SlideShare a Scribd company logo
8K Miles Software Services || http://www.8kmiles.com 1
Healthcare Challenges With Identity &
Access Management
Meet 8K Miles @ HIMSS 2016 Booth # 10421
Identity & Access Management
 Identity & Access Management (IAM) is the security discipline that enables the right
individual to access the right resource at the right time for the right reason .
 A Compliance Management Technology which helps an employee in an organization
to access right resource that may be a portal , library .
 The technology helps in managing the E2E activity of an employee/user starting from
hiring till exit.
8K Miles Software Services || http://www.8kmiles.com 2
Key Feature & Components of Identity & Access
Management
 Self-Service
 Work Flow Automation
 Access Management
 Campaigns
 Policy Enforcement
 Single Sign-on
8K Miles Software Services || http://www.8kmiles.com 3
 Provisioning
 Fine-Grained Authorization
/ Entitlements
 Directory Services
 Authentication methods
 Attestation, Auditing &
Reporting
 Federation and Federated
Identity Management .
 Role Based Access Control
(RBAC).
Business Case 1 - Self-Service
8K Miles Software Services || http://www.8kmiles.com 4
Creates a New
User
System Generates
Mail to New
Employee
Clicks Self
Registration URL
Log in
Admin
View/
Request/
Delete – Access
The Admin creates a New User Name
from any of the HRMS or DB which
can be integrated with IDM
Hey , I got a new mail ,
which contains a URL,
now I will create a new
Login Id and Password .
Milton
The Pharmacist
Business Case 2 - Provisioning
8K Miles Software Services || http://www.8kmiles.com 5
Admin defines
default
application based
on Role/ Job Title
Raise Request to
Access Patient
Database Application
Admin
Milton
The Pharmacist
The Admin Creates a New User Name
from any of the HRMS or DB which
can be integrated with IDM
Jerald
The Manager
Approve Milton’s request for
accessing application
Approve Jerald’s request
for Milton to access
application
Data Owners
of Patient
Database
Multilevel Approval
 Registering an user access to applications and facility access.
 It Includes all business workflow processes of approvals or denials.
Access Approved for Patient Database
Business Case 3 – (SSO) Before Single Sign On
Implementation
Pharmacist
Leave Management
System
Payroll Portal
Medicine Portal
Billing Portal
• User need to bookmark
multiple portals
• User need to remember
multiple username and
passwords .
Enterprise Portals
Business Case 3 – (SSO) After Single Sign On
Implementation
Pharmacist
 One username & password to access multiple
resource in an enterprise .
 Save time in escalations .
 More of self service than relying in tech support .
Leave Management System
Billing Portal
Payroll Management
Medicine Portal
Education Portal
HR Portal
Enterprise Portals
Business Case 4 – Before Access Governance
Implementation ( Attestation for Application Access)
Job Change/
Promotion
Nurse Patient Specialist
Ming Ma
Calorie
Counter
Ming Ma
Current Job Title
Change in Job Title for
Ming Ma
Nutricheck
Today does your organization
track what access to resource
your employee has even after
a shift in Job Title/Role ?
Calorie
Counter
Nutricheck
Job Change/
Promotion
Nurse Patient Specialist
Ming Ma
Calorie
Counter
Ming Ma
Current Job Title
Change in Job Title for
Ming Ma
Nutricheck
EZIAM will automatically detect
the user’s information that are
sent to it as a daily feed and
administrator will identify the
Change and dis-regards the
pervious resource access from
Ming Ma
Business Case 4 – After Access Governance
Implementation ( Attestation for Application Access)
Business Case 5 – Application Access Approval
Workflow (Re-Assignment)
Ming Ma
Calorie
Counter
Nutricheck
Manager 1
Ming Ma
Manager 2
Job Change/
Promotion
Calorie
Counter
Nutricheck
When Ming Ma changes the job or role
from one department to another , the
Manager 2 who now attest Ming Ma
rejects her pervious access to the
resources and approves the current
resource “Patient Database”.
When MingMa Changes her Job Title ,
Her Manager Re-Assign her
Information to another Manager 2 Re-Assign Task to Manager 2
Nurse
Patient Specialist Reject
Patient
Database
Approve
Business Case 6 – (IDM)
Before Identity Management Implementation
Randy -
Patient Specialist
John -
Patient Specialist
Theresa being a Super Admin needs to grant
permission to Randy & John for accessing
Patient Database, but Theresa leaves for a
vacation :
• Today does your system allows Abraham
to grant permission to Randy & John for
accessing patient database?
Theresa -
Master Admin
Patient
Database
Theresa Going in a medical
leave , but Randy & John
need to get permission to
access Patient Database
Portal.
• Will Randy & John wait
to get access
permission until
Theresa returns from
vacation ?
Abraham -
Master Admin
Business Case 6 – (IDM)
After Identity Management Implementation
Randy -
Clinical Analyst
John -
Clinical Analyst
• A Mail is triggered by IDM to Abraham on behalf of
Theresa for providing permission to Randy & John
to access Patient Database.
Theresa -
Master Admin
Patient
Database
Abraham -
Super Admin
Theresa going on a
vacation , hence
reassign the task to
Abraham for
providing
permission to
Randy & John for
accessing patient
database
Theresa Re-Assign the work to Abraham ,
hence a mail is Triggered to Abraham
Now Abraham Login
as an admin and
provides permission
to Randy & John On
behalf of Theresa
Example -Access Certification Campaign &
Audits :
1
3
1. User Logs in as an
Manager .
2. Checks the
certification
complete
Percentage .
3. Opens the
Campaign and now
he will certify a
particular person
2
Example -Access Certification Campaign &
Audits :
4 5
67
 The Manager has the Option to
Approve / Reject /Consult /
Reassign a Particular Employee
according to the Employee’s
Action .
 If the Employee Reports
directly to the Manager ,
the Manager has the
Privilege to Approve or
Attest .
 If the Employee Quits his
present Organization, the
Manager has an option to
Reject the particular
Employee .
 If the employee moved to
a different team or No
longer reports to him , the
Manager can Select
Consult or Reassign to
Another Role
Reports
9
10
 The User Can Log In to
 View Report
 Manager Report
 Legacy Report
 The User can opt to choose any
reports that requires him to do
Audit and pull data by Providing
various Parameters to view the
reports .
Reports
12
11
 The User can view the
reports and has an option to
Export Reports to various
Known Sources available in
the Tool .
8K Miles Software Services || http://www.8kmiles.com 17
“Knowledge Is What Happens When
Presentation Meets Opportunity “
Meet 8K Miles @
HIMSS 2016 Booth # 10421
?

