Identity and Access ManagementBusiness Ready Security SolutionsRune Lystadrunel@microsoft.comEnterprise Solution Manager
Multiple identities and limited sign-on helpPassword reset and access requests handled through help deskDifferent sign–on requirements for applications ON-PREMISESCONTOSOContoso managing Fabrikam accountsSeparate Remote access solution w/ separate identitiesEMPLOYEES (REMOTE)PARTNERSFabrikamFabrikam managing Contoso accountsCurrent SituationTime and labor intensive process
Enable more secure, identity-based access to applications on-premises and in the cloud from virtually any location or devicePROTECT everywhereACCESS anywhereINTEGRATE andEXTEND securitySIMPLIFY security,MANAGE complianceProvide more secure, always-on access
Enable access from virtually any device
Extend powerful self-service capabilities to users
Automate and simplify management tasks
Control access across organizations
Provide standards-based interoperabilityIdentity and Access Management Strategy
Business Ready Security SolutionsSecure MessagingSecure EndpointSecure CollaborationInformation ProtectionIdentity and Access Management
Secure MessagingSecure EndpointSecure CollaborationInformation ProtectionIdentity and Access ManagementActive Directory®Federation ServicesBusiness Ready Security Solutions
PROTECT Everywhere,ACCESS Anywhere
Provides seamless, always-on, secure connectivity to on-premises and remote users
Eliminates the need to connect explicitly to corporate network while remote
Facilitates more secure, end-to-end communication and collaboration
Uses a policy-based network access approach
Enables IT to easily service, secure, update, and provision mobile machines, whether they are inside or outside the networkIntranetInternetCorporate ResourcesDirectAccess ClientDirectAccess ServerInternal trafficInternet ServersInternet trafficWindows DirectAccess
DirectAccess in Windows 7IPv4 DevicesIPv6 DevicesIT desktop managementNative IPv6 with IPSecAD Group Policy, NAP, software updatesIPv6 Transition ServicesInternetWinSrv 2008R2 DirectAccessRoleSupports variety of remote network protocolsWindows 7 Client
INTEGRATE and EXTEND security
Shared identity with partner organizations and cloud services
Boost cross-organizational efficiency and communication with more secure access

Iam

  • 1.
    Identity and AccessManagementBusiness Ready Security SolutionsRune Lystadrunel@microsoft.comEnterprise Solution Manager
  • 2.
    Multiple identities andlimited sign-on helpPassword reset and access requests handled through help deskDifferent sign–on requirements for applications ON-PREMISESCONTOSOContoso managing Fabrikam accountsSeparate Remote access solution w/ separate identitiesEMPLOYEES (REMOTE)PARTNERSFabrikamFabrikam managing Contoso accountsCurrent SituationTime and labor intensive process
  • 3.
    Enable more secure,identity-based access to applications on-premises and in the cloud from virtually any location or devicePROTECT everywhereACCESS anywhereINTEGRATE andEXTEND securitySIMPLIFY security,MANAGE complianceProvide more secure, always-on access
  • 4.
    Enable access fromvirtually any device
  • 5.
    Extend powerful self-servicecapabilities to users
  • 6.
    Automate and simplifymanagement tasks
  • 7.
  • 8.
  • 9.
    Business Ready SecuritySolutionsSecure MessagingSecure EndpointSecure CollaborationInformation ProtectionIdentity and Access Management
  • 10.
    Secure MessagingSecure EndpointSecureCollaborationInformation ProtectionIdentity and Access ManagementActive Directory®Federation ServicesBusiness Ready Security Solutions
  • 11.
  • 12.
    Provides seamless, always-on,secure connectivity to on-premises and remote users
  • 13.
    Eliminates the needto connect explicitly to corporate network while remote
  • 14.
    Facilitates more secure,end-to-end communication and collaboration
  • 15.
    Uses a policy-basednetwork access approach
  • 16.
    Enables IT toeasily service, secure, update, and provision mobile machines, whether they are inside or outside the networkIntranetInternetCorporate ResourcesDirectAccess ClientDirectAccess ServerInternal trafficInternet ServersInternet trafficWindows DirectAccess
  • 17.
    DirectAccess in Windows7IPv4 DevicesIPv6 DevicesIT desktop managementNative IPv6 with IPSecAD Group Policy, NAP, software updatesIPv6 Transition ServicesInternetWinSrv 2008R2 DirectAccessRoleSupports variety of remote network protocolsWindows 7 Client
  • 18.
