SlideShare a Scribd company logo
Company	
  presenta-on	
  
Olivier	
  Naveau	
  
Managing	
  Director	
  
2
Our	
  history	
  of	
  IAM	
  
3
Access	
  control	
  is	
  on	
  top	
  of	
  priority	
  list!	
  
As	
  stated	
  by	
  Deloi.e	
  in	
  their	
  GFSI	
  Security	
  Survey,	
  top	
  
external	
  audit	
  findings	
  are	
  about	
  excessive	
  access	
  rights,	
  
segrega>on	
  of	
  du>es	
  and	
  access	
  control	
  compliance.	
  
h.p://www.deloi.e.com/gfsi/securitysurvey	
  
4
Why	
  access	
  control	
  remains	
  difficult?	
  
Who are my users?
What do they have access to?
Are these accesses legitimate?
Objectives
Landscape
Business applications are developed in
silos. IAM implies horizontal integration.
Multiplication of # of users and
of # of applications.
Evolving landscape: cloud, mobile, social,
compliance, liability
Iden-ty	
  &	
  Access	
  Management	
  
	
  
A	
  structured	
  approach	
  
6
Structured	
  approach	
  of	
  Iden-ty	
  &	
  Access	
  Mgmt	
  
1.  Data	
  model	
  
2.  Func>ons	
  &	
  Processes	
  
3.  Key	
  components	
  
4.  Business	
  values	
  
6
7
1.	
  Data	
  model:	
  administer	
  IAM	
  data	
  
Identity data
•  Identities
•  Attributes
(contractual status, dates, job description,
location)
•  Manager
•  Organization
•  Accounts
Access data
•  Business roles
•  Technical roles (or profiles)
•  Applications
•  Entitlements
•  Policies (or access rights)
(who, what, what for, condition)
Activity data
•  Authentication requests
•  Access requests
•  Changes to Identity data
•  Changes to Access data
8
1.	
  Data	
  model:	
  the	
  power	
  of	
  Brainwave	
  
9
2.	
  Iden-ty	
  &	
  Access	
  Management	
  processes	
  
Administer	
  
IAM	
  data	
  
Access	
  (or	
  use)	
  
IAM	
  data	
  
Control	
  
IAM	
  data	
  
Access
data
Identity
data
Authenticate
Authorize
Federate
Analyse
Audit
Comply
10
2.	
  Iden-ty	
  &	
  Access	
  Management	
  processes	
  
Administer	
  
IAM	
  data	
  
Access	
  (or	
  use)	
  
IAM	
  data	
  
Control	
  
IAM	
  data	
  
...	
  is	
  the	
  construc>on	
  phase	
  of	
  iden>ty,	
  and	
  subsequently	
  
providing	
  it	
  with	
  a	
  "personality"	
  by	
  assigning	
  a.ributes,	
  
en>tlements,	
  creden>als.	
  It	
  provides	
  the	
  create/maintain/
re>re	
  capabili>es	
  of	
  IAM.	
  Administra>on	
  also	
  provides	
  the	
  
plaPorm	
  for	
  intelligence:	
  a	
  means	
  to	
  make	
  sense	
  of	
  the	
  
iden>ty	
  and	
  access	
  events.	
  	
  
...	
  serves	
  as	
  a	
  founda>onal	
  plaPorm	
  to	
  facilitate	
  
authen>ca>on	
  and	
  authoriza>on,	
  and	
  the	
  capabili>es	
  within	
  
them,	
  from	
  single	
  sign-­‐on	
  to	
  en>tlements	
  resolu>on	
  and	
  
enforcement	
  of	
  access	
  decisions.	
  Access	
  is	
  the	
  "engine"	
  of	
  
IAM	
  that	
  takes	
  iden>>es	
  and	
  their	
  informa>on	
  and	
  uses	
  
them	
  to	
  effect.	
  
