|
|
Identity Management |
|
|
|
|
|
Single Sign-On (SSO) technology allows an organization to centralize the authentication and authorization responsibilities. The following are some features and benefits of implementing SSO.
Separate Authentication and authorization responsibilities
Centralized authentication/authorization
Simplifies business application development
Users can use one single login password
Reduces support time and lost productivity due to forgotten password, password resets, time to obtain access to resources/applications
|
Whether you are a novice or a veteran in deploying security services and SSO for an enterprise, we can assist in
Planning and assessing your needs
Architecting a solution that will meet your requirements
Deploying necessary components
Setting up operational procedures and training
Troubleshooting deployments and performance tuning
Open SSO
|
In the current business environment, non-core functions are outsourced to organizations that specialize in such functions. This helps organizations concentrate on the core business functions to achieve growth and efficiency. This posed another problem of integrating partner provided applications into the organization. Identity Federation is one such process that can effectively simplify the authentication/authorization of access to partner applications based on the identity verification by an organization.
SSO with partner applications
Integrate partner hosted applications into your organization
Eliminate the need to re-host partner applications in your infrastructure
Easily federate identity across organizations
Reduced number of applications to support
Reduced learning curve to support vendor/partner applications.
|
Identity federation involves a large number of moving parts and a good understanding is necessary to implement it without compromising the security of your user base. For a successful deployment of a federation solution, you can obtain one or more of our following services.
Governance, Risk and Compliance (GRC)
Identify partner authentication choices
Co-ordinate with partner resources and deploy solution
Identify user attributes for federation without compromising security
Evaluate risk of federation
Bulk and on-demand federation
|
Identity Provisioning/ De-provisioning |
With Sarbanes-Oxley act, it has become critical to implement data security measures that reduce unauthorized access to applications. A large number of terminated users exist in any organization with more than a few applications. The following are some features and benefits of Identity provisioning and de-provisioning system.
Centralizes user provisioning, de-provisioning
Automated or workflow (approval) based processes to activate/de-activate accounts
Authoritative source can trigger automated user provisioning/de-provisioning
Audit processes used for account creation
Better control on users and application access
Fast track on-boarding process for new employees
Immediate access restriction for terminated employees
Integrated with SSO
|
Identity provisioning / de-provisioning requires some business process re-engineering. Effectively identifying authoritative sources, analyzing and defining authoritative sources, automated and approval based work flows is the key to successful implementation.
Authoritative source(s) identification
Co-relation rule development
Work flow requirement identification and development
Role and user attribute provisioning to databases, Directories, and ERP systems
Customized adapter development
Integrate with SSO for authentication and access authorization
Auditing requirements and reporting
|
|
|
|
|
|
|
|
|
|
|
:: News :: |
|
|
|