DOC PREVIEW
SJSU CS 265 - Identity Management

This preview shows page 1-2-3-4-5-6 out of 17 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Identity Management, what does it solveAgendaIntroductionSecurity IssuesBusiness IssuesBenefits of Identity ManagementFeatures of Identity ManagementIdentity ManagementArchitectureAuthorization/AuthenticationProvisioningAccess ControlAuditingSingle Sign OnFederated IdentityConclusionQ & AIdentity Management,what does it solve By Gautham MudraAgendaIntroductionSecurity and Business IssuesBenefits of Identity ManagementArchitectureFeatures of Identity ManagementConclusionQ & AIntroductionIdentity Management is all about Authorization/ AuthenticationAccess ControlAuditingUser ProvisioningSingle Sign OnSecurity IssuesTypically the users have to remember 15-20 passwords. Consequently they either choose easy to crack passwords or even worse write it down on piece of paper.Each application implements its own security modules which might be weak.Denying access to a user for all the applications when he quits the organization.Distribution of information and access control based on their identity.Business IssuesSome industry analysts estimate that as much as 60 percent of help desk calls arePassword related.Password resets are estimated by analysts to cost between $30 and $60 per call.Delays in workflow processes to enable a new employee work status.Bad user experience through multiple required login.Benefits of Identity ManagementReduce administration, Help desk and technical support costsProvide competitive advantage through enabling automation and streamlining workflow.Improve customer and employee serviceconfidentiality of customers, suppliers, and employeesReduce time taken to enable new employees to get access to required resources within the organizationReduce risk of ex-employees retaining access to organizational resourcesData IntegrityFeatures of Identity ManagementIdentity ManagementArchitectureAuthorization/AuthenticationProvisioningAccess ControlCommercial products offer Role Based Access ControlImplement Multi layer and Multi lateral security models.Access Control based on roles assigned to users.AuditingLogging information for the administratorSmart Auditing systems can implement a simple IDSDetects brute force password attacks.Single Sign On2 CategoriesSingle sign on into all the applications with in the enterpriseFederated IdentityFederated IdentityConclusionIdentity Management is a rapidly evolving market. Its not an off the shelf product but needs lot of customization. Implementation of these solutions is very difficultBut it’s very promising and if rightly implemented will reap lot of security and business benefits.Q &


View Full Document

SJSU CS 265 - Identity Management

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Identity Management
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Identity Management and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Identity Management 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?