More Related Content

What's hot

Multitasking- Friend or Foe
Multitasking- Friend or FoeMultitasking- Friend or Foe
Multitasking- Friend or Foe
Medical Business Systems
 
RM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementRM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement Management
Christian Sundell
 
Medicworks At a Glance
Medicworks At a GlanceMedicworks At a Glance
Medicworks At a Glance
Rohit Sharma
 
Salesforce Security: Fully Automated
Salesforce Security: Fully AutomatedSalesforce Security: Fully Automated
Salesforce Security: Fully Automated
Salesforce.org
 
Why Patients Require Improved Referral Management From Their Doctors?
Why Patients Require Improved Referral Management From Their Doctors?Why Patients Require Improved Referral Management From Their Doctors?
Why Patients Require Improved Referral Management From Their Doctors?
GaryRichards30
 
HOSPITAL ERP - ABSOLINSOFT
HOSPITAL ERP - ABSOLINSOFTHOSPITAL ERP - ABSOLINSOFT
HOSPITAL ERP - ABSOLINSOFT
Ramesh S
 
All EHR's Are Not Created Equal
All EHR's Are Not Created EqualAll EHR's Are Not Created Equal
All EHR's Are Not Created Equal
Qualifacts
 
Oracle hyperion fdqm
Oracle hyperion fdqmOracle hyperion fdqm
Oracle hyperion fdqm
Amit Sharma
 

What's hot (8)

Multitasking- Friend or Foe
Multitasking- Friend or FoeMultitasking- Friend or Foe
Multitasking- Friend or Foe
 
RM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement ManagementRM5 IdM, Centralized Entitlement Management
RM5 IdM, Centralized Entitlement Management
 
Medicworks At a Glance
Medicworks At a GlanceMedicworks At a Glance
Medicworks At a Glance
 
Salesforce Security: Fully Automated
Salesforce Security: Fully AutomatedSalesforce Security: Fully Automated
Salesforce Security: Fully Automated
 
Why Patients Require Improved Referral Management From Their Doctors?
Why Patients Require Improved Referral Management From Their Doctors?Why Patients Require Improved Referral Management From Their Doctors?
Why Patients Require Improved Referral Management From Their Doctors?
 
