SlideShare a Scribd company logo
1 of 29
Download to read offline
Identity Management for the 21st
Century IT Mission
Presented By:
• Paul Grassi: VP of Federal Programs, Sila Solutions Group
• Jim Rice: VP of Federal, Layer 7
• Dieter Schuller: VP of Business Development, Radiant Logic
• Gerry Gebel: President, Axiomatics Americas
• Phil McQuitty: Director of Systems Engineering, SailPoint
• Stephanie McVitty: Account Manager, Compsec
Wednesday: August 14, 2013
• Today’s Challenges
• History: How Did We Get Here?
• The Evolution of Access Control
• Building Blocks for Agile Access
• Creating a Framework for Success
• The Ideal ABAC Process
• Use Case Deep Dive
• Next Steps: Are You ABAC-Ready?
Key Discussion Areas
2
Today’s Challenges
3
• We keep trying to solve a legacy problem
with a legacy solution
• Made authorization an IT solution, not a
business solution
• Bogged down with stovepipes, multiple
policies, and poorly defined infrastructure
• Focused on the door – not the data
We have made great progress!
Industry deserves credit.
Examples of NSTIC/IDESG, NIST 800-162 Draft,
FICAM AAES work; focus on
attributes and confidence scores
• Yet, we’ve done some amazing things
How Did We Get Here?
4
Legacy Problem with Better Solution
Legacy Problem with Legacy Solution
The Evolution of Access Control
PBAC
REUSABLE POLICY
CONTEXT AWARE
EXTERNALIZED
STANDARDS BASED
BUSINESS DRIVEN
NON-TECHNICAL
Future Proofed Business Solution
ABAC
FINE GRAINED
ATTRIBUTE-DRIVEN
LOCAL POLICY
PROPRIETARY ENFORCEMENT
TECHNICAL
eRBACRBACACLIBAC
5
Action
Reusable
Policy
Agile
Access
Decisions
Agile
Access
Decisions
Federated
Identity
Federated
Attributes
Environment
Context
Resource
Attributes
Building Blocks for Agile Access
6
PROGRAMMATIC AND TECHNICAL MANAGEMENT
Portability,
Confidence,
and Trusted
Attributes
Access
Anywhere
Mobility/
Cloud
Lifecycle,
Governance
and Risk
Mission
Agility
ABAC Framework
7
Layer 7 Overview
8
Applications &
Data
Enterprise
…
Outside Partners /
Divisions
External
Developers
Mobile Apps
Cloud Services
Other Things
Layer 7 API Gateways Provide API Access Control for the New “Open” Enterprise
Enterprises are Exposing More
Connectivity & Security
Challenges for Open
Enterprise:
• Protection of applications
exposed over internet
• Reuse of information shared
across departments,
partners, mobile & Cloud
• Ease of integration:
reconciling disparate
identity, data types,
standards, services
• Federated & Delegated
Security
• Performance optimization
(caching, protocol
compression, …)
• Brokering cloud services
• Proxy connections to social,
cloud, notification services
that enterprises can control
• Cloud interactions
• Central governance of
policies and security
Mobile / Tablet Apps
Web Platform Integration Open APIs for Developer Channel
Private Cloud Annexes
(Savvis or Datacenter)
Cloud Services
Over the Top TV and Media
(Xbox Live and Smart TV)
Real-time Partner
Integration
Login
Password
This new open, extended enterprise is a hybrid enterprise
because it blends inside/outside as well as private/pubic
9
Layer 7 Policy Approach
API Integration Gateway
API Service Manager
API Identity & Access Broker
API Developer Portal
Health Tracking
Workflow
Performance Global Staging Developer
Enrollment
API Docs
Forums
API Explorer
RankingsQuotas
Plans
AnalyticsReporting
Config Migration
Patch Management Policy Migration
Throttling Prioritization Caching
Routing Traffic ControlTransformation
Security
Composition
Authentication Single Sign OnAPI KeysEntitlements
Token Service OAuth 1.x OAuth 2.0 OpenID Connect
10
Layer 7 ABAC Reference Implementation
11
RadiantOne Architecture
• A Federated Identity Service through Model-Driven
Virtualization
