Automated identity?

Access & Identity Management Handbook 2011 Access Control & Identity Management

Ugan Naidoo, MD Security, CA Southern Africa discusses how effective service management processes help organisations build a solid IT infrastructure for delivering high quality services.

Identity and access management (IAM) solutions enable companies to manage their users’ identities and associated privileges, while securing access to sensitive resources. Today, these IAM services are generally not available to users within a service management framework, or when they are, they still depend on manual, organisation-specific procedures.

Establishing the user’s identity, role and access rights can involve filling out forms that are then transferred from one department to another to obtain the necessary authorisation. A similar process is followed when an employee’s personnel profile or business role changes or their tenure with the organisation finishes. The end-to-end process for any one of these operations is often laborious, manual and costly. Most importantly, it is subject to error.

Incorporating IAM services

Incorporating IAM services into an existing service management framework provides comprehensive automation for processes such as provisioning while allowing users to leverage existing interfaces to request other IT services.

Encapsulating IAM services within an organisation’s IT service management framework provides a number of benefits. This approach enhances the quality of IT services provided by the organisation, thereby increasing both organisational and user productivity. It also strengthens the alignment of IAM IT services to the business needs of the organisation and leverages a single point of contact for IT services by including identity administration service requests. Moreover, it improves the organisation’s ability to comply with regulatory restrictions through end-to-end transaction logging and auditing functionality.

IT service delivery of IAM

In order to remain competitive and viable in today’s business world, organisations are being challenged to supply customers with high quality services using cost-effective measures. Whether these IT services pertain to users’ requests for workspace, computer equipment, telecommunications services, or productivity applications – companies are adopting service management strategies to create effective processes that automate some of their most cumbersome admin activities.

For example, getting a new employee on board in a company is often an arduous process, typically involving manual communication mechanisms among multiple departments. Different departments fulfil the new user’s physical facility requirements such as their: telecommunications, computer hardware, human resources and security access. The overall process is typically disjointed, with no single point of visibility from which to monitor it end-to-end. Streamlining and automating such processes are paramount to solidifying the competitive viability of the organisation.

Most services within the IAM domain are viable for candidates to become part of an overall service management strategy. The success of such a strategy depends upon well-defined objectives and policies, as well as effective and efficient service management processes.

These include:

* Providing a single point of contact for service delivery (in the form of a service catalogue) to facilitate users’ access to IT’s portfolio.

* Ensuring the collaboration among departments by providing process components that automate the integration among disparate domains.

* Accommodating varying degrees of change management pertaining to user requests, by engaging a service desk as a single point of contact for service support.

* Securing access to corporate resources pertaining to the web applications that are central to the solution.

By encapsulating IAM services within an IT service management framework, the organisation enhances the quality of IT services provided, thereby increasing both organisational and individual productivity. IT services become aligned with business needs and a single point of contact and interface is achieved thereby simplifying interaction with the IT infrastructure and automating the approval and fulfilment workflow processes required to complete identity administration requests. Finally, the organisation obtains additional regulatory compliance benefits by virtue of the integration’s end-to-end transaction logging and auditing functionality.

The business case

The effective use of management tools to deliver IAM services begins with the following four functional areas:

* Provisioning a resource identity.

* Changing a resource identity, such as a user’s attributes or properties.

* Modifying resource entitlements, such as adding a role or business function to a user.

* Removing a resource identity.

Examining the business processes that encompass the provisioning of a resource identity highlights the complexity that can be involved. While the processes of provisioning a user with the appropriate access to systems and applications vary among organisations depending upon their IT maturity level, they represent an important subset of the processes required to get an employee onboard. They typically combine an overarching approval cycle with a number of forms-based e-mail communications.

To fulfil the new employee’s provisioning needs, the manager must obtain the required approvals and send the forms to people within other departments to complete specific steps. Employee data must be entered into a corporate management database (MDB). Entering such data is usually a manual function performed by IT and also entails defining a specific role for the employee, with associated access rights. Such role assignments require sign-off by the security team and the hiring manager. As a result, a ticket is opened in the service desk system.