HOSPITAL ERP - ABSOLINSOFT
HOSPITAL ERP - ABSOLINSOFTHOSPITAL ERP - ABSOLINSOFT
HOSPITAL ERP - ABSOLINSOFT
 
All EHR's Are Not Created Equal
All EHR's Are Not Created EqualAll EHR's Are Not Created Equal
All EHR's Are Not Created Equal
 
Oracle hyperion fdqm
Oracle hyperion fdqmOracle hyperion fdqm
Oracle hyperion fdqm
 

Viewers also liked

user interface skill presentation
user interface skill presentationuser interface skill presentation
user interface skill presentation
Pavithra N
 
Buyers Guide for Governance
Buyers Guide for GovernanceBuyers Guide for Governance
Buyers Guide for Governance
Courion Corporation
 
Lasse Andresen - ForgeRock - Stanford - Feb 7 2011
Lasse Andresen - ForgeRock - Stanford - Feb 7 2011Lasse Andresen - ForgeRock - Stanford - Feb 7 2011
Lasse Andresen - ForgeRock - Stanford - Feb 7 2011
Burton Lee
 
Portfolio WRM
Portfolio WRMPortfolio WRM
Portfolio WRM
Wilson Meneses
 
Identity & Access Governance versus Process Agility
Identity & Access Governance versus Process AgilityIdentity & Access Governance versus Process Agility
Identity & Access Governance versus Process Agility
Horst Walther
 
Advanced persistent threats(APT) - Infographic
Advanced persistent threats(APT) - InfographicAdvanced persistent threats(APT) - Infographic
Advanced persistent threats(APT) - Infographic
Happiest Minds Technologies
 
IBM Identity Governance & Intelligence
 IBM Identity Governance & Intelligence IBM Identity Governance & Intelligence
IBM Identity Governance & Intelligence
유 김
 
MC9RS08KA8/4 Introduction
MC9RS08KA8/4 IntroductionMC9RS08KA8/4 Introduction
MC9RS08KA8/4 Introduction
Premier Farnell
 
Future-Proofing Your Digital Media Storage
Future-Proofing Your Digital Media StorageFuture-Proofing Your Digital Media Storage
Future-Proofing Your Digital Media Storage
Nexsan by Imation
 
Wounded Warrior Project 8K Run Program
Wounded Warrior Project 8K Run ProgramWounded Warrior Project 8K Run Program
Wounded Warrior Project 8K Run Program
Phil Monkress
 
Consideration of issues for archiving of 4K/8K. Arai Hirokazu, NHK
Consideration of issues for archiving of 4K/8K. Arai Hirokazu, NHKConsideration of issues for archiving of 4K/8K. Arai Hirokazu, NHK
Consideration of issues for archiving of 4K/8K. Arai Hirokazu, NHK
FIAT/IFTA
 
Perf Storwize V7000 Eng
Perf Storwize V7000 EngPerf Storwize V7000 Eng
Perf Storwize V7000 Eng
Oleg Korol
 
Digital Image Basics
Digital Image BasicsDigital Image Basics
Digital Image Basics
mturre
 
SD Yayından 8K Yayına Geçiş (SD Broadcast to 8K Broadcast)
SD Yayından 8K Yayına Geçiş (SD Broadcast to 8K Broadcast)SD Yayından 8K Yayına Geçiş (SD Broadcast to 8K Broadcast)
SD Yayından 8K Yayına Geçiş (SD Broadcast to 8K Broadcast)
İsmail Emiroğlu
 
Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
Nitai Partners Inc
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things Webinar
ForgeRock
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
IBM Security
 
How fast are we going now?
How fast are we going now?How fast are we going now?
How fast are we going now?
Steve Souders
 
Product Plan - LG TV
Product Plan - LG TV Product Plan - LG TV
Product Plan - LG TV
Seb Sear
 
The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management
ForgeRock
 

Viewers also liked (20)

user interface skill presentation
user interface skill presentationuser interface skill presentation
user interface skill presentation
 
Buyers Guide for Governance
Buyers Guide for GovernanceBuyers Guide for Governance
Buyers Guide for Governance
 
Lasse Andresen - ForgeRock - Stanford - Feb 7 2011
Lasse Andresen - ForgeRock - Stanford - Feb 7 2011Lasse Andresen - ForgeRock - Stanford - Feb 7 2011
Lasse Andresen - ForgeRock - Stanford - Feb 7 2011
 