• Provides all functions of a complete AAES service
• Abstraction layer
• Platform consists of advanced Virtual Directory Server (VDS),
Identity Correlation and Synchronization (ICS), and Cloud
Federation Service (CFS)
12
RadiantOne Key Capabilities
LDAP Directory
Active Directory
HR Database
employeeNumber=2
samAcountName=Andrew_Fuller
objectClass=user
mail: andrew_fuller@setree1.com
uid=AFuller
title=VP Sales
ClearanceLevel=1
Region=PA
memberOf=Sales
Correlated Identity Virtual View
employeeNumber=2
samAccountName=Andrew_Fuller
objectClass=user
mail: andrew_fuller@setree1.com
departmentNumber=234
uid=AFuller
title=VP Sales
givenName=Andrew
sn=Fuller
departmentNumber=234
EmployeeID=509-34-5855
ClearanceLevel=1
Region=PA
UserID=EMP_Andrew_Fuller
DeptID=Sales234
cn=Sales
objectClass=group
member=Andrew_Fuller
**Based on identities that have:
• ClearanceLevel=1
• title=VP Sales
• Region=PA
Dynamic Groups Virtual View
User Lookup
Attribute
Server
13
Manage
Policy Administration
Point
Decide
Policy Decision Point
Support
Policy Information Point
Policy Retrieval Point
Enforce
Policy Enforcement Point
Axiomatics Architecture
14
Authorization at Any Layer
15
Anywhere Authorization Architecture
16
SailPoint Architecture
Service Desk
Integration
Resource
Connectors
Provisioning
Integration
Security &
Activity
Unified Governance Platform
Open Connectivity Foundation
Cloud SaaS
Role
Model
Policy
Model
Identity
Warehouse
Risk
Model Workflow
Password
Management
Compliance
Management
Single
Sign-On
Identity
Analytics
SailPoint ICAM Solutions
Access
Request &
Provisioning
17
Entitlement Giving Attributes
HR
Data
Security
Directory
Attributes
Ownership
Relationships
Modeling
Review Process
Change
Process
Audit Process
System
System
Target
Target
BUSINESS PROCESS
MANAGEMENT
Entitlement
Giving
Attributes
18
Ownership &
Responsibility
Change
Control
Versioning
History
Verification &
Review
Analytics &
Reporting
Identity &
Access
Governance
The Business Process
of IAM Data Management
Entitlement Giving Attributes…
HR
Data
Security
Directory
Attributes
System
System
Target
Target
Entitlement
Giving
Attributes
19
Benefits
Policy management
and insight available to
all levels of the
organization.
Simple
Change
Management
Maximum
Efficiency
and
Flexibility
Range of
Deployment
Options
Simple and
Effective
Management
Cost
Effective
Scalable
Interoperable
Business-
Friendly
Management
Increased
Access to
Information
Deploy for performance
and architectural needs
while maintaining 100%
conformance with open
standards
Easy to deploy new
policy without
underlying changes to
application
infrastructure.
Eliminate time
consuming and
confusing processes to
gain access to
information.
Benefits of
Our Solution
Increased
Security and
Compliance
Operational Business
20
Access barriers are removed so users can get their jobs done more efficiently.
The Ideal Process
21
High Level Use Cases
Patient can manage record
from authorized personal devices
Doctor can read from office computer
Opts-in and authorizes PCP and staff to view
Claims
coordinator
can only view
appointment
information
Doctor can write to
entire record
Nurse can read
information
pertaining to
location; can only
write demographic
info, symptoms,
and vital signs
Receptionist trained in HIPAA data protection
can only view services performed
Research organization can only read
anonymized cardiac clinical data from
hospitals and patients that opt-in
1
3
2
4
5
6
Nurse can “break the glass” to
access location agnostic
information
22
AuthN
Services
Secure
Gateway
Conceptual Architecture
EHR Systems
FederatedIdentityVirtualization
Policy
Administration
R&D
Insurance
Governance
ProviderViewR&DViewInsuranceViewPatientView
NPI
Registry
Patients
Attribute Sources
