Multi-Factor Authentication
|
|
- Derek Francis
- 6 years ago
- Views:
Transcription
1 Executive Summary Done: 1. Based on the team s initial assessment, the team recommends that we use Symantec s product. Unless the team identify serious issues during proof of concept (target completion date: July 31), we expect that we ll choose Symantec s product as our multi-factor authentication solution. The final purchasing decision will not be made until after we complete the proof of concept. 2. Major decisions made: a. Services that need to be delivered: i. Authentication (IAM): first day of pilot ii. Provisioning (UW Digital ID): first day of pilot iii. Contingency access (UW Digital ID): first day of pilot 1. Self-service (100% functional) 2. Help desk iv. De-provisioning (UW Digital ID): first day of pilot 1. The functionality needs to be there whether it is done manually or automatically v. Reporting/auditing (UW Digital ID, IAM, HRS Security): TBD b. Contingency access options: i. Challenge questions: available and will be recommended to users ii. SMS: available iii. Voice: available c. Authentication method: campus credential + token (OTP): no pin will be required 3. The project s wiki site ( Factor+Authentication+Home) has been reorganized so that project stakeholders have a clear way to obtain official project information. The main page contains two main sections: i. Official Documents: everything that is listed under this section is official information. Only project managers and project leads should be allowed to post information under this section. ii. Working area: ideas, thoughts, unfinished documents the information is not official. Any team member can use this section to share their ideas and thoughts. 4. An FAQ page (Attachment A, has been created to provide answers to some of the frequently asked project questions. As more decisions are made and more information is available, this page will be updated with new decisions and information. 1
2 To Do: 1. Campus communication a. LRA b. Help Desk c. Identify Managers d. HR Directors e. Core Users 2. Decisions need to be made (by Project Leads or Project Sponsors) on the following decision points by July 12 th in order for the team to meet the December 15 th deadline: a. Deploying multiple instances or a single instance of the service (Appendix A) b. How will we authorize OTP users in the UWDID application? c. How often may a user request a static OTP? d. When a credential is reported lost or stolen, should it be immediately revoked? (Recommendation: Yes, lost means permanently lost, not I forgot it at home). e. Does the user have to be credentialed when being issued subsequent tokens after the initial token? (Software or hardware)? f. How many and what type of challenge questions will be required for contingency access? g. There is a gap regarding EMP direct database and Interactive reporting access. Must this gap be addressed by December 15 or is this an item that we can address after the December date? Tentative High-level Timeframe Absolute deadline for HRS implementation (all campuses) is December 15, Any activities between now and December 15 have flexible target dates: Requirements Verification: April 30 Integration Design Option April 30 Proof of concept including Target Date: July 31 Design Review and Approval (User) Development Purchasing decision Target Date: August 5th Integration/Development: Target Date: August 31 Testing: Target Date: September 14 Pilot Target Date: September 15 to October 1 We need to be sensitive to campus s LRA s workload at the beginning of the semester. Staggered Deployment: Target Date: October 1 to December 15 2
3 Project Management Project management is responsible for identifying and tracking project tasks; identifying potential dependencies that impact the deliverables; communicate project status and manage project documentation (charter, requirements, plans etc.) Completed Activities Reorganized project wiki page Created an FAQ ( ) page Scheduled Symantec conference call (06/18) Scheduled RSA conference call (06/19) Ongoing/Upcoming Activities Continue working on the FAQ page Identify campus Help Desk managers Identify pilot campuses Application Integration and Deployment This tier is responsible for developing and reviewing processes, verifying requirements, testing and support during pilot and deployment phases. Completed Activities IAM-TAG presented the Integration Scenarios for OTP vendors Ongoing/Upcoming Activities Participate with vendor reviews UW-Digital ID UW-Digital ID is responsible for designing, documenting and providing training on issuance, maintenance and support of Tokens. Completed Activities Tested the Symantec Web API (Part of Proof of Concept) with the following functions: o Adding a user o Updating a user o Deleting a user o Adding a credential o Updating a credential o Removing a credential o Authenticating a credential (for testing purposes only) o Setting a temporary OTP o Sending temp OTP via SMS 3