... generates reports for auditors, provides real-time
monitoring for operations and delivers the analytics
necessary for analysts and business stakeholders to
make intelligent, actionable decisions in the business
and in IT.
11
Techno-
logies
3.	
  Key	
  components	
  
ProcessesPeople
rely	
  on	
  support	
  
sustain	
  
Cendio®
ThinLinc
®
12
4.	
  Business	
  values:	
  iden-fy	
  and	
  measure	
  KPIs	
  
KPIs	
  
Efficiency	
  	
  
of	
  opera>ons	
  
Effec>veness	
  
of	
  security	
  
Enablement	
  
of	
  business	
  
Iden-ty	
  &	
  Access	
  Management	
  
	
  
Iden-ty	
  Intelligence	
  
	
  
Virtual	
  Desktop	
  Infrastructure	
  
	
  
	
  
	
  
Paradigmo’s	
  proposal	
  
14
Paradigmo’s	
  proposal	
  is	
  process	
  based	
  
Administer*
IAM*data*
Access*(or*use)*
IAM*data*
Control*
IAM*data*
Cendio®
ThinLinc
®
Boost**
user*mobility*
15
Account
Administer	
  
IAM	
  data	
  
The	
  theory	
  
Rules
Roles
Requests
Attributes
Actions
Objects
Policies
Conditions
Role management Policy management
16
File Share
Active Directory
Microsoft
Applica>ons	
  
Human	
  resources	
  
Signaletic
Attributes
Coarse-grained
Fine-grained
User	
  form	
  (C,U,D)	
  
Access	
  form	
  
Mandates	
  
Administer	
  
IAM	
  data	
  
A	
  standard	
  use	
  case	
  
Databases	
  
Profiles
17
PAP
Policy Manager:
-  Applications
-  Roles
-  URLs
-  Business Transactions
-  Conditions
-  Coarse-grained access matrix
-  Fine-grained access matrix
Corporate	
  
LDAP	
  
Mandates	
  
FAS
AUributes	
  
AUributes	
  
Mandates	
  
Roles	
  
Scope:
~140 internal applications
~30 external applications
Policies	
  	
  
ac-va-on	
  
Administer	
  
IAM	
  data	
  
Policy	
  Manager	
  
18
Applica-on	
  
Roles	
  (LDAP	
  filter)	
  
Coarse	
  
grained	
  
matrix	
  
URL	
  
Allow	
  
Deny	
  
Condi>on	
  (LDAP	
  filter)	
  
Roles	
  (LDAP	
  filter)	
  
Fine	
  
grained	
  
matrix	
  
BT	
  
Allow	
  
Deny	
  
Condi>on	
  (LDAP	
  filter)	
  
<URL,	
  [GET|POST]>	
  
<Resource,	
  Ac-on>	
  
Administer	
  
IAM	
  data	
  
ABAC	
  implementa-on	
  
Scope:
~140 internal applications
~30 external applications
19
Access	
  (or	
  use)	
  
IAM	
  data	
  
Identity
Provider
(IDP)
Service
Provider
(SP)
Applica>ons	
  
Concepts	
  
20
Why	
  ForgeRock?	
  
ü All-­‐in-­‐one	
  Unified	
  
Open	
  Iden>ty	
  Stack	
  
ü Easy	
  to	
  install	
  and	
  to	
  
operate:	
  one	
  single	
  process	
  
delivers	
  all	
  func>ons	
  
ü Simple	
  and	
  scalable	
  	
  
to	
  cope	
  with	
  Internet	
  scale	
  
ü Simple	
  and	
  flexible	
  
to	
  cope	
  with	
  new	
  concepts	
  
ü Support	
  and	
  extensibility	
  
capabili>es	
  (developer	
  
friendly)	
  
ü Subscrip>on	
  model,	
  no	
  
cost	
  un>l	
  Enterprise	
  build	
  
is	
  use	
  in	
  produc>on	
  
Administer*
IAM*data*
Access%(or%use)%
IAM%data%
21
FedICT	
  delivers	
  Federal	
  Authen>ca>on	
  Service	
  (FAS),	
  the	
  
reference	
  public	
  IDP	
  service	
  in	
  Belgium,	
  based	
  on	
  OpenAM.	
  
FPS	
  Finance	
  delivers	
  AuthN,	
  AuthZ	
  &	
  SSO	
  of	
  internal	
  (~140)	
  
and	
  external	
  (~30)	
  applica>ons	
  based	
  on	
  OpenSSO.	
  