  • 19.
    Shared identity withpartner organizations and cloud services
  • 20.
    Boost cross-organizational efficiencyand communication with more secure access
  • 21.
    Support the sharingof rights-protected messages between organizationsFirma AAccount ForestFirma BResource ForestFederationTrustBusiness PartnersToken and claimsAuthenticationApplication AccessPost claimsAD FSAD FSAD RMSAD DSAD DSRedirect to Security Token Service (STS)SharePoint Server FarmUser Account/CredentialsSecurity TokenActive Directory Federation Services
  • 22.
    Cloud ServicesImplements asingle user access model with native single sign on (SSO) and easier federation to on-premise and cloud services
  • 23.
    Helps provide consistentsecurity with a single user access model externalized from applicationsSecurity Token(e.g., Kerberos Ticket)Corporate UserAD FSExchangeSharePointWeb AppClaims-AwareApplicationAD DSAD FS creates SAML token
  • 24.
    Signs it withcompany’s private key
  • 25.
    Sends it backto the user
  • 26.
    Access supplied withthe tokenPartnerSingle Sign On with Extended Collaboration
  • 27.
  • 28.
    Identity Lifecycle ManagementCreateProvisionuserProvision credentialsProvision resourcesHelp Desk“Lost” Credentials
  • 29.
  • 30.
    New EntitlementsRetirePolicy ManagementDe-provisionidentitiesRevoke credentialsDe-provision resourcesPolicy enforcementApprovals and notificationsAudit trailsChangeRole changesPhone # or titlechangePassword and PIN resetResource requests
  • 31.
    Forefront Identity Managerin ActionDatabasesSelf-Service integrationLOB ApplicationsWindowsLog OnFIM PortalPolicy ManagementCredential ManagementUser Management Group ManagementCustomISV PartnerSolutionsIT DepartmentsDirectories
  • 32.
  • 33.
    Built-in workflow foridentity management
  • 34.
    Automatically synchronize alluser information to different directories across the enterprise
  • 35.
    Automates the processof on-boarding usersActiveDirectoryLotusDominoWorkflowUser Enrollment LDAPFIMSQLServerHR SystemApprovalOracle DBManagerFIM CMUser provisioned on all allowed systemsIdentity ManagementUser provisioning
  • 36.
  • 37.
    Built-in workflow foridentity management
  • 38.
    Real-time de-provisioning fromall systems to prevent unauthorized access and information leakageIdentity ManagementUser de-provisioningActiveDirectoryLotusDominoWorkflowUser de-provisioned LDAPFIMSQLServerHR SystemOracle DBFIM CMUser de-provisioned or disabled on all systems
  • 39.
    Self Service GroupManagementSelf-service group and distribution list management with the FIM 2010 Web portal
  • 40.
    Office integration allowsusers to manage group membership from within Microsoft Office Outlook® for maximum productivity
  • 41.
    Enables users touse Outlook to manage approvals while they are offline
  • 42.
    Automatically add usersto either group based on their employee type at the time they are provisioned to Active Directory
  • 43.
    Group and distributionlist management, including dynamic membership calculation in these groups and distribution lists based on user’s attributesAdd-in for OfficeSharePoint-Based Management Console
  • 44.
    Self-Service Password ManagementEnablesusers to reset their own passwords through both Windows logon and FIM password reset portal
  • 45.
    Controls helpdesk costsby enabling end users to manage certain parts of their own identities
  • 46.
    Improves security andcompliance with minimal errors while managing multiple identities and passwordsActiveDirectoryUser requests password resetOracleFIM ServerPasswords updatesSQLServerNotesEnd UserLDAPReset PasswordFIM capabilities integrated with Windows logon
  • 47.
    Randomly selects anumber of questionsEnable more secure, identity-based access to applications on-premises and in the cloud from virtually any location or devicePROTECT everywhere,ACCESS anywhereINTEGRATE andEXTEND securitySIMPLIFY security,MANAGE complianceProvide more secure, always-on access
  • 48.
    Enable access fromvirtually any device
  • 49.
    Extend powerful self-servicecapabilities to users
  • 50.
    Automate and simplifymanagement tasks
  • 51.
  • 52.
    Provide standards-based interoperabilityLearnmore at www.microsoft.com/forefrontSummary
  • 53.
    © 2010 MicrosoftCorporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.