280 likes | 538 Views
Using Identity Virtualization and Integration to Enable Web Access Management A CA SiteMinder and Virtual Directory Case Study. November 20, 2008. Agenda. About CA Business Vision Issues and Business Drivers Project and Components Details Performance, Scalability, and High Availability
E N D
Using Identity Virtualization and Integration to Enable Web Access ManagementA CA SiteMinder and Virtual Directory Case Study November 20, 2008
Agenda • About CA • Business Vision • Issues and Business Drivers • Project and Components • Details • Performance, Scalability, and High Availability • Key Factors • Results • Architecture • Solution Components • Identity Virtualization and Integration • The Problem • What is Needed • The Technical Details • Inventory each source • Build an identity hub • Publish views • Conclusion • Recommendations
CA: At-a-Glance • Company Overview: • 29 years successfully delivering software & services to optimize IT performance • 30k+ customers; 1k+ where CA works with and/or supports SAP landscape • 5th largest independent software vendor • 4.4bn LTM billings; 3.4bn LTM revenue • 16bn market capitalization • 700m annual R&D investment • Global Business Transformation Underway • Global Organization: • Headquarters: Islandia, NY • 150+ offices; 15k+ employees; 50% mobile • Technology • 27k+ PCs; 40k+ network devices • 1300+ production servers • Linux, UNIX, Windows • 4 IBM Mainframes, 20+ LPARs, 15k MIPs • 1500+ voice/data circuits • 150+ phone systems • 300+ routers, 465+ switches • 400 TB array storage • Using bespoke & packaged applications • Using Outsourcing and SAAS solutions
Business Goals • Efficiently roll-in newly acquired companies • Quickly provide additional services to expanded customer base • Expedite customer integration reducing confusion and increasing satisfaction • Repeatable framework allowing predictable timeframes and costs
Issues and Business Drivers Issues: • CA Acquired several companies and needed to provide a seamless and integrated experience to our customers. • Internal users use integrated directory • External users stored in external directory or one of several DBS • Multiple support systems, varying platforms, no single architecture Business Drivers • CA’s Support organization invested in a project to unify the CA Customer support experience. • Opportunity to establish a Web Auth solution that could be extended to other applications at CA.
Project and Components 2005 Project Completed • Seamless and integrated customer experience • Customers no longer need to log in multiple times using different IDs and passwords • Employees can access CA Support without additional logon • We now centrally track and administer entitlements • Can change infrastructure without impacting users Systems Integrated • Existing CA (SupportConnect) • Netegrity (Onyx) • Niku (Vantive) • Concord/Prisma (Remedy)
Details Leverage existing investments: • Active Directory • CA Directory, formerly eTrust Directory (LDAP) • Platforms • Windows 2000/2003 • Solaris • Aix • SuSE • Red Hat Enterprise • User Directories • SQL • Oracle • Sybase
Performance, Scalability and High Availability Requirements • High usage and throughput - 100 million user project • A scalable, highly available enterprise environment Cluster to cluster fail over Policy Server to Policy Server failover Agent-to-Policy Server failover Traffic Load Balancing
Performance, Scalability and High Availability Architecture: Note: These values are based on the SiteMinder Hundred Million User (HMU) project in which a series of tests were conducted to demonstrate the performance and scalability of SiteMinder in large scale deployments
Key Factors • Did this… • …without having to make changes to existing systems • …by abstracting what already existed • ..across multiple platforms and architectures • Saved hundreds of thousands of hours of work • Streamlined applications • Mitigated risk associated with changing legacy apps • Improved time to delivery • Established a platform for growth
Solution Components • Radiant Logic RadiantOne Virtual Directory • Correlates and caches authentication and user information from all other user directories • CA SiteMinder • Access control and single sign-on across technical support applications • Legacy Technical Support systems • SAP Portal • Unified front-end presentation layer • Future opportunity to federate application directories ssohelp.com
Identity Virtualization • “Virtualization is occurring at all layers across the IT "stack" — hardware, operating systems, applications, services, processes, presentation layer — even identities. At its core, virtualization is simply a layer of abstraction between a layer of consumers and an underlying layer of providers. However, this simple notion causes powerful shifts in the way that security must be managed and will accelerate the move to externalized identity services” • Neil MacDonald – Gartner Fellow – “Everything You Know About Identity Management Is Wrong”
Identity Integration The Problem: No common identifier across technical support sites btaub@co.com Williamt 1470233 Site 1 Site 2 Site 3
No Single Sign-On ID: btaub@co.com / Pwd: 1234 1. Authenticate to App 1 Application 1 2. User granted access 3. User clicks link for App 3 Application 2 ID: btaub@co.com ? Unable to achieve SSO since App 3 expects ID “williamt” Application 3
What is Needed btaub@co.com Application 1 William Taub Email Application 2 Name + Company ID 1470233 Email + Company Name williamt Application 3 Correlated view of a user across all applications
Technical Requirements • Create a mash-up of technical support sites across four systems and 300,000 identities • Define correlated identity for all users • Make it easy and enticing for customers to help themselves • Replace legacy security infrastructure • Establish platform for future expansion
Identity Integration • Foundation for successful single sign-on (SSO) • Unified view of users across systems • Requires ability to construct correlated identifier (CID) • Security framework leveraging correlated identity store • Leverage identity transformation to create reusable user metadata
Step 1: Correlated User btaub@co.com Correlated identity mapped to each application CID: btaub@co.com williamt 1470233
Step 2: Centralized Security btaub@co.com Single sign-on across technical support sites 1. User authenticates CID: btaub@co.com 2. Credentials validated against correlated identity store 3. Application-specific identity passed to acquired application williamt 1470233
Step 3: Unified Portal btaub@co.com One view of technical support across systems CID: btaub@co.com 1470233 toddclay
Inventory and Translate Each Source into a Common Model and Virtual Namespace
Create an Identity Hub • Only store in the hub the core identity required by the correlation process and the global ID referencing uniquely the matching identities • Retrieve the rest of the attributes on the fly by keeping reference pointers of the underlying identities • Benefits of this approach: • Less information to synchronize • Central repository does not grow up exponentially as more data sources are integrated • Selective approach about which attributes to store to help with data ownership issues and sizing considerations
Conclusion • Technical support systems available through common login and single sign-on • Unified entitlements and system access for customers owning multiple products • Ability to access content regardless of system, improving self-service • Reduced costs and increased security ssohelp.com
Recommendations • Start with an “identity centric” core designed to scale • Leverage and abstract existing systems • Externalize user correlation logic to maximize configuration versus development • Incrementally layer services to systematically build out capabilities ssohelp.com