360 likes | 534 Views
TechNet Architectural Design Series Part 5: Identity and Access Management. Gary Williams & Colin Brown Microsoft Consulting Services. Live Meeting Information. Feedback Panel. Questions & Answers. Blog - http://blogs.technet.com/MCSTalks. Session 5: Identity and Access Management .
E N D
TechNet Architectural Design SeriesPart 5: Identity and Access Management Gary Williams & Colin BrownMicrosoft Consulting Services
Live Meeting Information... • Feedback Panel • Questions & Answers • Blog - http://blogs.technet.com/MCSTalks
Session 5: Identity and Access Management Gary Williams – Identity Management Consultant Colin Brown – Security Consultant MCS Talks Infrastructure Architecture
Agenda • Introduction to Identity Terminology • Challenges & Issues • Identity Environment – Fact Finding • Identity Solutions • Products • Architecture • Work Packages • Recommendations
Introduction IDA Terminology • IDA / IAM / IdM • Digital Identity • Credential • Security Principal • Authentication • Identity Store • Identity Synchronisation • Identity Integration Services • Provisioning • Identity Lifecycle Management
Introduction IDA Terminology • Entitlement • Authorisation • Trust • Identity Federation • Security Auditing • Access Services • Digital Certificates • Public Key Infrastructure (PKI) • Certificate Revocation List (CRL) • Encryption
Islands Of ApplicationsHas lead to islands of identities Business Automation Customers (B2C) Company (B2E) Partners (B2B) Mobility Applications Client Server Internet Mainframe # of Digital IDs Time Pre 1980’s 1980’s 1990’s 2000’s
Challenges & IssuesWhy do Identity Management projects fail? • Identity ecosystems develop organically • Fragmented identity infrastructures • One system is added at a time • Applications, Databases, Operating Systems • Each system potentially requires a unique identity repository • Changing organisation perimeter • Credentials often do not cross boundaries • Politics • Product/skillset knowledge
Setting the scene What is it we are trying to achieve? Who I am What can I do Authentication Identity & Access Management : Providing the right people with the right access at the right time Authorisation Identity Store Monitoring/Audit Lifecycle Management / Administration
Identity Environment – Fact Finding • Identity Drivers & requirements • Extend reach and range • Increase scalability • Lowering costs • Balance centralised vs. distributed management • More general purpose & reusable • Product selection must achieve • Business justification • Work against business requirements • Source of truth (authoritative) repository • Main repository & list of other identity repositories • Identity Flow
Identity Environment – Fact Finding • Information Quality • How and where is identity data created • How is it removed, maintained & synchronised • How is data creation, deletion or modification validated • Operational Procedures • Access rights to all systems • Hire / Fire procedures • Department or role changes • Role definition • Separation of duties (admin controls)
Solutions – Planning Think strategically act tactically Phased approach This is generally not a technical problem Business processes Workflow definition An Identity and Access Management solution is a long term engagement
Solutions – Password Management • Reduce credentials to a single password or PIN • Simplify the user experience • Reduce helpdesk overhead • Improve overall security
Solutions – Auditing & Reporting • Record identity related events, such as: • Logon/off • Administrative actions • Object access • In order to be able to: • Reveal potential security problems • Ensure user accountability • Provide evidence
Solutions – Profile Management • Capture or create business process to • Define identity profiles • Associate allowable actions • Delineate self-service and administrative actions
Solutions – Single Sign-On • Provide a single authentication action • In order to • Reduce user authentication events • Reduce authentication stores and associated management overhead
Solutions – Directory Consolidation • Reduce the number of identity repositories • Complexity • Duplication • Administrative overhead
Solutions – Securing Network Services • Provide a strong authentication mechanism • Provide 2 factor authentication • In order to • Secure network services • Provide security services to applications • Provide higher security assurance
Solutions – Securing Network Services Root CA Issuing CA’s Manual Publish Log Shipping Mirroring Load Balancing RA1 SSL Web VPN TS1 SQL2 AD Exchange TS2 SQL1 RA2 Clients
Solutions – Protecting Data Wherever It Goes • Active Directory • Authentication • Service Discovery • Group Membership • SQL Server • Configuration data • Logging • Cache • RMS Server • Certification • Licensing • Templates • MOSS 2007 • Document Libraries with IRM Workstation • Exchange 2007 SP1 • Pre-licensing Fetching
Goals of an IAM Strategy Secure, pervasive, consistent and reliable authentication and authorisation Open standards that allow integration across security boundaries. Reduce cost of managing identities Extending access to applications & files to out of office/mobile users Improve management and maintenance of user identities.
IAM Strategy Recommendations Document IAM infrastructure. Produce fast results Address high risk areas early Increase integration between directory, security and application services Improve capabilities that promote finding organisational data
IAM Strategy Recommendations Most IAM projects are bigger than organisations expect Not all technologies within IAM provide direct benefits though all are necessary for the complete framework Use the proper justification and benefit statements as part of your deployment
Thank you for attending this TechNet Event Visit the blog at: http://blogs.technet.com/mcstalks Register for the next session, Desktop Deployment, at: http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032390854&Culture=en-GB Ihr Potenzial. Unser Antrieb.