Inventy
What does it mean to
OPTIMIZE the user
lifecycle?
INVENTY
April 2015 – SAP Security 360° Service
Have you ever had serious
difficulties in obtaining
computer rights ?
I HAVE !
Application
Form
Search for
permissions
and accounts
Add to the
request
Validate
request
Provisioning
and details
Monitoring
request and
notifications
Operational
accounts and
permissions
EASY! A simple 7 step process…
Requesting IT access rights for a normal user ?
But reality is oftendifferent …
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
Each step requires coordination
of unclear sub processes involving multiple actors ...
At Inventy,
we OPTIMIZE and SECURE the user lifecycle
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
Optimization
Zone
S
S
S
S
C
C
S
S
S
S
S
C
C
S
with SAP Identity & Access Governance,
each step is modeled and automated in IDM & GRC …
S
C
Simple automated action
.
Complex action natively integrated
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
…integrated data flows accelerate AUDITS
and reduce maintenance costs
Integrated data flow
.
I
I
I
I
I
I
I
I
I
Validate
request
Application
form
Search for
permissions
and accounts
Add to the
request
Provisioning and
details
Monitoring
request and
notifications
Operational
accounts and
permissions
By profiles and
by users
Security Validation /
Authorization catalog
exposure
Adding partial
roles
Requests
by user
copy
Manager
validation
Compliance
validation
Provisioning
Return code from
target applications
User email
Initial password
change
Connection
validation
Automatic
additions by HR
Profile
Person in
charge
validation
I
I
I
Add to the
request
Provisioning and
details
Operational
accounts and
permissions
By profiles and
by users
Return code from
target applications
Initial password
change
Connection
validation
Person in
charge
validation
Our commitment ?
A simple user experience
A COMPLIANT process with a low cost
Application
form
Search for
permissions
and accounts
Validate
request
Monitoring
request and
notifications
Adding partial
roles
Requests
by user
copy
Automatic
additions by HR
Profile
Manager
validation Provisioning
Security Validation /
Authorization catalog
exposure
Compliance
validation
User email
April 2015
Inventy
François Michel – francois.michel@inventy.ca - 514-804-2333
Odette Scully – odette.scully@inventy.ca – 514-972-7245
www.inventy.com
Contact us to learn more
We would love to hear
more from you!

What does it mean to optimize the user lifecycle ?

  • 1.
    Inventy What does itmean to OPTIMIZE the user lifecycle? INVENTY April 2015 – SAP Security 360° Service
  • 2.
    Have you everhad serious difficulties in obtaining computer rights ?
  • 3.
  • 4.
    Application Form Search for permissions and accounts Addto the request Validate request Provisioning and details Monitoring request and notifications Operational accounts and permissions EASY! A simple 7 step process… Requesting IT access rights for a normal user ?
  • 5.
    But reality isoftendifferent … Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions
  • 6.
    Validate request Application form Search for permissions and accounts Addto the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation Each step requires coordination of unclear sub processes involving multiple actors ...
  • 7.
    At Inventy, we OPTIMIZEand SECURE the user lifecycle Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation Optimization Zone
  • 8.
    S S S S C C S S S S S C C S with SAP Identity& Access Governance, each step is modeled and automated in IDM & GRC … S C Simple automated action . Complex action natively integrated Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation
  • 9.
    …integrated data flowsaccelerate AUDITS and reduce maintenance costs Integrated data flow . I I I I I I I I I Validate request Application form Search for permissions and accounts Add to the request Provisioning and details Monitoring request and notifications Operational accounts and permissions By profiles and by users Security Validation / Authorization catalog exposure Adding partial roles Requests by user copy Manager validation Compliance validation Provisioning Return code from target applications User email Initial password change Connection validation Automatic additions by HR Profile Person in charge validation I I I
  • 10.
    Add to the request Provisioningand details Operational accounts and permissions By profiles and by users Return code from target applications Initial password change Connection validation Person in charge validation Our commitment ? A simple user experience A COMPLIANT process with a low cost Application form Search for permissions and accounts Validate request Monitoring request and notifications Adding partial roles Requests by user copy Automatic additions by HR Profile Manager validation Provisioning Security Validation / Authorization catalog exposure Compliance validation User email
  • 11.
    April 2015 Inventy François Michel– francois.michel@inventy.ca - 514-804-2333 Odette Scully – odette.scully@inventy.ca – 514-972-7245 www.inventy.com Contact us to learn more We would love to hear more from you!