4 o Sending temp OTP via Voice o Clearing a temp OTP Completed the first draft of issuance procedure Ongoing/Upcoming Activities Continue proof of concept with Symantec o Identify and document issuance and reissuance processes (the initial draft is completed; the process may need to be modified depending on the findings from the proof of concept) o Identify and document contingency access process (the initial draft is completed; the process may need to be modified depending on the findings from the proof of concept) o Develop self-service function for contingency access o Work with IAM and Security teams on reporting/auditing function Help identifying campus LRAs (start a list) Initiate communication to campus LRAs Middleware / IAM Middleware is responsible for building the agreed upon business solution once approved by the Multi-Factor Authentication governing bodies. Completed Activities Started proof of concept o Can authenticate users Ongoing/Upcoming Activities Continue working on proof of concept o Work with UW Digital ID and Security teams on reporting/auditing function (Proof of concept) o Work on authentication shim Work with UW Digital ID team on standard audit log o Work on building interface to Shibboleth o Work with HRS security to identify a way to automatically generate core user information o Work with Identity Management Team on adding additional Shibboleth attribute to identify core users Identify OTP integration strategy Continue working on technical requirements this won t be clear until we work on proof of concept with the vendor Help identifying campus Identify Managers Help identifying campus LDAP contacts Project Dependencies 4
5 Purchasing an OTP solution Solution functionality on providing a temporary form-factor for contingency access Customer s participation in communication process 5
6 Project Governance Structure Executive Committee Project Sponsor Lorie Docken John Krogman Project Lead Chris Liechty Stefan Wahe Project Manager Ching-tzu Chien Al Crist Julie Gordan Larry Henderson Customer Key Stakeholders CIO Council (Lorie Docken) HRS Functional Support (Larry Henderson, Mike Gollmar, Brad Bruegger, Rachel Holmquist) SFS Controlers (Julie Gordon) UW-TISC (Chris Liechty) UW-MIST (Stefan Wahe) ISIS MMT (Ilene Seltzer) OCIS (Jim Lowe) ITLP Project Team (Jeff Savoy, Mike Gollmar) IAM Steering Committee (Elena Pokot) Purchasiing Ruth Ginzberg End User HRS, SFS, and other potential common system users Vendor Team Lead Stefan Wahe John Kotolski Nick Davis Josh Campbell Team Lead SFS Josh Campbell John Kotolski Stefan Wahe Team Lead HRS Service Center John Kotolski Brad Krause Derrian Jones Mike Gollmar Team Lead Ty Letto Mike Roszkowski Bob Stenson Jeremy Scott Ryan Larscheidt Mark Weber Team Lead Joe Tarter Nick Davis Chris Spencer Andrew Hoffmann Other Support Training Communication HRS(Tim Miller, John Kotolski, Diane BlaskowSki) SFS (Ben Integration Design Team IAM Technical Advisory Team (Tom Jordan) IAM Support Team (Ty Letto) UW-Digital ID (Chris Spencer) Service Owner UW-Digital ID (Joe Tarter) DoIT Security Application Support/Security IAM Project Team UW-Digital ID Other Project Documentation All project documentation (project plan, status report, meeting notes, etc) is stored in the project s wiki site ( Factor+Authentication+Home). The site serves as the official source of project information. All project stakeholders except for those who do not have wiki accounts have been granted site access. These individuals need to login to at least once to have their wiki account created. Project Charter: 6
