Identity Management: What it is, isn’t and what it can do for you Tom Golson, TAMU IT Agenda • • • • Identity management, from a high level TAMU IT’s history in Identity Management Brief overview of Dell ONE Identity Manager Plans for the evolution of Identity at Texas A&M University • Cautions and Warnings • Questions What is Identity Management? Identity and Access Management consists of • Policies • Processes, and • Technologies put in place for the purpose of establishing Subject digital identities and controlling access to digital resources. That sounds easy enough ... Identity and Access Management is NOT just account provisioning or password management. For Identity and Access Management, stakeholders, data owners (Registration Authorities) and identity consumers have to work together and agree on the the data to aggregate and the practices for reflecting Identity to downstream services. When approached holistically Identity and Access Management enables ● Security ● Compliance ● Outreach ● Personalization ● Decision making Identity reduces the friction between customers and services. How it began at Texas A&M University • Starting in 1999 as a username and address for email – Identity was an IT project focused on email until 2005. The “NetID”. • 2005 Formal efforts began to engage stakeholders and the LDAP Working Group was formed • 2010 The NetID and Identity activities expanded into Active Directory • 2014 Identity Agent programs began Technically: 1999 Technically: 2011 And That’s When We Knew • Identity and Access Management was precariously perched – Dozens of data sources – Processed by hundreds of applications – Directly provisioning 10 targets – Indirectly provisioning dozens of targets through data feeds and uploads to customers • Staffing couldn’t increase • Helping customers integrate identity was almost impossible Enter Dell ONE • Dell ONE is an Identity Management suite • The core, “Identity Manager” is: – Object mapping and libraries – Workflow – Job execution – Synchronization – Connectors & provisioners • TAMU IT also purchased: – Password Manager – Data governance – Cloud Access Manager Dell ONE Block Diagram Freeing up resources • Texas A&M University genuinely has an advantage: – Established governance processes managed out of the Identity Office – Strong working relationships with data owners and data consumers To Deliver • Process and relationship mean: – Consensus around persistent, unique identifiers has been established – The Identity Team has a deep understanding of the data and the limitations of the data Real Value • So we can now – Stop writing applications and – Focus on integrating: • • • • Identity creation Provisioning Deprovisioning Group membership Crawl, Walk, Run, Run, Sprint • 16 years of Identity and Access Management infrastructure doesn’t turn on a dime • But we have an extremely aggressive schedule – Kickoff in January – Dev installation complete by end of February – Model data aggregation by end of April – Parallel loading of Identity Store by end of June – Manage TAMU IT “dev” directories by end of July – Current provisioning/deprovisioning replaced by end of September Uncharted Territory • When the process of aggregating identity data and reflecting that into TAMU IT directories is complete, it isn’t quite “home free” – Migrate TAMU IT customer-facing services (https://gateway.tamu.edu) into the Dell ONE portal – Migrate web services to Dell ONE native services or re-factor But hopefully in parallel • Dell ONE delegation for provisioning federated Active Directories – Provide major organizational units access to Identity data for the purposes of: • Minimizing the number of credentials our customers have to manage • Expanding the umbrella of compliance • Improving the security posture of the entire organization – Campus member access also means improving the Identity Store by exposing group functionality Data Governance Module • The Dell ONE Data Governance module offers – Self-service requests for access to participating Active Directory file and resource shares – Includes audit trails for specific resources – And audits of resources for individuals Cloud Access Manager • CAS and Shibboleth have been great but have limitations – Sharepoint’s non-standard SAML implementation – Applications requiring complex response transforms (data or protocol) • An opportunity to make central credential management (expiry, security) available to new categories of applications • Social identities for low assurance populations But Buyer Beware • The history of Identity and Access program migrations is littered with failures • It is not possible to vet, in advance, every use case • It will be at least six months before any meaningful conversations about community opportunities can happen Questions? Or feel free to email me at tgolson_at_tamu.edu