Kiran Reddy has over 5 years of experience in identity and access management using Oracle products like Oracle Identity Manager, Oracle Access Manager, Oracle Internet Directory and Oracle Virtual Directory. He has expertise in integrating these products, developing connectors, configuring workflows, provisioning, reconciliation, single sign-on and access policies. He has worked on several projects for clients to implement identity management solutions.
How to Build Interactive Data Apps by ThoughtSpot Product LeadersProduct School
- An introduction to search for data
- How to add a consumer-friendly, self-search experience to your data app
- What the next generation of dashboards looks like
- Tools available for product builders
- A live deep-dive demo of how to build your first app embedding search
The biggest problem experienced by organizations in all industries is the distribution of
information. Many documents are generated each day, and are co-authored and exchanged
among people in different teams. That’s why Document Management solutions have arisen
as a way to address the challenges of organizing the work and eliminating the chaos that
many workers experience when sifting through thousands of files for the right information.
The material discusses Quest's "future-ready" approach to IAM in the perspective of covering the EU GDPR compliance. We discuss about the five foundational concepts of the One Identity family of solutions, and our advantage and approach on covering the four IAM pillars.
With regards to the present audience, we also included an overview of the One Identity platform.
The presentation was developed for the RISK 2018 Conference in Lasko, Slovenia
The session theme is "Enabling Business Continuity During Challenging Times With Virtual Desktops". The session will be conducted by Microsoft..
In the last few weeks, thelives of people around the world have been impacted. Daily working has gotcompromised, particularly with regard to business continuity. Remote working,in the best interest of organizations, is becoming a necessity.
Travel restrictions and new rules on large public gatherings have changed the daily routines of millions. Many organizations are quickly moving to remote working environments. If your customers are thinking of similar options, we at Microsoft are here to support you in this endeavor.
How to Build Interactive Data Apps by ThoughtSpot Product LeadersProduct School
- An introduction to search for data
- How to add a consumer-friendly, self-search experience to your data app
- What the next generation of dashboards looks like
- Tools available for product builders
- A live deep-dive demo of how to build your first app embedding search
The biggest problem experienced by organizations in all industries is the distribution of
information. Many documents are generated each day, and are co-authored and exchanged
among people in different teams. That’s why Document Management solutions have arisen
as a way to address the challenges of organizing the work and eliminating the chaos that
many workers experience when sifting through thousands of files for the right information.
The material discusses Quest's "future-ready" approach to IAM in the perspective of covering the EU GDPR compliance. We discuss about the five foundational concepts of the One Identity family of solutions, and our advantage and approach on covering the four IAM pillars.
With regards to the present audience, we also included an overview of the One Identity platform.
The presentation was developed for the RISK 2018 Conference in Lasko, Slovenia
The session theme is "Enabling Business Continuity During Challenging Times With Virtual Desktops". The session will be conducted by Microsoft..
In the last few weeks, thelives of people around the world have been impacted. Daily working has gotcompromised, particularly with regard to business continuity. Remote working,in the best interest of organizations, is becoming a necessity.
Travel restrictions and new rules on large public gatherings have changed the daily routines of millions. Many organizations are quickly moving to remote working environments. If your customers are thinking of similar options, we at Microsoft are here to support you in this endeavor.
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
Simplify management of apps & devices
Microsoft Intune provides mobile device management, mobile application management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure.
Analyze key aspects to be considered before embarking on your cloud journey. The presentation outlines the strategies, approach, and choices that need to be made, to ensure a smooth transition to the cloud.
How to See and Resolve Office 365 Performance Challenges ThousandEyes
Take control of your Office 365 deployments with ThousandEyes and learn how to monitor, detect and resolve performance issues. Find out:
- What the common misconceptions about Office 365 and how they affect performance
- Monitoring best practices for readiness, deployment and operational phases of your Office 365 rollout
- Real-world case studies explained through a demo
Intelligent compliance and risk management solutions.
First, we understand ‘compliance’ can have different meanings to various teams across enterprise. Compliance is an outcome of continuous risk management, involving compliance, risk, legal, privacy, security, IT and often even HR and finance teams which requires integrated approach to manage risk.