Portfolio WRM
Portfolio WRMPortfolio WRM
Portfolio WRM
 
Identity & Access Governance versus Process Agility
Identity & Access Governance versus Process AgilityIdentity & Access Governance versus Process Agility
Identity & Access Governance versus Process Agility
 
Advanced persistent threats(APT) - Infographic
Advanced persistent threats(APT) - InfographicAdvanced persistent threats(APT) - Infographic
Advanced persistent threats(APT) - Infographic
 
IBM Identity Governance & Intelligence
 IBM Identity Governance & Intelligence IBM Identity Governance & Intelligence
IBM Identity Governance & Intelligence
 
MC9RS08KA8/4 Introduction
MC9RS08KA8/4 IntroductionMC9RS08KA8/4 Introduction
MC9RS08KA8/4 Introduction
 
Future-Proofing Your Digital Media Storage
Future-Proofing Your Digital Media StorageFuture-Proofing Your Digital Media Storage
Future-Proofing Your Digital Media Storage
 
Wounded Warrior Project 8K Run Program
Wounded Warrior Project 8K Run ProgramWounded Warrior Project 8K Run Program
Wounded Warrior Project 8K Run Program
 
Consideration of issues for archiving of 4K/8K. Arai Hirokazu, NHK
Consideration of issues for archiving of 4K/8K. Arai Hirokazu, NHKConsideration of issues for archiving of 4K/8K. Arai Hirokazu, NHK
Consideration of issues for archiving of 4K/8K. Arai Hirokazu, NHK
 
Perf Storwize V7000 Eng
Perf Storwize V7000 EngPerf Storwize V7000 Eng
Perf Storwize V7000 Eng
 
Digital Image Basics
Digital Image BasicsDigital Image Basics
Digital Image Basics
 
SD Yayından 8K Yayına Geçiş (SD Broadcast to 8K Broadcast)
SD Yayından 8K Yayına Geçiş (SD Broadcast to 8K Broadcast)SD Yayından 8K Yayına Geçiş (SD Broadcast to 8K Broadcast)
SD Yayından 8K Yayına Geçiş (SD Broadcast to 8K Broadcast)
 
Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things Webinar
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
How fast are we going now?
How fast are we going now?How fast are we going now?
How fast are we going now?
 
Product Plan - LG TV
Product Plan - LG TV Product Plan - LG TV
Product Plan - LG TV
 
The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management The Future is Now: What’s New in ForgeRock Identity Management
The Future is Now: What’s New in ForgeRock Identity Management
 

Similar to 8K Miles - User Identity Governance & Compliance

Mm Access Management (ITIL)
Mm Access Management (ITIL)Mm Access Management (ITIL)
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
Evolveum
 
Ame how to diagnose issues with the default approver list in purchasing when ...
Ame how to diagnose issues with the default approver list in purchasing when ...Ame how to diagnose issues with the default approver list in purchasing when ...
Ame how to diagnose issues with the default approver list in purchasing when ...
Abdul Rahman Fouad Thabit
 
Blood Bank Management System.pptx.......
Blood Bank Management System.pptx.......Blood Bank Management System.pptx.......
Blood Bank Management System.pptx.......
VijaylaxmiPatil11
 
Blood Bank Management System in php.pptx
Blood Bank Management System in php.pptxBlood Bank Management System in php.pptx
Blood Bank Management System in php.pptx
227r1a0519
 
20190110 LeanKanban Meetup Story Splitting and Automated Testing
20190110 LeanKanban Meetup Story Splitting and Automated Testing20190110 LeanKanban Meetup Story Splitting and Automated Testing
20190110 LeanKanban Meetup Story Splitting and Automated Testing
Craeg Strong
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization Security
Nexlar Security
 
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
Net at Work
 
User Manager
User ManagerUser Manager
User Manager
EmpowerID
 
Human capital management (1)
Human capital management (1)Human capital management (1)
Human capital management (1)
pm2214
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
Anand Dhouni
 
hCentive Webinsure Consumer
hCentive Webinsure ConsumerhCentive Webinsure Consumer
hCentive Webinsure Consumer
Alisha North
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
Rick Lemieux
 
Cloud Compliance Use Case Demo
Cloud Compliance Use Case DemoCloud Compliance Use Case Demo
Cloud Compliance Use Case Demo
forkish
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java project
Tutorial Learners
 
GCA Technology Healthcare Identity Management Case Study
GCA Technology Healthcare Identity Management Case StudyGCA Technology Healthcare Identity Management Case Study
GCA Technology Healthcare Identity Management Case Study
NetIQ
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
Product Marketing Services
 
