Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from...

22
Introducing Identity DONGa Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

Transcript of Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from...

Page 1: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

Introducing Identity“DONG” a Case from Antiquity.

Jon Colombo,20 October 2004

Client orPartner logo

Page 2: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

1

AimsPracticalities…

People/Process/Technology Balance

Identity Management Session 3 –Case Study

MethodCase Study

Page 3: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

2

Background ...

Politics ...

Model …

Pitfalls…

Lessons

Introduction

Page 4: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

3

Date ...

Industry…

Greenfield ...

Location

Background - Situation

Page 5: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

4

Background - Aims

Centralise Administration ...

Kill Dangerous Rights Combos ...

A Foundation for Log Analysis

Database

Of

Names &

Groups

Database

Of

Names &

Groups

Database

Of

Names &

Groups

Page 6: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

5

Number of Systems ...

Resources ...

State of Market …

Politics

Background - Constraints

Page 7: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

6

Background ...

Politics ...

Model …

Pitfalls…

Lessons

Introduction

Page 8: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

7

Politics - Constraints

Those who want to stop you...

Those who want you to do their job.…

Page 9: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

8

Politics - Role Based Access Control

# Users

Role Complexity

IdealIdeal NormalNormal Us!Us!

Cost

Page 10: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

9

Vision!

Politics Counters

Sponsor(s)

Friends ...

Momentum ...

Governance…

Accountants

Page 11: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

10

Introduction

Background ...

Politics ...

Model …

Pitfalls…

Lessons

Identity Management Session 3 –Introduction

Page 12: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

11

Model

Accounts and Profiles that SHOULD

be there

Accounts and Profiles that ACTUALLYare there

AUTHORISATIONDATA

Records from Administrators

Application Forms

REMOVALDATAHR Records

Door Swipes

Help-Desk

SYSTEMS DATA

SuppliersBureaux

PartnersOperating Systems

Applications

Service Providers

RECONCILE

Page 13: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

12

Background ...

Politics ...

Model …

Pitfalls…

Lessons

Introduction

Page 14: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

13

Pitfalls –People Records

Processes•Leaving Dates•Contract Negotiations

Leavers InformationTrust

Definition of Staff

Page 15: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

14

Pitfalls - Fun With Names

Same NamesName ChangersReturneesPoor TypingPoor Hearing

Acronyms

Page 16: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

15

Pitfalls –System Mapping

Depth of ModelSemanticsAdministration StandardsGeneric AccountsRecycling/ConventionsInheritanceEvolution

Page 17: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

16

Pitfalls - Operation

Transmission NegotiationTime DependenceTransmission Hiccups•Files Disappear•Updates Stop•Get Reformatted•Content Changes

Sequences

Page 18: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

17

Background ...

Politics ...

Model …

Pitfalls…

Lessons

Introduction

Page 19: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

18

Lessons - Philosophy

Automate … but incrementallyReport errors only onceBe prepared to throw work away

Adapt to Environment, not Vice Versa

Page 20: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

19

Lessons - Applied

AgentsDirty DataSchedulerMeta-layersAnomaliesJournalingAutomate Housekeeping

Page 21: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

October 2004 -© 2004 Capgemini - All rights reserved

20

Background ...

Wrap-up

Politics ………

Model ………..

Pitfalls………..

Lessons … ….

Page 22: Introducing Identity DONG a Case from Antiquity. · Introducing Identity “DONG” a Case from Antiquity. Jon Colombo, 20 October 2004 Client or Partner logo

www.capgemini.com