Let's start with the base pillar Compliance Management: compliance management is all about simplify risk assessment and mitigation in more automated way, providing visibility and insights to help meet compliance requirements.
Information Protection and Governance: we believe there is a huge opportunity for Microsoft to help our customers to know their data better, protect and govern data throughout its lifecycle in heterogenous environment. This is often the key starting point for many of our customers in their modern compliance journey – knowing what sensitive data they have, putting flexible, end-user friendly policies for both security and compliance outcomes, using more automation and intelligence.
Internal Risk Management: Internal risks are often what keeps business leaders up at night – regardless of negligent or malicious, identifying and being able to take action on internal risks are critical. The ability to quickly identify and manage risks from insiders (employees or contractors with corporate access) and minimize the negative impact on corporate compliance, competitive business position and brand reputation is a priority for organizations worldwide.
Last but not least, Discover and Respond: being able to discover relevant data for internal investigations, litigation, or regulatory requests and respond to them efficiently, and doing so without having to use multiple solutions and moving data in and out of systems to increase risk – is critical.
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
Windows 10 is better with EMS
Windows 10 is the best Windows ever and provides a foundation for protection against modern threats and continuous management while enabling your users to be more productive. To get the most out of your mobile security and productivity strategy, integrate the Microsoft Enterprise Mobility Suite (EMS) with Windows 10 for greater protection of users, devices, apps, and data.
A key concern for you continues to be security, and rightly so. Identity is the control plane at the center of our solution helping you to be more secure. Only Microsoft offers cloud identity and access management solutions running at Internet scale and designed to help secure your IT environment. Microsoft Azure Active Directory has hundreds of millions of users, is available in 35 datacenters around the world, and has processed more than 1 trillion (yes, trillion) authentications. Our innovative new technology, Microsoft Advanced Threat Analytics is designed to help you identify advanced persistent threats in your organization before they cause damage.
KEY FEATURES
Threat detection: Detect abnormal user behavior, suspicious activities, known malicious attacks and security issues right away. Focus on what is important using a simple, convenient feed.
Conditional access: Control access to applications and other corporate resources like email and files with policy-based conditions that evaluate criteria such as device health, user location etc. This includes support for multi factor authentication (MFA).
Single sign-on: Sign in once to cloud and on-premises web apps from any device. Pre-integrated support for Salesforce, Concur, Workday, and thousands more popular SaaS apps.
With this series of presentation, I am trying to cover aspect of Enterprise Integration Enterprise Integration is one of important component of Enterprise Architecture. It this slide, trying to explain what is Enterprise Integration and cover all topic in details in future slides.
System Integration is corner stone of today's Digital Era.
The Process of software applications does not lie only in Functionality that provides themselves, but ability to communicate with one another.
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan David J Rosenthal
Simplify management of apps & devices
Microsoft Intune provides mobile device management, mobile application management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure.
Analyze key aspects to be considered before embarking on your cloud journey. The presentation outlines the strategies, approach, and choices that need to be made, to ensure a smooth transition to the cloud.
How to See and Resolve Office 365 Performance Challenges ThousandEyes
Take control of your Office 365 deployments with ThousandEyes and learn how to monitor, detect and resolve performance issues. Find out:
- What the common misconceptions about Office 365 and how they affect performance
- Monitoring best practices for readiness, deployment and operational phases of your Office 365 rollout
- Real-world case studies explained through a demo
Intelligent compliance and risk management solutions.
First, we understand ‘compliance’ can have different meanings to various teams across enterprise. Compliance is an outcome of continuous risk management, involving compliance, risk, legal, privacy, security, IT and often even HR and finance teams which requires integrated approach to manage risk.
Let's start with the base pillar Compliance Management: compliance management is all about simplify risk assessment and mitigation in more automated way, providing visibility and insights to help meet compliance requirements.
Information Protection and Governance: we believe there is a huge opportunity for Microsoft to help our customers to know their data better, protect and govern data throughout its lifecycle in heterogenous environment. This is often the key starting point for many of our customers in their modern compliance journey – knowing what sensitive data they have, putting flexible, end-user friendly policies for both security and compliance outcomes, using more automation and intelligence.