5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts
AnayaGrewal
 
Welcome to Premier Success Plans
Welcome to Premier Success PlansWelcome to Premier Success Plans
Welcome to Premier Success Plans
Bruce Ma
 
Ops tel offering id lifecm_oct92015
Ops tel offering id lifecm_oct92015Ops tel offering id lifecm_oct92015
Ops tel offering id lifecm_oct92015
Tony DeGaetano
 

Similar to 8K Miles - User Identity Governance & Compliance (20)

Mm Access Management (ITIL)
Mm Access Management (ITIL)Mm Access Management (ITIL)
Mm Access Management (ITIL)
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Ame how to diagnose issues with the default approver list in purchasing when ...
Ame how to diagnose issues with the default approver list in purchasing when ...Ame how to diagnose issues with the default approver list in purchasing when ...
Ame how to diagnose issues with the default approver list in purchasing when ...
 
Blood Bank Management System.pptx.......
Blood Bank Management System.pptx.......Blood Bank Management System.pptx.......
Blood Bank Management System.pptx.......
 
Blood Bank Management System in php.pptx
Blood Bank Management System in php.pptxBlood Bank Management System in php.pptx
Blood Bank Management System in php.pptx
 
20190110 LeanKanban Meetup Story Splitting and Automated Testing
20190110 LeanKanban Meetup Story Splitting and Automated Testing20190110 LeanKanban Meetup Story Splitting and Automated Testing
20190110 LeanKanban Meetup Story Splitting and Automated Testing
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization Security
 
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
InfinityHR – Complete HR Automation Has Never Been More Within Your Reach!
 
User Manager
User ManagerUser Manager
User Manager
 
Human capital management (1)
Human capital management (1)Human capital management (1)
Human capital management (1)
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
 
hCentive Webinsure Consumer
hCentive Webinsure ConsumerhCentive Webinsure Consumer
hCentive Webinsure Consumer
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Cloud Compliance Use Case Demo
Cloud Compliance Use Case DemoCloud Compliance Use Case Demo
Cloud Compliance Use Case Demo
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java project
 
GCA Technology Healthcare Identity Management Case Study
GCA Technology Healthcare Identity Management Case StudyGCA Technology Healthcare Identity Management Case Study
GCA Technology Healthcare Identity Management Case Study
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts
 
Welcome to Premier Success Plans
Welcome to Premier Success PlansWelcome to Premier Success Plans
Welcome to Premier Success Plans
 
Ops tel offering id lifecm_oct92015
Ops tel offering id lifecm_oct92015Ops tel offering id lifecm_oct92015
Ops tel offering id lifecm_oct92015
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 