The ticket eventually goes to the security team, which circles back with the hiring manager (and his or her superiors) to verify the request. Since the process takes place via e-mail, it can take several hours or days to complete. Once approval is granted, the security team approves the request and closes the ticket. At that point, the original IT team is informed, the role request can be fulfilled and the employee is granted access to required applications. Such a process requires extensive human interaction with no single point of oversight. If a hiring manager fails to respond to an e-mail requesting authorisation, the entire process comes to a standstill and requires manual investigation to identify the bottleneck. Meanwhile, the new employee is left without the required resources.

What integration brings

A more integrated approach enables users to manage the lifecycle of identity administration services using service management tools. Managers use the simple user interface in a service catalogue to order IT services. Transparently, the service catalogue works with the identity-provisioning manager to fulfil their requests. The solution builds upon and complements an organisation’s IT service management strategy to deliver high quality identity administration services using automated and cost effective measures.

Identity administration tasks are registered as services within the organisation’s service catalogue. The hiring manager uses the service catalogue to choose the IT resources the new employee needs. Behind the scenes, the service catalogue triggers a series of workflow processes that obtain the necessary approvals. Once all approvals are acquired, a fulfilment workflow process is executed that either triggers service desk change management to further analyse the change before submitting it to identity management, or executes identity management directly to fulfil the provisioning requests.

The identity management process then creates the necessary accounts and access rights. Throughout this process, the identity management subsystem monitors the status of the provisioning request and updates the service catalogue with the success or failure of the operation. Should any step be delayed, the service catalogue tracks the current state of the request. Should anyone inquire as to the status of the request, support personnel can immediately determine where the process stands, thereby reducing the need to chase paper and follow e-mail trails throughout the organisation.

In a similar way, if the user changes roles or business functions or leaves the organisation, the service catalogue triggers a workflow process to obtain the necessary approvals, and then the same fulfilment process, as described above, takes place. While delivering these services, logs are maintained that facilitate any subsequent auditing of the changes.

The benefits

Such an automated approach brings a number of important benefits to the process, including:

* Enhanced quality of IT services provided by the organisation, increasing both organisational and user productivity.

* Improved alignment of business process and identity administration, allowing IT to become a business enabler with employees receiving IT services in a consistent fashion.

* Security policies become more closely aligned with business goals and more consistently enforced.

* Automation enables IT to be viewed as a service that is transparent to users.

* A single point of contact for all IT provisioning needs. Managers and users can perform either delegated administration or self-service identity administration functions.

* Central tracking, management and reporting. IAM services are delivered based upon established service level agreements.

* Improved security and compliance through:

- Automated processes that improve consistency and accuracy in applying roles and access rights to individuals.

- Creation of an audit trail, helping to ensure compliance with industry and government regulations.

- Automated off-boarding, which ensures that employees who have left the organisation can no longer access corporate resources.

* Streamlined workflow

- The integration results in a well-defined process that can be used to provision accounts, roles and access requests.

* Cost savings

- Less manual intervention in the procurement process means less productivity loss for all concerned.

- Simplified training. With a single place to go for all IT service requests, educating staff on how to obtain access to systems and applications, processes is simplified.

Conclusion

In its July 2008 examination of the identity management market, the Burton Group summed up the situation well. “The complexities of the identity system must be simplified as organisations are forced to manage an ever growing user community, integrate with partners, and offer identity related services to customers and other external entities.”

Organisations can put the solution in place today and gain significant, immediate advantages by streamlining the process of delivering IT services. At the same time, they will be positioned for the future, having taken a step in the direction of achieving a simplified, automated, and integrated application architecture.

For more information contact CA Southern Africa, +27 (0)11 417 8645, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
Paxton enhances installer loyalty programme
Paxton Access Control & Identity Management News & Events
Paxton has made it easier for security installers to benefit from its popular loyalty programme, Paxton Rewards, with points now added automatically when purchasing through approved distribution partners.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Rethinking access control in high-risk logistics environments
ATG Digital Access Control & Identity Management Transport (Industry) Logistics (Industry) Facilities & Building Management
South Africa’s logistics sector is under constant pressure, not only from external threats like hijackings and cargo theft, but also from internal vulnerabilities, operational blind spots, and limited support.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.