Internal Risk Management: Internal risks are often what keeps business leaders up at night – regardless of negligent or malicious, identifying and being able to take action on internal risks are critical. The ability to quickly identify and manage risks from insiders (employees or contractors with corporate access) and minimize the negative impact on corporate compliance, competitive business position and brand reputation is a priority for organizations worldwide.
Last but not least, Discover and Respond: being able to discover relevant data for internal investigations, litigation, or regulatory requests and respond to them efficiently, and doing so without having to use multiple solutions and moving data in and out of systems to increase risk – is critical.
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
Windows 10 is better with EMS
Windows 10 is the best Windows ever and provides a foundation for protection against modern threats and continuous management while enabling your users to be more productive. To get the most out of your mobile security and productivity strategy, integrate the Microsoft Enterprise Mobility Suite (EMS) with Windows 10 for greater protection of users, devices, apps, and data.
A key concern for you continues to be security, and rightly so. Identity is the control plane at the center of our solution helping you to be more secure. Only Microsoft offers cloud identity and access management solutions running at Internet scale and designed to help secure your IT environment. Microsoft Azure Active Directory has hundreds of millions of users, is available in 35 datacenters around the world, and has processed more than 1 trillion (yes, trillion) authentications. Our innovative new technology, Microsoft Advanced Threat Analytics is designed to help you identify advanced persistent threats in your organization before they cause damage.
KEY FEATURES
Threat detection: Detect abnormal user behavior, suspicious activities, known malicious attacks and security issues right away. Focus on what is important using a simple, convenient feed.
Conditional access: Control access to applications and other corporate resources like email and files with policy-based conditions that evaluate criteria such as device health, user location etc. This includes support for multi factor authentication (MFA).
Single sign-on: Sign in once to cloud and on-premises web apps from any device. Pre-integrated support for Salesforce, Concur, Workday, and thousands more popular SaaS apps.
With this series of presentation, I am trying to cover aspect of Enterprise Integration Enterprise Integration is one of important component of Enterprise Architecture. It this slide, trying to explain what is Enterprise Integration and cover all topic in details in future slides.
System Integration is corner stone of today's Digital Era.
The Process of software applications does not lie only in Functionality that provides themselves, but ability to communicate with one another.
IT Professional Expertise in SailPoint Identity IQ, IdentityNow, Identity Management, Identity Access Management, Identity Access Governance, Role Bases Access Management, Life Cycle Manager, Work Flow, Separaton Of Duties, Application On-boarding, Writing Custom Connector, Workflow, Certification, Rules, Policy, Implementing Business Requirement. worked on Different Silpoint Connectors like AD, Databases, Lotus Notes, SAP GRC, Mainframe (RACF, ACF2, TopSecret)
Information Technology and Security professional with around 5 years experience in Oracle Identity Manager, IBM Tivoli Identity and Access Manager, IBM Privileged Access Manager, Cyber Ark, Security Support and Operations, Process transition, Implementation and Documentation, LDAP Directories, Single/Reduced Sign-On (SSO), Micro soft Exchange 2007/2010, ID provisioning and De-Provisioning, Access management, RBAC (Role-Based Access Control), Compliance and Auditing
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365Scott Hoag
Looking to reduce the number of post-it notes you see stuck around the office? Seeking to automate your user creation processes for Office 365? Or maybe you're interested in single sign-on for everything you host in the cloud? Are you questioning what a cloud identity is?
This session will take you through the basics of identity in the Microsoft Cloud and show you to how to set up and configure Office 365 with Azure Active Directory using the Azure Active Directory Synchronization Connect tools.
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
IDM Resume _ Kiran
1. IDENTITY AND ACCESS MANAGEMENT
Kiran Reddy
Ph: +91 9014707137
E-mail : kiranreddypry@gmail.com
Professional Summary
-----------------------------------------------------------------------------------------------------------------------------------
Over 5.4 years of IT experience and 4 years of relative experience on Oracle Access Manager,
Oracle Identity Manager, Oracle Internet Directory and Oracle Virtual Directory.
Expertise on Integrating Oracle Identity Manager (OIM) with other fusion middleware
products like (OID, OAM) and third party products (Active Directory, Sun Java System
Directory Server.