7 Communication Plan: Appendix A: Decision Document 1. Deploying multiple instances (one per campus) or a single instance of the service Symantec s solution (VIP Manager) requires us to set up 16 instances (one for each campus). The July 16 th new release may allow us to only set up one account. However, if the team has to wait until July 16 th to decide on the integration approach, there s a huge possibility that we will not be able to meet the December 15th deadline. IAM-TAG presented the Options for One-Time Password Integration with HRS diagram (Attachment B) back in April The team decided that we would start with option 1 (OTP as a Wisconsin Federation Service) as a short term solution and then move to option 2 (OTP as a Campus Login) as the long-term solution (with the transition plan). We also don t want to preclude vendors that provide option 4 (OTP at the Network). The current version of VIP Manager does not allow us to implement option 1 and will force us to implement option 2 right away (if we cannot wait for its July 16 th new release which may allow us to only set up one instance). A decision needs to be made on whether we want to deploy multiple instances now for the HRS phase. Option 1: Deploying Single Instance Advantages: 1. Can be implemented in timeframe requested 2. Can be extended to SFS 3. Allows campus-by-campus migration to performing OTP 4. authentication for campus applications in the future 5. Does not require a change to the login interface for anyone other than HRS professional users. Risks: 1. Will work only for Wisconsin Federation apps will not work for local campus applications unless the application is integrated into the Federation. 2. Will not work for InCommon Federation apps 3. It is not available with Symantec s product until July 16, 2013 this may cause us not to meet our December deadline. Option 2: Deploying Multiple Instances Now 7
8 Advantages: 1. Provides long-term flexibility: is extensible to campus application as well 2. Can be used for InCommon or other external federation applications Risks: 1. Requires a change to each campus login server 2. OTP login option would be visible to all campus IdP users, not just HRS professionals 3. Creates service complexity and thus supportability UW Digital ID was designed with the goal of providing a -consistent- service experience across all system campuses. That consistent experience has the additional benefit of simplifying the service design, documentation, and supportability. In addition, the team needs to stay focus on implementing multi-factor authentication for HRS by December 15, With it stands, UW Digital ID team is not clear how that is possible with the multi-le service instance model. 8
Project Name: Oracle Identity Manager 11gR2 Upgrade
OIM 11gR2 Upgrade Project Charter Project Charter Project Name: Oracle Identity Manager 11gR2 Upgrade Project Name Oracle Identity Manager 11gR2 Upgrade Project Manager Ching-tzu Chien Organization DoIT
More informationMulti-Factor Authentication
Executive Summary Dne: 1. We have cncluded the Prf f Cncept Testing and nw are mving frward with Full Life Cycle Testing. 2. Purchasing: We are mving frward with Symantec VIP prduct and fbs. We are wrking
More informationThe Research Foundation for The State University of New York Campus Security Administrator Handbook
The Research Foundation for The State University of New York Campus Security Administrator Handbook Table of Contents Introduction... 3 Campus Security Administrator... 3 Responsibilities... 3 How to Appoint...
More informationINTEGRATING PING IDENTITY SOLUTIONS WITH GOOGLE IDENTITY SERVICES
INTEGRATING PING IDENTITY SOLUTIONS WITH GOOGLE IDENTITY SERVICES How two technologies work together to add more value to your enterprise TABLE OF CONTENTS 03 04 05 06 07 08 08 08 EXECUTIVE SUMMARY INTEGRATION
More informationBuilding an IAM Program at Portland State University. Polling URL:...
Building an IAM Program at Portland State University Polling URL:... PRESENTED BY: 2018 Internet2 Ryan Bass, Associate CIO, Portland State University Jessica Coltrin, Associate Director, Portland State
More informationIAM Operations Transition CIO Council Review. January 23, 2016 Monday Smith Center 561 2:30 pm - 3:30 pm
IAM Operations Transition CIO Council Review January 23, 2016 Monday Smith Center 561 2:30 pm - 3:30 pm Agenda Closing Out The Plan Overview of Program Deliverables and Accomplishments Program Impact Future
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationInteragency Advisory Board Meeting Agenda, May 27, 2010
Interagency Advisory Board Meeting Agenda, May 27, 2010 1. Opening Remarks 2. PIV-I Status (Judy Spencer, GSA) 3. PIV Test Requirements (Dave Temoshok, GSA) 4. ICAM Progress at USDA (Owen Unangst, USDA)
More informationSafeNet Authentication Service:
A Faster, More Effective Way to Manage Authentication Deployments Solution Brief Next Generation Authentication Reduce the risk of unauthorized access to sensitive corporate resources Ensure unified access
More informationTIER Release One A Community Milestone, Why It's Important and What's Next