Policy Server
Hospital
23
Intercepts
the request
Patient Use Case
Attempts to update personal EHR to
add blood pressure (BP) information
and opt-in to share info with doctor
Allows Patient
Access to EHR
System
Patient EHR
Preferences
/Metadata
Signed Opt-
In Forms
Permit
Check
request
validity
Verify patient access
using registered device
Verify accessing own
record
Request/receive required attributes
(EHR owner, authorized devices)
List of
registered
devices
Check if
authorized
Update BP
Authorize doctor to access information
1
2
4
3
24
Doctor Use Case
Attempts to update patient
EHR from office computer
Intercepts
the request
Allows doctor
access to
patient EHR
Patient EHR
Preferences
/Metadata
Signed Opt-
In Forms
Permit
Check
access from
office
computer
Check if
authorized
Verify patient opt-in
List of
signed
opt-in
forms
Hospital
Network EHR
Check
request
validity
1
2
Request/receive required attributes
(EHR owner, authorized devices)
3
4
25
Remaining Use Cases
Use Case Request Layer 7 Axiomatics Radiant Logic EHR
Nurse Rheumatology nurse
requests access to
patient EHR
•Checks request
location/validity
•Checks PDP for
authorization
•Validates nurse/patient
relationship
•Allows access to specific
attributes of patient EHR
Provide nurse
and patient
attributes to
PDP
Allows nurse access to
read patient
rheumatology
attributes of EHR; write
diagnostics
“Break Glass” Nurse requests access
to patient cardiac
information when
patient shows heart
attack symptoms
•Checks request
validity
•Checks PDP for
authorization
•Validates environmental
attributes from hospital
•Validates nurse/patient
relationship
Provide
Hospital, Nurse
and Patient
attributes to
PDP
Allows Nurse access to
read Rheumatology
and Cardiac attributes
of EHR, write
diagnostics
Reception Reception requests
access to patient
services to prepare bill
•Checks request
location/validity
•Checks PDP for
authorization
•Validates employee
HIPAA training
•Validates
employee/patient
relationship
Provide
employee and
patient
attributes to
PDP
Allows help desk
access only to services
performed
Insurance Insurance claims
processor requests
access to patient EHR
•Checks request
location/validity
•Checks PDP for
authorization
•Validate processor
employment with
insurance company
•Validate covered incident
•Validate
insurance/patient
relationship
Provide
processor,
patient, and
insurance
attributes to
PDP
Allows claims
processor access only
to covered incident
information
Research &
Development
Cardiovascular
research center
requests access to all
cardiology patient data
•Authenticates
R&D server
•Checks PDP for
authorization
•Validate research center
and scope
•Provides SQL PEP to
filter result set and return
anonymous data
Provide
employee and
research center
attributes to
PDP
Allows employee
access only to
anonymized data
pertaining to research
center scope
26
Health Care Systems Attribute and Policy Governance
Entitlement
Giving
Attributes
Functional
Application
#1
Functional
Application
#2
doc
doc
Ownership &
Responsibility
Change
Control
Provision
Verification &
Review
Analytics
Identities, certified entitlements & risk scores would be
used at the PIP and PDP to make smarter decisions
Axiomatics Policy Server
Axiomatics Policy Auditor
Governance Use Case
27
• Establish Governance
• Choose your standards
• Determine your attributes and metadata
• Determine your authoritative sources
• Create a taxonomy and data dictionary
• Understand your business processes
• Determine the business model
• Decide who will own policy/policy management
• Coordinate with stakeholders across organization, including
audit/compliance, privacy, and security operations
• Track performance
Are You Ready?
28
Questions?
29