Functional areas of expertise include Identity management, Provisioning and Reconciliation,
Provisioning & Approval Workflows, Adapter Development and implementation.
Experience in provisioning with various connectors such as OOTB connectors, Generic
Technology connectors, customization of connectors.
Experience on XML, XSD, SOAP, WSDL, SOA, BPEL process, Oracle Business Rules and
Human Workflows for request approvals in Approval policy.
Configuring trusted reconciliation using Generic Technology connectors and Database Application
Table connectors.
Having experience with Flat File, tabular, directory server Reconciliation, Bulkload utility, Ldap
Sync.
Good Knowledge on work in UI Customizations and UDF’s. and lookup fields in the design console
to extend the user operations.
Hand-on-experience on customization and configuring of Event handler, scheduler, notifications.
Having hand-on-experience on installation and configuring OAM and its artifices.
Having hands-on-experience on SSO configuration of OAM with OIM and other integration help of
webgate , access gate and sso agent.
Having hands on experience on J2EE Session Management.
Good knowledge on DCC & MCC
Having experience on SSL configuration in security stack.
Good understanding on web server like oracle http server, apache web server, proxy settings
Understanding different directives in web server and configuration experiences
Understanding different ldap schema, object class, and attribute in directory server.
ACL, Indices
Configuration experience in WNA.
Configuring and installation of OAM and host identifier and resource, authentication schema,
authentication module and authorization policy.
Having good knowledge on installing and configuring web gate installation and registering the Web
gate with OHS.
Customizations: Adapters, Event handlers, Schedule Tasks, Reconciliation and provisioning
processes, Approval workflows, Access policies etc. using Java on Eclipse or JDeveloper IDEs.
2. Technical Skills
--------------------------------------------------------------------------------------------------------------------------------
Security Management
Oracle Identity Manager (OIM) and Oracle Access Manager (OAM)
-Solution applied for major firms
Directories
MS Active Directory, Oracle Internet Directory, Sun one Directory,
Oracle Virtual Directory – Integrated these using out of the
box connectors.
Languages
Java - Used in customizing connectors, pre and post processing
of the reconciliation events. HTML, XML and SQL
RDBMS
Oracle, Microsoft Sql Server – Used them for running repository
creation utility (RCU) for creating schemas during initial deployment
phase.
Application Server
Jboss, Tomcat WebLogic – Deployed the Middleware suite on these
configured application servers.
Professional Experience:
---------------------------------------------------------------------------------------------------------------------------------
Delloite India (May 2012 - Present) IDM Security Engineer
Sunera Technologies (Jan 2011 –
may 2012)
Software Engineer
Project Details:
----------------------------------------------------------------------------------------------------------------------------------
Implementation: Oracle Access Management
Client Name: UnitedHeathCare
Label: IDM Security Engineer
Description: System required a central facility for managing user data for the rapid deployment of new
applications and services. Other major business needs include Cost Savings, Efficiency, Security and
improved quality of identities for users. The Implementation Included an end-to-end solution developed to
cater to the Access management needs. The solution included SSO to portal, SOA, PeopleSoft, OBIEE.
Roles & Responsibilities:
Involved in to set up the Environment of Oracle access Manager.
Involve in creating Application domains, Protected policies
Involved in setting up web gates, Proxy configurations
Involved in SSO to Portal ,SOA,BPEL,OBIEE
Worked with various teams to get all data in sync with Directory servers
Making any new roll out friendly to customer
Bug fixing/Minor Enhancement
Handling applications in all seven environments
Basic Design Analysis & Troubleshooting
Environment: OAM 11r1, OID, Weblogic , Oracle Database
3. Implementation: Identity and Access Management
Client Name: Inventec Systems Pvt. Ltd.
Label: IDM Security Engineer
Description: Manage on boarding of OIM users include EMR users, portal users and technical operators.
Perform automatic provision of user accounts for OIM users in OID, and unmanaged systems through
the user groups, access policies, workflows and OOTB connectors. Manage the NEHR administrator’s
access to the OIM admin console. Protecting the applications and applying the SSO through Oracle Access
manager.
Roles & Responsibilities:
Involved in setup the environment of oracle identity & access manager
Setting up attestation process and delegated administration
Involved in setting up the environment OIM with AD, MS Exchange, and Oracle DB.
