2PDR: Onboard employees Animation: ../../pics/camtasia/v9/report2pdr-new-user-1/report2pdr-new-user-1.mp4 8.3 Report2PDR: Approve and first login Animation: ../../pics/camtasia/v9/approve-new-employee-first-login-1/approve-new-employee-first-login-1.mp4 8.4 Report2PDR: Disable orphan accounts Animation: ../../pics/camtasia/v9/report2pdr-disable-orphan-accounts-1/report2pdr-disable-orphan-accounts-1.mp4 9 Account sets © 2015 Hitachi ID Systems, Inc. All rights reserved. 11
  • 12. Slide Presentation 9.1 Account sets Definitions Use cases • A saved search. • Returns managed accounts on managed systems. • Example: search on OS, subnet, login ID. • Can also include accounts, systems individually. • Check out multiple accounts at once: – e.g., all systems requiring a patch. – e.g., all systems supporting an n-tier app. • Launch multiple login sessions at once: – RDP, SSH, vSphere, SQL Studio, Toad, etc. • Push commands to run on all checked out systems, accounts: – Retrieve status from end systems. – Make configuration changes. – Apply patches. 9.2 Account set checkout Animation: ../../pics/camtasia/v9/account-set-checkout-1/account-set-checkout-1.mp4 10 Reference builds 10.1 Need but hate code • Most enterprise-scale deployments require some business logic. • In practice, business logic looks like either script code or intricate flow charts. • Nobody wants to write or maintain these things: – Costly. – Risky. – Easy to make mistakes. – Hard to find/keep staff with the skills. • Reference builds are intended to eliminate this. © 2015 Hitachi ID Systems, Inc. All rights reserved. 12
  • 13. Slide Presentation 10.2 HiPAM Reference Build Business decisions: Policy rules: • What authentication processes should be allowed for this user, at this time, from this IP and device? • What systems can a user see? • What accounts and group sets can a user request? • Is access pre-authorized? • Who must approve access? • If authorizers do not respond, who should we escalate to? • What disclosure mechanisms should be allowed? • What, if any, session data should be recorded? • All rules tables have two parts: – Left: match on the current session on request. – Right: make a policy decision or take action. • Authentication chain selection. • System/account filter (visibility). • Authorizer selection and threshold setting. • Escalation routing. • Disclosure mechanism selection. • Session data stream selection. 10.3 Authorization policy © 2015 Hitachi ID Systems, Inc. All rights reserved. 13
  • 14. Slide Presentation 10.4 Example authorization policy rules If ... ... Then If ... ... Then • Account request, • Recipient matches EMERGENCY- RECOVERY. • Empty authorizer list, • Auto-approve, • No more rules. • Account request, • Recipient matches UNIX-ADMINS, • MSPID is UNIX- SYSTEMS. • Auto-approve, • Empty authorizer list, • No more rules. • Groupset request, • Recipient matches VENDORS. • Add authorizers from VENDOR- ACCESS, • Sample 3, • Minimum 1. • Accountset request, • MSPID is UNIX- SYSTEMS. • Add authorizers from UNIX-ADMINS, • Sample 2, • Minimum 1. 10.5 Sample rule: emergency access 11 Identity Manager © 2015 Hitachi ID Systems, Inc. All rights reserved. 14
  • 15. Slide Presentation 11.1 Certifier/user via relationship 11.2 More interactive input fields © 2015 Hitachi ID Systems, Inc. All rights reserved. 15
  • 16. Slide Presentation 11.3 Picture upload 12 Discussion www.Hitachi-ID.com 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com Date: May 22, 2015 File: PRCS:pres