More Related Content

What's hot

Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Sirius
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor AuthenticationRonnie Isherwood
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewITJobZone.biz
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 

What's hot (20)

Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
 
Domain 2 - Asset Security
Domain 2 - Asset SecurityDomain 2 - Asset Security
Domain 2 - Asset Security
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 

Viewers also liked

Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersAndrew Ames
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trinings
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities ForgeRock
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Open authentication (oauth)
Open authentication (oauth)Open authentication (oauth)
Open authentication (oauth)Michael Maurice
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...CA Technologies
 
Melbourne API Management Seminar
Melbourne API Management SeminarMelbourne API Management Seminar
Melbourne API Management SeminarCA API Management
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Networks, cloud & operator innovation- Mats Alendal
Networks, cloud & operator innovation- Mats AlendalNetworks, cloud & operator innovation- Mats Alendal
Networks, cloud & operator innovation- Mats AlendalEricsson
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Cross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCA API Management
 
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld
 
SCIM 2.0 - Choose your own identity adventure
SCIM 2.0 - Choose your own identity adventureSCIM 2.0 - Choose your own identity adventure
SCIM 2.0 - Choose your own identity adventureKelly Grizzle
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM Patrick Harding
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CloudIDSummit
 
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORMIdentity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORMForgeRock
 
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...ForgeRock
 

Viewers also liked (20)

Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Open authentication (oauth)
Open authentication (oauth)Open authentication (oauth)
Open authentication (oauth)
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
 
Melbourne API Management Seminar
Melbourne API Management SeminarMelbourne API Management Seminar
Melbourne API Management Seminar
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Networks, cloud & operator innovation- Mats Alendal
Networks, cloud & operator innovation- Mats AlendalNetworks, cloud & operator innovation- Mats Alendal
Networks, cloud & operator innovation- Mats Alendal
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Cross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San Francisco
 
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
 
SCIM 2.0 - Choose your own identity adventure
SCIM 2.0 - Choose your own identity adventureSCIM 2.0 - Choose your own identity adventure
SCIM 2.0 - Choose your own identity adventure
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
 
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORMIdentity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
 
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
 

Similar to Identity Management for the 21st Century IT Mission

Tackle healthcare interoperability challenges and improve transitions of care v3
Tackle healthcare interoperability challenges and improve transitions of care v3Tackle healthcare interoperability challenges and improve transitions of care v3
Tackle healthcare interoperability challenges and improve transitions of care v3Perficient, Inc.
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a ServiceDenodo
 
Seattle Code Camp 2016- Role of Data Science in HHealthcare
Seattle Code Camp 2016- Role of Data Science in HHealthcareSeattle Code Camp 2016- Role of Data Science in HHealthcare
Seattle Code Camp 2016- Role of Data Science in HHealthcareRuba Qaqish
 
Seattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareSeattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareRuba Qaqish
 
MuleSoft Singapore Meetup - Number 6 - September 24, 2020
MuleSoft Singapore Meetup - Number 6 - September 24, 2020MuleSoft Singapore Meetup - Number 6 - September 24, 2020
MuleSoft Singapore Meetup - Number 6 - September 24, 2020Julian Douch
 
How to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop ComplianceHow to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop ComplianceForgeRock
 
Seattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareSeattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareCalance
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial ServicesCloudera, Inc.
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008Denny Lee
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Best Software Development Company |Salesforce Consulting Services in Singapor...
Best Software Development Company |Salesforce Consulting Services in Singapor...Best Software Development Company |Salesforce Consulting Services in Singapor...
Best Software Development Company |Salesforce Consulting Services in Singapor...InfoDrive Solutions
 
Security Software Datasheet Template
Security Software Datasheet TemplateSecurity Software Datasheet Template
Security Software Datasheet TemplateTDSmaker
 
Week sleek portfolio
Week sleek portfolioWeek sleek portfolio
Week sleek portfolioAkhil Kurup
 
Diaspark Healthcare Technology Services
Diaspark Healthcare Technology ServicesDiaspark Healthcare Technology Services
Diaspark Healthcare Technology ServicesDiaspark
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore
 
Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014learPriority
 
[WSO2Con EU 2017] WHO CARES? A WSO2 Cloud Oriented Reference Architecture for...
[WSO2Con EU 2017] WHO CARES? A WSO2 Cloud Oriented Reference Architecture for...[WSO2Con EU 2017] WHO CARES? A WSO2 Cloud Oriented Reference Architecture for...
[WSO2Con EU 2017] WHO CARES? A WSO2 Cloud Oriented Reference Architecture for...WSO2
 
Seattle code camp 2016 - Role of Data Science in Healthcare
Seattle code camp 2016  - Role of Data Science in HealthcareSeattle code camp 2016  - Role of Data Science in Healthcare
Seattle code camp 2016 - Role of Data Science in HealthcareGaurav Garg
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps.com
 
Week2sleek portfolio
Week2sleek portfolioWeek2sleek portfolio
Week2sleek portfolioAkhil Kurup
 

Similar to Identity Management for the 21st Century IT Mission (20)