Toyota	
  implemented	
  AuthN	
  &	
  AuthZ	
  of	
  “things”	
  on	
  OpenAM.	
  
For	
  internal	
  apps,	
  the	
  migra>on	
  is	
  ongoing.	
  	
  
Luxair	
  provides	
  AuthN,	
  AuthZ	
  &	
  SSO	
  for	
  home-­‐developed	
  
applica>ons	
  using	
  OpenAM.	
  	
  
BNP	
  PIP	
  uses	
  OpenDJ	
  to	
  provide	
  central	
  authen>ca>on	
  of	
  
Unix	
  administrators	
  and	
  users.	
  	
  
Clinique	
  Saint-­‐Luc	
  provides	
  AuthN,	
  AuthZ	
  &	
  SSO	
  of	
  
commercial	
  applica>ons	
  using	
  OpenAM.	
  	
  
Why	
  ForgeRock?	
  
Administer*
IAM*data*
Access%(or%use)%
IAM%data%
22
Use	
  cases	
  Control'
IAM'data'
Who are my users?
What do they have access to?
Are these accesses legitimate?
How do I communicate
on the role structure of
my organization?
How do I clean
up data before an
IAM deployment?
23
ü Control	
  oriented	
  approach:	
  it	
  
rebuilds	
  the	
  AM	
  theore>cal	
  model	
  
from	
  <accounts,	
  en>tlements>	
  
ü Low	
  footprint	
  on	
  organiza>on:	
  it	
  
applies	
  ETL	
  method	
  for	
  data	
  
loading	
  
ü Data	
  model	
  is	
  complete	
  and	
  
agnos>c	
  
ü BI	
  principles	
  applied	
  to	
  Iden>ty	
  for	
  
online	
  inves>ga>ons	
  or	
  repor>ng	
  
ü Full	
  history	
  built	
  through	
  
successive	
  snapshots	
  
Ø Quickly	
  delivers	
  concrete	
  results	
  
Why	
  Brainwave?	
  Control'
IAM'data'
D
a
t
a
24
ü Provide	
  a	
  feature-­‐rich	
  VDI	
  infrastructure	
  at	
  an	
  op>mized	
  cost	
  
ü Provide	
  fast	
  hot-­‐desking.	
  Typically,	
  nurses	
  in	
  hospitals	
  and	
  
clinics	
  
ü Support	
  remote	
  sites	
  or	
  home	
  workers	
  
ü Implement	
  ‘BYOD’	
  projects	
  
ü Support	
  advanced	
  graphics	
  
ü Op>mize	
  performance	
  of	
  Java	
  applica>ons	
  (when	
  there	
  are	
  
network	
  latencies)	
  
ü Support	
  Windows	
  and	
  Linux	
  desktops	
  
ü Lower	
  noise	
  level	
  in	
  training	
  rooms	
  
ü Secure	
  sterile	
  environments	
  
Boost%%
user%mobility%
	
  Use	
  cases	
  
25
Desktop(
access(
Desktop(
management(
Desktop(
virtualisa3on(
Cendio®
ThinLinc
®
•  IGEL thin client
(Windows or Linux)
•  IGEL UDC (Desktop converter)
•  IGEL UMS (Mgmt suite)
•  HW: Card reader, WIFI
•  SW: PowerTerm, Codec
•  All included in purchase price
•  Desktop and application virtualization
•  Session server, fast hot-desking support
•  Mixed Windows and Linux desktop
support
•  Advanced Graphics support
•  Optimized network performance
•  Concurrent licensing, subscription model
Boost%%
user%mobility%
Innova-ve	
  and	
  cost	
  effec-ve	
  solu-on	
  
26
Project	
  objec>ves	
  
	
  
ü Replace	
  1200	
  desktops	
  
whilst	
  op>mizing	
  costs	
  
ü Support	
  current	
  business	
  
requirements,	
  including	
  
hot-­‐desking	
  for	
  nurses	
  
ü Build	
  capacity	
  to	
  ease	
  
future	
  deployments	
  
ü Support	
  emerging	
  
concepts	
  (mobile,	
  cloud…)	
  
