+ All Categories
Home > Technology > What does it mean to optimize the user lifecycle ?

What does it mean to optimize the user lifecycle ?

Date post: 08-Aug-2015
Category:
Upload: odette-scully
View: 53 times
Download: 2 times
Share this document with a friend
Popular Tags:
11
Inventy What does it mean to OPTIMIZE the user lifecycle? INVENTY April 2015 – SAP Security 360° Service
Transcript

InventyWhat does it mean to OPTIMIZE the user lifecycle?

INVENTYApril 2015 – SAP Security 360° Service

Have you ever had serious difficulties in obtaining computer rights ?

I HAVE !

Application Form

Search for permissions

and accounts

Add to the request

Validate request

Provisioning and details

Monitoring request and notifications

Operational accounts and permissions

EASY! A simple 7 step process…Requesting IT access rights for a normal user ?

But reality is often different …

Validate request

Application form

Search for permissions

and accounts

Add to the request

Provisioning and details

Monitoring request and notifications

Operational accounts and permissions

Validate request

Application form

Search for permissions

and accounts

Add to the request

Provisioning and details

Monitoring request and notifications

Operational accounts and permissions

By profiles and by users

Security Validation / Authorization catalog

exposure

Adding partial roles

Requests by user

copy

Manager validation

Compliance validation

Provisioning

Return code from target applications

User emailInitial password

change

Connection validation

Automatic additions by HR

Profile

Person in charge

validation

Each step requires coordination

of unclear sub processes involving multiple actors ...

At Inventy,

we OPTIMIZE and SECURE the user lifecycle

Validate request

Application form

Search for permissions

and accounts

Add to the request

Provisioning and details

Monitoring request and notifications

Operational accounts and permissions

By profiles and by users

Security Validation / Authorization catalog

exposure

Adding partial roles

Requests by user

copy

Manager validation

Compliance validation

Provisioning

Return code from target applications

User emailInitial password

change

Connection validation

Automatic additions by HR

Profile

Person in charge

validation

OptimizationZone

S

S

S

S

C

C

S

S

S

SS

C

C

S

with SAP Identity & Access Governance, each step is modeled and automated in IDM & GRC …

S

C

Simple automated action.

Complex action natively integrated

Validate request

Application form

Search for permissions

and accounts

Add to the request

Provisioning and details

Monitoring request and notifications

Operational accounts and permissions

By profiles and by users

Security Validation / Authorization catalog

exposure

Adding partial roles

Requests by user

copy

Manager validation

Compliance validation

Provisioning

Return code from target applications

User emailInitial password

change

Connection validation

Automatic additions by HR

Profile

Person in charge

validation

…integrated data flows accelerate AUDITSand reduce maintenance costs

Integrated data flow.

I

I

I

I I

I

I

I

I

Validate request

Application form

Search for permissions

and accounts

Add to the request

Provisioning and details

Monitoring request and notifications

Operational accounts and permissions

By profiles and by users

Security Validation / Authorization catalog

exposure

Adding partial roles

Requests by user

copy

Manager validation

Compliance validation

Provisioning

Return code from target applications

User emailInitial password

change

Connection validation

Automatic additions by HR

Profile

Person in charge

validation

II

I

Add to the request

Provisioning and details

Operational accounts and permissions

By profiles and by users

Return code from target applications

Initial password change

Connection validation

Person in charge

validation

Our commitment ?

A simple user experience

A COMPLIANT process with a low cost

Application form

Search for permissions

and accounts

Validate request

Monitoring request and notifications

Adding partial roles

Requests by user

copy

Automatic additions by HR

Profile

Manager validation Provisioning

Security Validation / Authorization catalog

exposureCompliance validation

User email

April 2015

InventyFrançois Michel – [email protected] - 514-804-2333

Odette Scully – [email protected] – 514-972-7245www.inventy.com

Contact us to learn more

We would love to hear more from you!


Recommended