Date post: | 08-Aug-2015 |
Category: |
Technology |
Upload: | odette-scully |
View: | 53 times |
Download: | 2 times |
InventyWhat does it mean to OPTIMIZE the user lifecycle?
INVENTYApril 2015 – SAP Security 360° Service
Application Form
Search for permissions
and accounts
Add to the request
Validate request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
EASY! A simple 7 step process…Requesting IT access rights for a normal user ?
But reality is often different …
Validate request
Application form
Search for permissions
and accounts
Add to the request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
Validate request
Application form
Search for permissions
and accounts
Add to the request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
By profiles and by users
Security Validation / Authorization catalog
exposure
Adding partial roles
Requests by user
copy
Manager validation
Compliance validation
Provisioning
Return code from target applications
User emailInitial password
change
Connection validation
Automatic additions by HR
Profile
Person in charge
validation
Each step requires coordination
of unclear sub processes involving multiple actors ...
At Inventy,
we OPTIMIZE and SECURE the user lifecycle
Validate request
Application form
Search for permissions
and accounts
Add to the request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
By profiles and by users
Security Validation / Authorization catalog
exposure
Adding partial roles
Requests by user
copy
Manager validation
Compliance validation
Provisioning
Return code from target applications
User emailInitial password
change
Connection validation
Automatic additions by HR
Profile
Person in charge
validation
OptimizationZone
S
S
S
S
C
C
S
S
S
SS
C
C
S
with SAP Identity & Access Governance, each step is modeled and automated in IDM & GRC …
S
C
Simple automated action.
Complex action natively integrated
Validate request
Application form
Search for permissions
and accounts
Add to the request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
By profiles and by users
Security Validation / Authorization catalog
exposure
Adding partial roles
Requests by user
copy
Manager validation
Compliance validation
Provisioning
Return code from target applications
User emailInitial password
change
Connection validation
Automatic additions by HR
Profile
Person in charge
validation
…integrated data flows accelerate AUDITSand reduce maintenance costs
Integrated data flow.
I
I
I
I I
I
I
I
I
Validate request
Application form
Search for permissions
and accounts
Add to the request
Provisioning and details
Monitoring request and notifications
Operational accounts and permissions
By profiles and by users
Security Validation / Authorization catalog
exposure
Adding partial roles
Requests by user
copy
Manager validation
Compliance validation
Provisioning
Return code from target applications
User emailInitial password
change
Connection validation
Automatic additions by HR
Profile
Person in charge
validation
II
I
Add to the request
Provisioning and details
Operational accounts and permissions
By profiles and by users
Return code from target applications
Initial password change
Connection validation
Person in charge
validation
Our commitment ?
A simple user experience
A COMPLIANT process with a low cost
Application form
Search for permissions
and accounts
Validate request
Monitoring request and notifications
Adding partial roles
Requests by user
copy
Automatic additions by HR
Profile
Manager validation Provisioning
Security Validation / Authorization catalog
exposureCompliance validation
User email
April 2015
InventyFrançois Michel – [email protected] - 514-804-2333
Odette Scully – [email protected] – 514-972-7245www.inventy.com
Contact us to learn more
We would love to hear more from you!