Project	
  achievements	
  
	
  
Ø IGEL	
  Thin	
  Client	
  +	
  IGEL	
  UDC	
  
+	
  IGEL	
  UMS	
  
	
  
Ø IGEL	
  /	
  Cendio	
  ThinLinc	
  /	
  
Smartcard	
  integra>on	
  
	
  
Ø Windows	
  2012	
  TS	
  server	
  
farm	
  
Ø Cendio	
  ThinLinc	
  mul>-­‐
client,	
  network	
  op>mized	
  
technology	
  	
  
Boost%%
user%mobility%
Reference	
  deployment:	
  
27
	
  
	
  
	
  
	
  
	
  
Olivier	
  Naveau	
  
Managing	
  Director	
  
	
  
olivier.naveau@paradigmo.com	
  
Ques-ons	
  &	
  answers	
  

More Related Content

What's hot

Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
NetIQ
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
Prof. Jacques Folon (Ph.D)
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
Dell World
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
Vandana Verma
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
Network Intelligence India
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
Bibhuti Kr Jha +91-9810016292
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Enterprise Management Associates
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
ForgeRock
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
Jerod Brennen
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Global Online Trainings
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
Intel IT Center
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
IBM Security
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
Veritis Group, Inc
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notes
edwinlorenzana
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
John Bauer
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
Evolveum
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Jack Forbes
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
pmcbrideva1
 

What's hot (20)

Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notes
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case2013 12 18 webcast - building the privileged identity management business case
2013 12 18 webcast - building the privileged identity management business case
 

Similar to Paradigmo specialised in Identity & Access Management

Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAE
securitysytem
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
Elasticsearch
 
Qwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica
 
Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014
learPriority
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DNUG e.V.
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Sutedjo Tjahjadi
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
jeffirby
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
IBM Security
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Micro Focus
 
Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...
Judy Breedlove
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
Ivanti
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilities
shaun_raghavan
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
shaun_raghavan
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
Infosec Train
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
Christine Ackley
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
eG Innovations
 
Session 2023-11.pptx
Session 2023-11.pptxSession 2023-11.pptx
Session 2023-11.pptx
AndreeaTom
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
vikasraina
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
GaryArdito
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
RapidValue
 

Similar to Paradigmo specialised in Identity & Access Management (20)

Access Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAEAccess Control time attendence, Biometrics UAE
Access Control time attendence, Biometrics UAE
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Qwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di QlikQwerty Informatica - Soluzioni a portata di Qlik
Qwerty Informatica - Soluzioni a portata di Qlik
 
Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilities
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
 
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix PerformanceHow to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
How to Avoid the Top 7 Mistakes Made When Managing Citrix Performance
 
Session 2023-11.pptx
Session 2023-11.pptxSession 2023-11.pptx
Session 2023-11.pptx
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 

Recently uploaded

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Paradigmo specialised in Identity & Access Management