TIER Release One A Community Milestone, Why It's Important and What's Next Monday, April 25, 2016 Speakers John O Keefe (Lafayette College), Moderator and Member of the TIER Community Investor Council
More informationCIO Council Meeting May 21, 2015 River Falls, WI
CIO Council Meeting May 21, 2015 River Falls, WI Attendance: Jim Barrett*, Bob Beck, Chip Eckardt, Mohammed Elhindi, David Kieper, Joe Kmiech, John Krogman, Anne Milkovich, Sasi Pillay, Elena Pokot, Stephen
More informationBUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and getting started with modern MFA solutions
BUYER S GUIDE: MFA BUYER S GUIDE Evaluating and getting started with modern MFA solutions NEW CAPABILITIES One-size-fits-all authentication is a relic of the past, and the days of hard tokens as the default
More informationIdentity Brandeis University. #NERCOMPIdM bit.ly/nercomp_identitymgmt
Identity Management @ Brandeis University #NERCOMPIdM bit.ly/nercomp_identitymgmt Who am I? Ian Rifkin irifkin@brandeis.edu Director of Data and Systems Integration Brandeis University - Web and Middleware
More informationEmory University Case Study I2 Day Camp
Emory University Case Study I2 Day Camp November 5, 2010 John Ellis & Elliot Kendall About Emory Facts & Figures Private university in suburban Atlanta ~ 13,000 undergrads, 7,000 grads Professional schools,
More informationOSS TENDER PORTAL MANAGEMENT SYSTEM (ASP.NET)
OSS TENDER PORTAL MANAGEMENT SYSTEM (ASP.NET) APPLICATION SPECIFICATIONS, FEATURES DESCRIPTIONS SCREEN SHOT ILLUSTRATION Version: ASP.NET (2) Updated: 3Q/2007, v-2 Reference: Middleware 0445/86 1. TECHNICAL
More informationBUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and getting started with modern MFA solutions
BUYER S GUIDE: MFA BUYER S GUIDE Evaluating and getting started with modern MFA solutions NEW CAPABILITIES One-size-fits-all authentication is a relic of the past, and the days of hard tokens as the default
More informationBaseline Expectations for Trust in Federation: Increasing Trust and Interoperability in InCommon
Baseline Expectations for Trust in Federation: Increasing Trust and Interoperability in InCommon January 10, 2018 Document Repository ID: TI.95.1 DOI: 10.26869/TI.95.1 Persistent URL: http://doi.org/10.26869/ti.95.1
More informationFrequently Asked Questions (FAQs):
Frequently Asked Questions (FAQs): Product Features: Q1. What is SBI Buddy Merchant App? SBI Buddy Merchant App is State Bank of India s Mobile Wallet for Merchants and Sub-Merchants to accept/collect
More informationEnabling Cross-University Collaboration with Harvard IAM: TIER, InCommon, and Grouper. IT Summit 2015 June 4, 2015 Thursday 1:10-2:00 p.m.
Enabling Cross-University Collaboration with Harvard IAM: TIER, InCommon, and Grouper IT Summit 2015 June 4, 2015 Thursday 1:10-2:00 p.m. Agenda What is Identity & Access Management at Harvard? IAM in
More informationIAM Task Force Update. April 3, 2015
IAM Task Force Update April 3, 2015 April 3, 2015 For Today The Group The Charge IAM at CSU Recommendations Discussion 2IAC Presentation April 3, 2015 Task Force Members Human Resources Tracy Hutton College
More informationIdentity and Access Management. Mike Noel, Brandon Mills, Chris Pruess. Kris Halter
Project Name: Project Team Leads: Project Manager: Identity and Access Management Mike Noel, Brandon Mills, Chris Pruess Kris Halter TeamDynamix Project Number: 241151 Project Overview Leverage Identity
More informationDigital Demand Capture Integration Guide
2015 Digital Demand Capture Integration Guide MARKETO INTEGRATION LEAD ANYWHERE 2036 Lincoln Ave. Suite 202 Ogden, UT 84401 Integration - Quick Guide Table of Contents Audience: Primary Opportunity Recipient...
More informationUniversity of Wisconsin - Madison Project Charter Endpoint Management & Security Rationalization, Phases 1, 2 & 3
Executive Sponsors University of Wisconsin - Madison Project Charter Endpoint Management & Security Rationalization, Phases 1, 2 & 3 Mike Lehman, CIO Project Sponsors DTAG Executive Committee Core Team
More informationHow to add pre-built workflows to my Nintex Workflow Cloud tenant USER GUIDE
How to add pre-built workflows to my Nintex Workflow Cloud tenant USER GUIDE November 2018 Contents What is the add pre-built workflows to my Nintex Workflow Cloud tenant process? 2 The request form 3
More informationStarfish Associates Playbook for Partners Cisco
2015 Starfish Associates Playbook for Partners Cisco www.starfishassociates.com February, 2015 3 Contents About Starfish... 2 Starfish Technology Platforms... 3 Starfish Solutions Overview Key Benefits...