Tackle healthcare interoperability challenges and improve transitions of care v3
Tackle healthcare interoperability challenges and improve transitions of care v3Tackle healthcare interoperability challenges and improve transitions of care v3
Tackle healthcare interoperability challenges and improve transitions of care v3
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a Service
 
Seattle Code Camp 2016- Role of Data Science in HHealthcare
Seattle Code Camp 2016- Role of Data Science in HHealthcareSeattle Code Camp 2016- Role of Data Science in HHealthcare
Seattle Code Camp 2016- Role of Data Science in HHealthcare
 
Seattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareSeattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in Healthcare
 
MuleSoft Singapore Meetup - Number 6 - September 24, 2020
MuleSoft Singapore Meetup - Number 6 - September 24, 2020MuleSoft Singapore Meetup - Number 6 - September 24, 2020
MuleSoft Singapore Meetup - Number 6 - September 24, 2020
 
How to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop ComplianceHow to Deliver Closed-Loop Compliance
How to Deliver Closed-Loop Compliance
 
Seattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareSeattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in Healthcare
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Best Software Development Company |Salesforce Consulting Services in Singapor...
Best Software Development Company |Salesforce Consulting Services in Singapor...Best Software Development Company |Salesforce Consulting Services in Singapor...
Best Software Development Company |Salesforce Consulting Services in Singapor...
 
Security Software Datasheet Template
Security Software Datasheet TemplateSecurity Software Datasheet Template
Security Software Datasheet Template
 
Week sleek portfolio
Week sleek portfolioWeek sleek portfolio
Week sleek portfolio
 
Diaspark Healthcare Technology Services
Diaspark Healthcare Technology ServicesDiaspark Healthcare Technology Services
Diaspark Healthcare Technology Services
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
 
Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014
 
[WSO2Con EU 2017] WHO CARES? A WSO2 Cloud Oriented Reference Architecture for...
[WSO2Con EU 2017] WHO CARES? A WSO2 Cloud Oriented Reference Architecture for...[WSO2Con EU 2017] WHO CARES? A WSO2 Cloud Oriented Reference Architecture for...
[WSO2Con EU 2017] WHO CARES? A WSO2 Cloud Oriented Reference Architecture for...
 
Seattle code camp 2016 - Role of Data Science in Healthcare
Seattle code camp 2016  - Role of Data Science in HealthcareSeattle code camp 2016  - Role of Data Science in Healthcare
Seattle code camp 2016 - Role of Data Science in Healthcare
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Week2sleek portfolio
Week2sleek portfolioWeek2sleek portfolio
Week2sleek portfolio
 

More from CA API Management

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 

More from CA API Management (20)

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Identity Management for the 21st Century IT Mission

