SlideShare a Scribd company logo
1 of 11
Download to read offline
Intranet implementation
of Identity Manager and
Access Manager
CASE STUDY
Overview
The client is an Indian organisation engaged with
production of Battlefield Equipment. It is the 37th-
largest defence equipment manufacturer in the
world, 2nd largest in Asia, and the largest in India. The
organization consists of a total 41 production units
under the corporate headquarters located in Kolkata.
The organization engages a workforce of about
80,000 thus often called the "Fourth Arm of Defence”,
Its total sales engagement was at US$3 billion
(₹22,389.22 crores) in the year 2020–2021.
Challenge
To maintain extremely high level of security and
meet compliance requirements, the organization
needed to ensure that each of its employees can
only access the systems relevant to their specific
roles.
Fast access providence was needed for new bulk
hired employees, to access the appropriate systems
and resources, in order to avoid delays to the
delivery of vital information to organizations and
individuals.
Challenge
To reduce the risk of highly confidential data being
breached, our client also needed to revoke access
for former staff as soon as their employment ends.
Managing access to all these systems and resources
needed to be customised under one single
umbrella, within a highly secure intranet
environment.
Solution
Intranet implementation of Identity Manager and
Access Manager was done by PITG to meet the
client's needs.
Identity Manager was synchronized with identity
information across multiple directories, creating a
single master identity for each unique onboarded
user and eliminating most of the manual tasks
associated with user management.
Bulk user provisioning was configured through
Identity Provisioning via Connectors.
Solution
After Successful creation of users in Identity
manager, the same was provisioned to target
applications. Which triggered one automated email
to the user's supervisor email ID with a random
password. Users can login to the unified portal and
on first time login it would redirect to Identity
manager Self-service password reset portal to
setup user profile (set security question-answers,
auto- change first time provided password etc.)
Solution
Access manager was integrated with the
applications to ensure protection of the access
while making them conveniently accessible only to
authorized users.
With the capability of Single Sign On, Users were
able to access all of the organizational resources
i.e., email, central document manager etc. as per
their authorities, from one unified intranet portal
name “Comnet.2.0”.
Self Service Password was integrated maintaining
company password policies to enable users to reset
their own passwords.
Result
The successful implementation of the solution, and
the launch of “Comnet 2.0” played a vital role in
enabling the client to meet its identity management
challenges efficiently and effectively
Enhanced Data security: The Identity Manager
provides a unified, real-time view of account
information and access rights across diverse
applications and systems with a completely
automated framework. Thus, highly confidential
data remains secure even within the organization.
Result
Unified user management: Supervisors are easily
able to review their staffs' permission rights, a
single-click 'revoke' triggers automated workflow
that actions this without any further human
intervention. All the user identities are easily
governed over a single unified platform.
Result
Accelerated administration: Automation
accelerates user account administration, reduces
the risk of human error, leveraged to provision
users more quickly freeing up valuable IT resources,
so that they have more time to dedicate to other
value-added tasks.
Follow us for more case studies
Want to exchange ideas on Cybersecurity or know
how ProcessIT Global can help your business?
Contact us at info@processitglobal.com

More Related Content

Similar to Intranet implementation of Identity Manager and Access Manager

Similar to Intranet implementation of Identity Manager and Access Manager (18)

DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Build Your Career With Sailpoint Training.pdf
Build Your Career With Sailpoint Training.pdfBuild Your Career With Sailpoint Training.pdf
Build Your Career With Sailpoint Training.pdf
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notes
 
Identity and Access Management Solutions
Identity and Access Management SolutionsIdentity and Access Management Solutions
Identity and Access Management Solutions
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
 
Benefits of Implementing Digital Asset Management | Sysfore
Benefits of Implementing Digital Asset Management | SysforeBenefits of Implementing Digital Asset Management | Sysfore
Benefits of Implementing Digital Asset Management | Sysfore
 
What is Microsoft Entra ID
What is Microsoft Entra IDWhat is Microsoft Entra ID
What is Microsoft Entra ID
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
IRJET- Customized CRM Mobile Application for Retail Industry
IRJET-  	  Customized CRM Mobile Application for Retail IndustryIRJET-  	  Customized CRM Mobile Application for Retail Industry
IRJET- Customized CRM Mobile Application for Retail Industry
 
Security settings in dynamics 365 customer engagement (crm)
Security settings in dynamics 365 customer engagement (crm)Security settings in dynamics 365 customer engagement (crm)
Security settings in dynamics 365 customer engagement (crm)
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Intranet implementation of Identity Manager and Access Manager

  • 1. Intranet implementation of Identity Manager and Access Manager CASE STUDY
  • 2. Overview The client is an Indian organisation engaged with production of Battlefield Equipment. It is the 37th- largest defence equipment manufacturer in the world, 2nd largest in Asia, and the largest in India. The organization consists of a total 41 production units under the corporate headquarters located in Kolkata. The organization engages a workforce of about 80,000 thus often called the "Fourth Arm of Defence”, Its total sales engagement was at US$3 billion (₹22,389.22 crores) in the year 2020–2021.
  • 3. Challenge To maintain extremely high level of security and meet compliance requirements, the organization needed to ensure that each of its employees can only access the systems relevant to their specific roles. Fast access providence was needed for new bulk hired employees, to access the appropriate systems and resources, in order to avoid delays to the delivery of vital information to organizations and individuals.
  • 4. Challenge To reduce the risk of highly confidential data being breached, our client also needed to revoke access for former staff as soon as their employment ends. Managing access to all these systems and resources needed to be customised under one single umbrella, within a highly secure intranet environment.
  • 5. Solution Intranet implementation of Identity Manager and Access Manager was done by PITG to meet the client's needs. Identity Manager was synchronized with identity information across multiple directories, creating a single master identity for each unique onboarded user and eliminating most of the manual tasks associated with user management. Bulk user provisioning was configured through Identity Provisioning via Connectors.
  • 6. Solution After Successful creation of users in Identity manager, the same was provisioned to target applications. Which triggered one automated email to the user's supervisor email ID with a random password. Users can login to the unified portal and on first time login it would redirect to Identity manager Self-service password reset portal to setup user profile (set security question-answers, auto- change first time provided password etc.)
  • 7. Solution Access manager was integrated with the applications to ensure protection of the access while making them conveniently accessible only to authorized users. With the capability of Single Sign On, Users were able to access all of the organizational resources i.e., email, central document manager etc. as per their authorities, from one unified intranet portal name “Comnet.2.0”. Self Service Password was integrated maintaining company password policies to enable users to reset their own passwords.
  • 8. Result The successful implementation of the solution, and the launch of “Comnet 2.0” played a vital role in enabling the client to meet its identity management challenges efficiently and effectively Enhanced Data security: The Identity Manager provides a unified, real-time view of account information and access rights across diverse applications and systems with a completely automated framework. Thus, highly confidential data remains secure even within the organization.
  • 9. Result Unified user management: Supervisors are easily able to review their staffs' permission rights, a single-click 'revoke' triggers automated workflow that actions this without any further human intervention. All the user identities are easily governed over a single unified platform.
  • 10. Result Accelerated administration: Automation accelerates user account administration, reduces the risk of human error, leveraged to provision users more quickly freeing up valuable IT resources, so that they have more time to dedicate to other value-added tasks.
  • 11. Follow us for more case studies Want to exchange ideas on Cybersecurity or know how ProcessIT Global can help your business? Contact us at info@processitglobal.com