  • 1. Company  presenta-on   Olivier  Naveau   Managing  Director  
  • 3. 3 Access  control  is  on  top  of  priority  list!   As  stated  by  Deloi.e  in  their  GFSI  Security  Survey,  top   external  audit  findings  are  about  excessive  access  rights,   segrega>on  of  du>es  and  access  control  compliance.   h.p://www.deloi.e.com/gfsi/securitysurvey  
  • 4. 4 Why  access  control  remains  difficult?   Who are my users? What do they have access to? Are these accesses legitimate? Objectives Landscape Business applications are developed in silos. IAM implies horizontal integration. Multiplication of # of users and of # of applications. Evolving landscape: cloud, mobile, social, compliance, liability
  • 5. Iden-ty  &  Access  Management     A  structured  approach  
  • 6. 6 Structured  approach  of  Iden-ty  &  Access  Mgmt   1.  Data  model   2.  Func>ons  &  Processes   3.  Key  components   4.  Business  values   6
  • 7. 7 1.  Data  model:  administer  IAM  data   Identity data •  Identities •  Attributes (contractual status, dates, job description, location) •  Manager •  Organization •  Accounts Access data •  Business roles •  Technical roles (or profiles) •  Applications •  Entitlements •  Policies (or access rights) (who, what, what for, condition) Activity data •  Authentication requests •  Access requests •  Changes to Identity data •  Changes to Access data
  • 8. 8 1.  Data  model:  the  power  of  Brainwave  
  • 9. 9 2.  Iden-ty  &  Access  Management  processes   Administer   IAM  data   Access  (or  use)   IAM  data   Control   IAM  data   Access data Identity data Authenticate Authorize Federate Analyse Audit Comply
  • 10. 10 2.  Iden-ty  &  Access  Management  processes   Administer   IAM  data   Access  (or  use)   IAM  data   Control   IAM  data   ...  is  the  construc>on  phase  of  iden>ty,  and  subsequently   providing  it  with  a  "personality"  by  assigning  a.ributes,   en>tlements,  creden>als.  It  provides  the  create/maintain/ re>re  capabili>es  of  IAM.  Administra>on  also  provides  the   plaPorm  for  intelligence:  a  means  to  make  sense  of  the   iden>ty  and  access  events.     ...  serves  as  a  founda>onal  plaPorm  to  facilitate   authen>ca>on  and  authoriza>on,  and  the  capabili>es  within   them,  from  single  sign-­‐on  to  en>tlements  resolu>on  and   enforcement  of  access  decisions.  Access  is  the  "engine"  of   IAM  that  takes  iden>>es  and  their  informa>on  and  uses   them  to  effect.   ... generates reports for auditors, provides real-time monitoring for operations and delivers the analytics necessary for analysts and business stakeholders to make intelligent, actionable decisions in the business and in IT.
  • 11. 11 Techno- logies 3.  Key  components   ProcessesPeople rely  on  support   sustain   Cendio® ThinLinc ®
  • 12. 12 4.  Business  values:  iden-fy  and  measure  KPIs   KPIs   Efficiency     of  opera>ons   Effec>veness   of  security   Enablement   of  business  
  • 13. Iden-ty  &  Access  Management     Iden-ty  Intelligence     Virtual  Desktop  Infrastructure         Paradigmo’s  proposal  
  • 14. 14 Paradigmo’s  proposal  is  process  based   Administer* IAM*data* Access*(or*use)* IAM*data* Control* IAM*data* Cendio® ThinLinc ® Boost** user*mobility*
  • 15. 15 Account Administer   IAM  data   The  theory   Rules Roles Requests Attributes Actions Objects Policies Conditions Role management Policy management
  • 16. 16 File Share Active Directory Microsoft Applica>ons   Human  resources   Signaletic Attributes Coarse-grained Fine-grained User  form  (C,U,D)   Access  form   Mandates   Administer   IAM  data   A  standard  use  case   Databases   Profiles
  • 17. 17 PAP Policy Manager: -  Applications -  Roles -  URLs -  Business Transactions -  Conditions -  Coarse-grained access matrix -  Fine-grained access matrix Corporate   LDAP   Mandates   FAS AUributes   AUributes   Mandates   Roles   Scope: ~140 internal applications ~30 external applications Policies     ac-va-on   Administer   IAM  data   Policy  Manager  