  • 1. Identity Management for the 21st Century IT Mission Presented By: • Paul Grassi: VP of Federal Programs, Sila Solutions Group • Jim Rice: VP of Federal, Layer 7 • Dieter Schuller: VP of Business Development, Radiant Logic • Gerry Gebel: President, Axiomatics Americas • Phil McQuitty: Director of Systems Engineering, SailPoint • Stephanie McVitty: Account Manager, Compsec Wednesday: August 14, 2013
  • 2. • Today’s Challenges • History: How Did We Get Here? • The Evolution of Access Control • Building Blocks for Agile Access • Creating a Framework for Success • The Ideal ABAC Process • Use Case Deep Dive • Next Steps: Are You ABAC-Ready? Key Discussion Areas 2
  • 4. • We keep trying to solve a legacy problem with a legacy solution • Made authorization an IT solution, not a business solution • Bogged down with stovepipes, multiple policies, and poorly defined infrastructure • Focused on the door – not the data We have made great progress! Industry deserves credit. Examples of NSTIC/IDESG, NIST 800-162 Draft, FICAM AAES work; focus on attributes and confidence scores • Yet, we’ve done some amazing things How Did We Get Here? 4
  • 5. Legacy Problem with Better Solution Legacy Problem with Legacy Solution The Evolution of Access Control PBAC REUSABLE POLICY CONTEXT AWARE EXTERNALIZED STANDARDS BASED BUSINESS DRIVEN NON-TECHNICAL Future Proofed Business Solution ABAC FINE GRAINED ATTRIBUTE-DRIVEN LOCAL POLICY PROPRIETARY ENFORCEMENT TECHNICAL eRBACRBACACLIBAC 5
  • 7. PROGRAMMATIC AND TECHNICAL MANAGEMENT Portability, Confidence, and Trusted Attributes Access Anywhere Mobility/ Cloud Lifecycle, Governance and Risk Mission Agility ABAC Framework 7
  • 8. Layer 7 Overview 8 Applications & Data Enterprise … Outside Partners / Divisions External Developers Mobile Apps Cloud Services Other Things Layer 7 API Gateways Provide API Access Control for the New “Open” Enterprise
  • 9. Enterprises are Exposing More Connectivity & Security Challenges for Open Enterprise: • Protection of applications exposed over internet • Reuse of information shared across departments, partners, mobile & Cloud • Ease of integration: reconciling disparate identity, data types, standards, services • Federated & Delegated Security • Performance optimization (caching, protocol compression, …) • Brokering cloud services • Proxy connections to social, cloud, notification services that enterprises can control • Cloud interactions • Central governance of policies and security Mobile / Tablet Apps Web Platform Integration Open APIs for Developer Channel Private Cloud Annexes (Savvis or Datacenter) Cloud Services Over the Top TV and Media (Xbox Live and Smart TV) Real-time Partner Integration Login Password This new open, extended enterprise is a hybrid enterprise because it blends inside/outside as well as private/pubic 9
  • 10. Layer 7 Policy Approach API Integration Gateway API Service Manager API Identity & Access Broker API Developer Portal Health Tracking Workflow Performance Global Staging Developer Enrollment API Docs Forums API Explorer RankingsQuotas Plans AnalyticsReporting Config Migration Patch Management Policy Migration Throttling Prioritization Caching Routing Traffic ControlTransformation Security Composition Authentication Single Sign OnAPI KeysEntitlements Token Service OAuth 1.x OAuth 2.0 OpenID Connect 10
  • 11. Layer 7 ABAC Reference Implementation 11
  • 12. RadiantOne Architecture • A Federated Identity Service through Model-Driven Virtualization • Provides all functions of a complete AAES service • Abstraction layer • Platform consists of advanced Virtual Directory Server (VDS), Identity Correlation and Synchronization (ICS), and Cloud Federation Service (CFS) 12
  • 13. RadiantOne Key Capabilities LDAP Directory Active Directory HR Database employeeNumber=2 samAcountName=Andrew_Fuller objectClass=user mail: andrew_fuller@setree1.com uid=AFuller title=VP Sales ClearanceLevel=1 Region=PA memberOf=Sales Correlated Identity Virtual View employeeNumber=2 samAccountName=Andrew_Fuller objectClass=user mail: andrew_fuller@setree1.com departmentNumber=234 uid=AFuller title=VP Sales givenName=Andrew sn=Fuller departmentNumber=234 EmployeeID=509-34-5855 ClearanceLevel=1 Region=PA UserID=EMP_Andrew_Fuller DeptID=Sales234 cn=Sales objectClass=group member=Andrew_Fuller **Based on identities that have: • ClearanceLevel=1 • title=VP Sales • Region=PA Dynamic Groups Virtual View User Lookup Attribute Server 13
  • 14. Manage Policy Administration Point Decide Policy Decision Point Support Policy Information Point Policy Retrieval Point Enforce Policy Enforcement Point Axiomatics Architecture 14
  • 17. SailPoint Architecture Service Desk Integration Resource Connectors Provisioning Integration Security & Activity Unified Governance Platform Open Connectivity Foundation Cloud SaaS Role Model Policy Model Identity Warehouse Risk Model Workflow Password Management Compliance Management Single Sign-On Identity Analytics SailPoint ICAM Solutions Access Request & Provisioning 17
  • 18. Entitlement Giving Attributes HR Data Security Directory Attributes Ownership Relationships Modeling Review Process Change Process Audit Process System System Target Target BUSINESS PROCESS MANAGEMENT Entitlement Giving Attributes 18