8K Miles - User Identity Governance & Compliance

  • 1. 8K Miles Software Services || http://www.8kmiles.com 1 Healthcare Challenges With Identity & Access Management Meet 8K Miles @ HIMSS 2016 Booth # 10421
  • 2. Identity & Access Management  Identity & Access Management (IAM) is the security discipline that enables the right individual to access the right resource at the right time for the right reason .  A Compliance Management Technology which helps an employee in an organization to access right resource that may be a portal , library .  The technology helps in managing the E2E activity of an employee/user starting from hiring till exit. 8K Miles Software Services || http://www.8kmiles.com 2
  • 3. Key Feature & Components of Identity & Access Management  Self-Service  Work Flow Automation  Access Management  Campaigns  Policy Enforcement  Single Sign-on 8K Miles Software Services || http://www.8kmiles.com 3  Provisioning  Fine-Grained Authorization / Entitlements  Directory Services  Authentication methods  Attestation, Auditing & Reporting  Federation and Federated Identity Management .  Role Based Access Control (RBAC).
  • 4. Business Case 1 - Self-Service 8K Miles Software Services || http://www.8kmiles.com 4 Creates a New User System Generates Mail to New Employee Clicks Self Registration URL Log in Admin View/ Request/ Delete – Access The Admin creates a New User Name from any of the HRMS or DB which can be integrated with IDM Hey , I got a new mail , which contains a URL, now I will create a new Login Id and Password . Milton The Pharmacist
  • 5. Business Case 2 - Provisioning 8K Miles Software Services || http://www.8kmiles.com 5 Admin defines default application based on Role/ Job Title Raise Request to Access Patient Database Application Admin Milton The Pharmacist The Admin Creates a New User Name from any of the HRMS or DB which can be integrated with IDM Jerald The Manager Approve Milton’s request for accessing application Approve Jerald’s request for Milton to access application Data Owners of Patient Database Multilevel Approval  Registering an user access to applications and facility access.  It Includes all business workflow processes of approvals or denials. Access Approved for Patient Database
  • 6. Business Case 3 – (SSO) Before Single Sign On Implementation Pharmacist Leave Management System Payroll Portal Medicine Portal Billing Portal • User need to bookmark multiple portals • User need to remember multiple username and passwords . Enterprise Portals
  • 7. Business Case 3 – (SSO) After Single Sign On Implementation Pharmacist  One username & password to access multiple resource in an enterprise .  Save time in escalations .  More of self service than relying in tech support . Leave Management System Billing Portal Payroll Management Medicine Portal Education Portal HR Portal Enterprise Portals
  • 8. Business Case 4 – Before Access Governance Implementation ( Attestation for Application Access) Job Change/ Promotion Nurse Patient Specialist Ming Ma Calorie Counter Ming Ma Current Job Title Change in Job Title for Ming Ma Nutricheck Today does your organization track what access to resource your employee has even after a shift in Job Title/Role ? Calorie Counter Nutricheck
  • 9. Job Change/ Promotion Nurse Patient Specialist Ming Ma Calorie Counter Ming Ma Current Job Title Change in Job Title for Ming Ma Nutricheck EZIAM will automatically detect the user’s information that are sent to it as a daily feed and administrator will identify the Change and dis-regards the pervious resource access from Ming Ma Business Case 4 – After Access Governance Implementation ( Attestation for Application Access)
  • 10. Business Case 5 – Application Access Approval Workflow (Re-Assignment) Ming Ma Calorie Counter Nutricheck Manager 1 Ming Ma Manager 2 Job Change/ Promotion Calorie Counter Nutricheck When Ming Ma changes the job or role from one department to another , the Manager 2 who now attest Ming Ma rejects her pervious access to the resources and approves the current resource “Patient Database”. When MingMa Changes her Job Title , Her Manager Re-Assign her Information to another Manager 2 Re-Assign Task to Manager 2 Nurse Patient Specialist Reject Patient Database Approve
  • 11. Business Case 6 – (IDM) Before Identity Management Implementation Randy - Patient Specialist John - Patient Specialist Theresa being a Super Admin needs to grant permission to Randy & John for accessing Patient Database, but Theresa leaves for a vacation : • Today does your system allows Abraham to grant permission to Randy & John for accessing patient database? Theresa - Master Admin Patient Database Theresa Going in a medical leave , but Randy & John need to get permission to access Patient Database Portal. • Will Randy & John wait to get access permission until Theresa returns from vacation ? Abraham - Master Admin
  • 12. Business Case 6 – (IDM) After Identity Management Implementation Randy - Clinical Analyst John - Clinical Analyst • A Mail is triggered by IDM to Abraham on behalf of Theresa for providing permission to Randy & John to access Patient Database. Theresa - Master Admin Patient Database Abraham - Super Admin Theresa going on a vacation , hence reassign the task to Abraham for providing permission to Randy & John for accessing patient database Theresa Re-Assign the work to Abraham , hence a mail is Triggered to Abraham Now Abraham Login as an admin and provides permission to Randy & John On behalf of Theresa
  • 13. Example -Access Certification Campaign & Audits : 1 3 1. User Logs in as an Manager . 2. Checks the certification complete Percentage . 3. Opens the Campaign and now he will certify a particular person 2
  • 14. Example -Access Certification Campaign & Audits : 4 5 67  The Manager has the Option to Approve / Reject /Consult / Reassign a Particular Employee according to the Employee’s Action .  If the Employee Reports directly to the Manager , the Manager has the Privilege to Approve or Attest .  If the Employee Quits his present Organization, the Manager has an option to Reject the particular Employee .  If the employee moved to a different team or No longer reports to him , the Manager can Select Consult or Reassign to Another Role
  • 15. Reports 9 10  The User Can Log In to  View Report  Manager Report  Legacy Report  The User can opt to choose any reports that requires him to do Audit and pull data by Providing various Parameters to view the reports .
  • 16. Reports 12 11  The User can view the reports and has an option to Export Reports to various Known Sources available in the Tool .
  • 17. 8K Miles Software Services || http://www.8kmiles.com 17 “Knowledge Is What Happens When Presentation Meets Opportunity “ Meet 8K Miles @ HIMSS 2016 Booth # 10421 ?