More informationCIO Council Project Completion Report. University Identity and Access Management (UIAM)
CIO Council Project Completion Report University Identity and Access Management (UIAM) Report to CIO Council May 1, 2017 Project Completion Summary - Identity and Access Management Summary Metrics Budget:
More informationStarfish Associates Playbook for Partners Cisco
2014 Starfish Associates Playbook for Partners Cisco www.starfishassociates.com March 2014 3 Contents About Starfish... 2 Starfish Technology Platforms... 3 Starfish Solutions Overview Key Benefits...
More informationCiti Pay App Frequently Asked Questions
Citi Pay App Frequently Asked Questions 1. What is Citi Pay? Citi Pay provides the convenience of making secure, in-store payments using your compatible Android mobile phone. This is an optional feature
More informationIAM Online Thursday, April 8, 2010
IAM Online Thursday, April 8, 2010 Making Federation Happen Joel Cooper, Director of Information Technology Services, Carleton College John O Keefe, Director of Academic Technology & Network Services,
More information1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
More informationThe Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS
The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS Rob Aragao & Stan Wisseman #MicroFocusCyberSummit Primary Goal of Businesses Today Drive Digital Transformation!! 2 For Most Organizations,
More informationIdentity and Access Management
Chapter 2 Identity and Access Management There are many configurations of identity and access management (IAM) systems, and to some extent, each organization s IAM system will be unique, developed and
More informationINCOMMON TRUST FEDERATION
INCOMMON TRUST FEDERATION The Basics Kevin M. Morooney Vice President, Trust and Identity Internet2 Caveats 2 Some terminology and connections 3 Some terminology and connections There are identity providers
More informationCIO Council Meeting Notes
Attendees: CIO Council Meeting Notes Wednesday, August 10, 2016 In-Person and Videoconference In-person: Bob Beck, Dan Dunbar, Chip Eckardt, Mohamed Elhindi, Werner Gade, Jordania Leon-Jordan, David Kieper,
More informationCLOUD ACCESS CONTROL 6 REASONS WHY IT S A MUST FOR YOUR COMPANY
CLOUD ACCESS CONTROL 6 REASONS WHY IT S A MUST FOR YOUR COMPANY 6 Reasons Why It s a Must... Whether you have one office door or one hundred, you can t always be around to manage who is accessing your
More informationUsher. Security, analytics & productivity all in a single solution
Usher Security, analytics & productivity all in a single solution The Modern Enterprise Security challenges Digital assets need to be protected with something stronger than a password Existing strong authentication
More informationTivoli Identity Manager at the Commonwealth Bank. Presenter: Jon Davies 3 August 2006
Tivoli Identity Manager at the Commonwealth Bank Presenter: Jon Davies (jon.davies@cba.com.au) 3 August 2006 Today s Topic CBA has been implementing TIM for the last 2 years We have had quite a few lessons
More informationFAQs for bm Wallet. You can access bm Wallet app on all IOS and Android devices having good internet connectivity.
FAQs for bm Wallet 1. What is bm Wallet? bm Wallet is a digital wallet app provided to you by bank muscat to help you transact with us anytime, anywhere. The service is available 24/7, 365 days a year.
More informationUW System CIO Council
Date: February 19, 2015 CIOs: Bob Beck, Chip Eckardt, Werner Gade, Bruce Mass, Anne Milkovich, Sasi Pillay, David Stack (reporting), Suzanne Traxler, Ilya Yakovlev, Doug Wahl, and by teleconference: Jim
More informationCloud & DevOps Program Big Group Update. Jan. 30, 2015 Friday 2:00-3:00 p.m. Lamont Library Forum Room
Cloud & DevOps Program Big Group Update Jan. 30, 2015 Friday 2:00-3:00 p.m. Lamont Library Forum Room Meeting Purpose and Intended Outcomes Purpose To provide the Big Group an update on the Cloud & DevOps
More informationOnboarding Wizard. Delivered by
Onboarding Wizard Delivered by All ideas and information contained within these documents are the intellectual property rights of HKP. These documents are not for general distribution and are meant for
More informationBUYER S GUIDE: CUSTOMER IDENTITY & ACCESS MANAGEMENT (CIAM)
BUYER S GUIDE: CUSTOMER IDENTITY & ACCESS MANAGEMENT (CIAM) SHIFTING MARKETPLACE Over the last few years, there s been a major shift in requirements for enterprises managing customer identities. This shift
More informationYes, You DO Need Visual IVR Frequently Asked Questions
Frequently Asked Questions All rights reserved. No part of this document may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic
More informationIAM Committee Meeting Notes 3/13/2017
IAM Committee Meeting Notes 3/13/2017 Attending: Cam Beasley, CW Belcher, Michael Bos, Bill Bova, Tim Fackler, Seth Feder (for Dash Ballarta), Fred Gilmore, Ty Lehman, Darin Mattke, Karen Weisbrodt, Tiffany
More informationExtending Identity and Access Management to ios Mobile Devices
Extending Identity and Access Management to ios Mobile Devices Sudhir Tadi Senior Technology Sales Consultant EMEA Presales Center 1 The following is intended to outline our general product direction.