  • 19. Ownership & Responsibility Change Control Versioning History Verification & Review Analytics & Reporting Identity & Access Governance The Business Process of IAM Data Management Entitlement Giving Attributes… HR Data Security Directory Attributes System System Target Target Entitlement Giving Attributes 19
  • 20. Benefits Policy management and insight available to all levels of the organization. Simple Change Management Maximum Efficiency and Flexibility Range of Deployment Options Simple and Effective Management Cost Effective Scalable Interoperable Business- Friendly Management Increased Access to Information Deploy for performance and architectural needs while maintaining 100% conformance with open standards Easy to deploy new policy without underlying changes to application infrastructure. Eliminate time consuming and confusing processes to gain access to information. Benefits of Our Solution Increased Security and Compliance Operational Business 20
  • 21. Access barriers are removed so users can get their jobs done more efficiently. The Ideal Process 21
  • 22. High Level Use Cases Patient can manage record from authorized personal devices Doctor can read from office computer Opts-in and authorizes PCP and staff to view Claims coordinator can only view appointment information Doctor can write to entire record Nurse can read information pertaining to location; can only write demographic info, symptoms, and vital signs Receptionist trained in HIPAA data protection can only view services performed Research organization can only read anonymized cardiac clinical data from hospitals and patients that opt-in 1 3 2 4 5 6 Nurse can “break the glass” to access location agnostic information 22
  • 24. Intercepts the request Patient Use Case Attempts to update personal EHR to add blood pressure (BP) information and opt-in to share info with doctor Allows Patient Access to EHR System Patient EHR Preferences /Metadata Signed Opt- In Forms Permit Check request validity Verify patient access using registered device Verify accessing own record Request/receive required attributes (EHR owner, authorized devices) List of registered devices Check if authorized Update BP Authorize doctor to access information 1 2 4 3 24
  • 25. Doctor Use Case Attempts to update patient EHR from office computer Intercepts the request Allows doctor access to patient EHR Patient EHR Preferences /Metadata Signed Opt- In Forms Permit Check access from office computer Check if authorized Verify patient opt-in List of signed opt-in forms Hospital Network EHR Check request validity 1 2 Request/receive required attributes (EHR owner, authorized devices) 3 4 25
  • 26. Remaining Use Cases Use Case Request Layer 7 Axiomatics Radiant Logic EHR Nurse Rheumatology nurse requests access to patient EHR •Checks request location/validity •Checks PDP for authorization •Validates nurse/patient relationship •Allows access to specific attributes of patient EHR Provide nurse and patient attributes to PDP Allows nurse access to read patient rheumatology attributes of EHR; write diagnostics “Break Glass” Nurse requests access to patient cardiac information when patient shows heart attack symptoms •Checks request validity •Checks PDP for authorization •Validates environmental attributes from hospital •Validates nurse/patient relationship Provide Hospital, Nurse and Patient attributes to PDP Allows Nurse access to read Rheumatology and Cardiac attributes of EHR, write diagnostics Reception Reception requests access to patient services to prepare bill •Checks request location/validity •Checks PDP for authorization •Validates employee HIPAA training •Validates employee/patient relationship Provide employee and patient attributes to PDP Allows help desk access only to services performed Insurance Insurance claims processor requests access to patient EHR •Checks request location/validity •Checks PDP for authorization •Validate processor employment with insurance company •Validate covered incident •Validate insurance/patient relationship Provide processor, patient, and insurance attributes to PDP Allows claims processor access only to covered incident information Research & Development Cardiovascular research center requests access to all cardiology patient data •Authenticates R&D server •Checks PDP for authorization •Validate research center and scope •Provides SQL PEP to filter result set and return anonymous data Provide employee and research center attributes to PDP Allows employee access only to anonymized data pertaining to research center scope 26
  • 27. Health Care Systems Attribute and Policy Governance Entitlement Giving Attributes Functional Application #1 Functional Application #2 doc doc Ownership & Responsibility Change Control Provision Verification & Review Analytics Identities, certified entitlements & risk scores would be used at the PIP and PDP to make smarter decisions Axiomatics Policy Server Axiomatics Policy Auditor Governance Use Case 27
  • 28. • Establish Governance • Choose your standards • Determine your attributes and metadata • Determine your authoritative sources • Create a taxonomy and data dictionary • Understand your business processes • Determine the business model • Decide who will own policy/policy management • Coordinate with stakeholders across organization, including audit/compliance, privacy, and security operations • Track performance Are You Ready? 28