  • 18. 18 Applica-on   Roles  (LDAP  filter)   Coarse   grained   matrix   URL   Allow   Deny   Condi>on  (LDAP  filter)   Roles  (LDAP  filter)   Fine   grained   matrix   BT   Allow   Deny   Condi>on  (LDAP  filter)   <URL,  [GET|POST]>   <Resource,  Ac-on>   Administer   IAM  data   ABAC  implementa-on   Scope: ~140 internal applications ~30 external applications
  • 19. 19 Access  (or  use)   IAM  data   Identity Provider (IDP) Service Provider (SP) Applica>ons   Concepts  
  • 20. 20 Why  ForgeRock?   ü All-­‐in-­‐one  Unified   Open  Iden>ty  Stack   ü Easy  to  install  and  to   operate:  one  single  process   delivers  all  func>ons   ü Simple  and  scalable     to  cope  with  Internet  scale   ü Simple  and  flexible   to  cope  with  new  concepts   ü Support  and  extensibility   capabili>es  (developer   friendly)   ü Subscrip>on  model,  no   cost  un>l  Enterprise  build   is  use  in  produc>on   Administer* IAM*data* Access%(or%use)% IAM%data%
  • 21. 21 FedICT  delivers  Federal  Authen>ca>on  Service  (FAS),  the   reference  public  IDP  service  in  Belgium,  based  on  OpenAM.   FPS  Finance  delivers  AuthN,  AuthZ  &  SSO  of  internal  (~140)   and  external  (~30)  applica>ons  based  on  OpenSSO.   Toyota  implemented  AuthN  &  AuthZ  of  “things”  on  OpenAM.   For  internal  apps,  the  migra>on  is  ongoing.     Luxair  provides  AuthN,  AuthZ  &  SSO  for  home-­‐developed   applica>ons  using  OpenAM.     BNP  PIP  uses  OpenDJ  to  provide  central  authen>ca>on  of   Unix  administrators  and  users.     Clinique  Saint-­‐Luc  provides  AuthN,  AuthZ  &  SSO  of   commercial  applica>ons  using  OpenAM.     Why  ForgeRock?   Administer* IAM*data* Access%(or%use)% IAM%data%
  • 22. 22 Use  cases  Control' IAM'data' Who are my users? What do they have access to? Are these accesses legitimate? How do I communicate on the role structure of my organization? How do I clean up data before an IAM deployment?
  • 23. 23 ü Control  oriented  approach:  it   rebuilds  the  AM  theore>cal  model   from  <accounts,  en>tlements>   ü Low  footprint  on  organiza>on:  it   applies  ETL  method  for  data   loading   ü Data  model  is  complete  and   agnos>c   ü BI  principles  applied  to  Iden>ty  for   online  inves>ga>ons  or  repor>ng   ü Full  history  built  through   successive  snapshots   Ø Quickly  delivers  concrete  results   Why  Brainwave?  Control' IAM'data' D a t a
  • 24. 24 ü Provide  a  feature-­‐rich  VDI  infrastructure  at  an  op>mized  cost   ü Provide  fast  hot-­‐desking.  Typically,  nurses  in  hospitals  and   clinics   ü Support  remote  sites  or  home  workers   ü Implement  ‘BYOD’  projects   ü Support  advanced  graphics   ü Op>mize  performance  of  Java  applica>ons  (when  there  are   network  latencies)   ü Support  Windows  and  Linux  desktops   ü Lower  noise  level  in  training  rooms   ü Secure  sterile  environments   Boost%% user%mobility%  Use  cases  
  • 25. 25 Desktop( access( Desktop( management( Desktop( virtualisa3on( Cendio® ThinLinc ® •  IGEL thin client (Windows or Linux) •  IGEL UDC (Desktop converter) •  IGEL UMS (Mgmt suite) •  HW: Card reader, WIFI •  SW: PowerTerm, Codec •  All included in purchase price •  Desktop and application virtualization •  Session server, fast hot-desking support •  Mixed Windows and Linux desktop support •  Advanced Graphics support •  Optimized network performance •  Concurrent licensing, subscription model Boost%% user%mobility% Innova-ve  and  cost  effec-ve  solu-on  
  • 26. 26 Project  objec>ves     ü Replace  1200  desktops   whilst  op>mizing  costs   ü Support  current  business   requirements,  including   hot-­‐desking  for  nurses   ü Build  capacity  to  ease   future  deployments   ü Support  emerging   concepts  (mobile,  cloud…)   Project  achievements     Ø IGEL  Thin  Client  +  IGEL  UDC   +  IGEL  UMS     Ø IGEL  /  Cendio  ThinLinc  /   Smartcard  integra>on     Ø Windows  2012  TS  server   farm   Ø Cendio  ThinLinc  mul>-­‐ client,  network  op>mized   technology     Boost%% user%mobility% Reference  deployment:  
  • 27. 27           Olivier  Naveau   Managing  Director     olivier.naveau@paradigmo.com   Ques-ons  &  answers