identity and access management dustin puryear sr. consultant, puryear it, llc [email protected]

36
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC [email protected] http://www.puryear-it.com/

Upload: marvin-golden

Post on 24-Dec-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Identity and Access Management

Dustin PuryearSr. Consultant, Puryear IT, [email protected]://www.puryear-it.com/

Page 2: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Objectives

Find a common background for discussing IAM

Discuss problems and opportunities in the field

Introduce terminology Highlight a possible future direction

Page 3: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Session Agenda

Today’s Problems Making It All Better Now What? Viva La Resistance! Puryear IT

Page 4: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

This Presentation

This presentation was written with audit/compliance in mind.

Contact [email protected] to have Dustin Puryear present this topic to your organization or company.

Page 5: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Today’s Problems

Page 6: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Who am I? Who are you?

Networks use multiple identity systems

The Internet is no better Users get confused with all of these

IDs Management and audit has difficulty

keeping track of all these IDs The bad guys are quite happy

Page 7: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

So many IDs!

Person

Active DirectoryAccount

Online HR InfoAccount

PeopleSoft UserAccount

Page 8: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Multiple Contexts

Remote Employees

Suppliers

PartnersCustomers

Employees

Page 9: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Trends Regulation and Compliance

SOX, HIPAA, GLB

Increasing Threats Identity theft Exposure of confidential info

Maintenance Costs The average employee needs access to 16

applications Companies spend an estimated $20-30

user/year for password resets

Page 10: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

The Real Impact

End-users Too many IDsToo many passwordsMust wait for access to applications

Administrators Too many IDsToo many end-user requestsDifficult or unreliable ways to syncs all the accounts

Audit/Compliance Orphaned accountsLimited or no audit capabilityWhere are the audit trails?

Page 11: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Making It All Better

Page 12: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Identity and Access Management

RoleManagement

Authorization

Audits &Reporting

Directories

UserProvisioning

PasswordManagement

IAM

Page 13: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

The Benefits of IAM

Save money Improve operational efficiency Reduce time to deliver applications

and services Enhance security Enhance regulatory compliance Give more power to audit

Page 14: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Let’s Define IAM Terms Authentication (AuthN)

Verify that a person is who they claim to be This is where multi-factor authentication comes

into play Identification and authentication are related but

not the same Authorization (AuthZ)

Deciding what resources can be accessed/used by a user

Accounting Charges you for what you do

Page 15: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

IAM is a FoundationIdentity Management Account Provisioning &

DeprovisioningSynchronisation

Administration User ManagementPassword ManagementWorkflowDelegationAudit and Reporting

Access Management AuthN AuthZ

Page 16: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Now What?

Page 17: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Implement IAM!

Start Slow! Define your Single Source of Truth

(SSOT) Unfortunately, there may be more than

one, if that makes sense.. Implement the “big wins”

User provisioning to Active Directory Password resets

Page 18: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

But How? SSOT

Work with your team, IT, and management to determine the true source of user information

User Provisioning to AD It’s already happening! Solutions

Microsoft ILM CA eTrust Admin Sun IM …

Page 19: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

The Results!

User provisioning can be automated Password resets can be delegated to

the helpdesk And the big one:

You can now audit both the user provisioning and password resets

Page 20: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

The Next Step

Extend User Provisioning To PeopleSoft Lawson Oracle Custom/in-house applications

Begin consolidating user directories Can you point some or all of your

applications at AD or LDAP?

Page 21: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Authorization

This is the hard one! Applications define their AuthZ rules

differently Try to consolidate to an AD/LDAP

authz landscape Tackle this one application at a time!

Page 22: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

The Power is Yours

You can now audit/review: Who has what accounts? Why do they have those accounts? Who approved those accounts? Are there any orphaned accounts? Who has access to what? For how long have they had that access?

Page 23: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

And there is more..

You can control access to your web-enabled applications using a Web Access Manager (WAM)

Don’t forget about SSO! What about federated identities and

your partners and suppliers?

Page 24: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Viva La Resistance!

Page 25: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

IT Resistence

Sometimes IT resist a formalized IAM process because: “We are too busy” “We can’t afford it” “We don’t want to give up control!”

Page 26: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

“We are Too Busy”

This is a common response IT is too busy..

Because they are resetting passwords all day

Working too hard to create accounts Learning too late that orphaned accounts

are being misused/attacked

Page 27: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

“We Can’t Afford It”

There are small and big solutions to this problem

If you are an AD-only shop with minimal applications, then you can start small

Larger enterprises have no choice, they can’t afford not to!

Page 28: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

“We Don’t Want to Give Up Control!”

This is usually the root of the disagreement.

They are responsible for IT They don’t want problems in IAM to

reflect poorly on them They are used to the control, even if

it’s not necessary

Page 29: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

A Compromise

Take control without giving up control!

A middle-ground: IAM solutions can be used to explore

user directories/databases Reports can be generated IT can still do the provisioning itself

Page 30: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Summary

Page 31: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Summary

It’s becoming impossible to manage all of these accounts and rights by hand

You can automate controls You can automate audit reports You can control THE PROCESS!

Page 32: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Who We Are? Puryear IT is THE IAM specialist in Louisiana We help small and large companies,

ranging from 100 users to well over 20,000+ users

We are vendor-agnostic, and have worked with everyone, including: Microsoft CA Sun

Page 33: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

We Can Help IT to..

Help you tackle your IAM needs Integrate Linux, UNIX, and J2EE into

Active Directory Build out AAA solutions Deploy Microsoft ILM, Sun IM, Novell

IM, and CA IM Deploy small and large solutions

Page 34: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

We Can Help Audit/Compliance to..

Build an automated user account and access rights tracking solution

Log changes to user accounts and access rights

Ensure passwords are changed as policies and regulations require

Help you communicate your needs to IT

Automate your manual tasks

Page 35: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Doing IAM Right Puryear uses a methodical approach

to: Identify organization pain points Identify organization audit requirements Work with IT and audit to prioritize needs Develop an initial pilot deployment Roll out the final solution Help you manage and extend the

solution

Page 36: Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC dustin@puryear-it.com

Dustin PuryearSr. Consultant, Puryear IT, LLC

[email protected]://www.puryear-it.com/