User Provisioning / Groups and Organization Level Provisioning to OID and AD with
Exchange from OIM, Initial Reconciliation done from Trusted Source of PeopleSoft.
Designed Roles, Rules, Workflows routes involving enable – disable user, and audit report,
delegation.
Created Password policies in AD, OID and OIM.
Integrating OIM and OAM applying Single-Sign on.
Configuring authentication and authorization policies for protecting web applications and
providing SSO functionality.
Configured SSO between PeopleSoft HR, Financials, and other applications.
Configuring Logout URL
Environment:OIM, OVD, OID, MS AD, Sun one directory, web logic server, OAM, OHS web server
Implementation: Global Identity and Access Management
Client Name: Brigade Corporation India Ltd
Label: IDM Security Engineer
Description: The Global Identity and Access Management solution has the primary objective of enhancing
Univar’s enterprise security foundation via increased identity and access management capabilities including
authentication, authorization, delegated administration and provisioning services.
The primary goals of GIAM are the following:
Provide a centralized Identity and Access Management (IAM) solution by consolidating
various Univar region’s IAM services
Support the use of a single user identity across applications within the IAM environment
Improve operational efficiency by automating the user administration, approval, and
provisioning processes
Enhance security, privacy and compliance by incorporating risk based authentication capabilities
Roles & Responsibilities
Reconciliation of users from the target systems like Active Directory server and Oracle-HR
systems
Involved in automated provisioning of newly created users to Active Directory Server.
Creation and configuration of user Self Registration and self service request.
Involved in Setting up of Development environment which includes OIM, OAM, OID.
Setting up Attestation process and password policies.
Involved in installing Oracle Access Manager.
Involved in implementing SSO for different Web applications.
Involved in work flows, self registration and sub-flows creation for OAM.
4. Implementation: Oracle Identity and Access Management
Client Name: BCS Information Systems, Singapore
Label: IDM Security Engineer
Description: The project involved design and implementation of identity integration solution across
all applications and services of the client. The objective was to simplify user administration activities,
reduce complexity, eliminate data redundancies and provide a unified view of user information. Using
Microsoft Active Directory as an identity store for common user data, the solution uses Oracle Identity
Manger to manage user data across applications and cascade changes in 1 application to all other
relevant applications.
Roles & Responsibilities:
User Management: Creation, Adding/Updating resources, Lock/Unlock – Enable/Disable and
deletion of user accounts.
Configuring and managing provisioning to multiple domains in Active Directory.
Managing user provisioning to MS- Active Directory, Sun iPlanet.
Password synchronization between Oracle Identity Manger and AD.
Designing of role/rule based provisioning policies as per Role/Access matrix of the
Organization.
Designing scheduled tasks for user re-conciliation and clean-up exercises.
MS Active Directory and Sun One Directory Server connectors configuration for Integration
with Oracle Identity Manger.
Configuring and customizing self-registration forms.
Participated in weekly IDM support meetings and report to the team/ops manager.
Environment: Oracle Identity Manager, Windows 2003, WebSphere, Oracle 10g, Microsoft Active
Directory and Sun One Directory server.
Company : Sunera Technologies
Label : Software Engineer
---------------------------------------------------------------------------------------------------------------------------
Designed and developed a viable, interactive Internet Site residing on a Unix server using Front Page,
HTML,DHTML, CSS, Jquery, Java Script, ASP.NET. Duties included 24 hour support along with
user training. Developed and Coded an interactive Visual Basic application to edit and post updated
HTML pages to the web for those without the expertise to do so. Also developed an interactive web
site designed to dynamically display jobs posted by authorized users. Functionality included an on-line
application for searching current job openings.
Roles and Responsibilities:
Analysis and design of the application.
Design and develop web sites from concept to completion, including post production site
maintenance
Developed UI to add, update and delete resources using HTML, DHTML and style sheets.
Developed business logic routines
Client side validation is done using JavaScript
Developed COM classes for encryption/decryption of data
Input screens for Adding users on different platforms using ASP.NET
Developed classes for authentication and input validation
Configuration of IIS for load balance
SMTP configuration for mail delivering