More informationProject Initiation Document (PO003)
Project Initiation Document (PO003) Document Control Project Title: INTO SITS to Exeter SITS Interface Project Manager: James Green Date: 4 March 2009 Version Date Author(s) Notes on Revisions 0.1 20/01/09
More informationCOPYRIGHTED MATERIAL WHAT S IN THIS CHAPTER?
1 WHAT S IN THIS CHAPTER? Defining application lifecycle management Learning about the Visual Studio 2013 product family Seeing ALM in action using Visual Studio Ultimate 2013 In June of 1999, Microsoft
More informationDeltek Touch for Maconomy. Touch 2.2 User Guide
Deltek Touch for Maconomy Touch 2.2 User Guide July 2017 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical errors may
More informationBUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and Getting Started with Multi-factor Authentication Solutions
BUYER S GUIDE: MFA BUYER S GUIDE Evaluating and Getting Started with Multi-factor Authentication Solutions NEW CAPABILITIES One-size-fits-all authentication is a relic of the past, and the days of hard
More informationComparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software Who should read this paper Deploying and managing a PKI solution can be a complex undertaking. This is particularly the
More informationNamed User Deployment Migration Guide A Project Management Guide to taking full advantage of Adobe Creative Cloud for enterprise and Document Cloud
Named User Deployment Migration Guide A Project Management Guide to taking full advantage of Adobe Creative Cloud for enterprise and Document Cloud for enterprise Adobe Creative Cloud for enterprise allows
More informationOSS CRM & SERVICE FULFILLMENT MANANGEMENT SYSTEM (ASP.NET) APPLICATION SPECIFICATIONS, FEATURES, DESCRIPTIONS AND & SCREEN SHOTS
OSS CRM & SERVICE FULFILLMENT MANANGEMENT SYSTEM (ASP.NET) APPLICATION SPECIFICATIONS, FEATURES, DESCRIPTIONS AND & SCREEN SHOTS Version: ASP.NET (2) Updated: 4Q/2007, g2d0r1 Reference: Middleware 0466/86
More informationIAM Online InCommon Technical Advisory Committee 2017 Work Plan
IAM Online InCommon Technical Advisory Committee 2017 Work Plan March 22, 2017 Mark Scheible, MCNC, TAC Chair Janemarie Duh, Lafayette College Mike Grady, Unicon Nick Roy, Internet2 Keith Wessel, University
More informationSolicitation # Account Provisioning and SSO Solutions Addendum #1 dated 2/14/2017
DATE: February 14, 2017 TO: FROM: All Prospective Proposers Eric Pfister Senior Buyer, Technology 301-985-7095 Phan Truong Senior Buyer, Technology 301-985-7143 RE: Solicitation # 91470 Account Provisioning
More informationbenefitsconnect USER MANUAL
benefitsconnect USER MANUAL TABLE OF CONTENTS INTRODUCTION PAGE 1 ADDING A NEW HIRE TO THE SYSTEM PAGE 2 SHOWING THE SYSTEM TO A NEW EMPLOYEE PAGE 4 CHANGING AN ACTIVE EMPLOYEE RECORD PAGE 5 RESETTING
More informationIT Briefing. March 15, 2012 Psychology Building PAIS-290
IT Briefing March 15, 2012 Psychology Building PAIS-290 IT Briefing Agenda Office 365 Student Unified Messaging Project General Security Update Blackboard 9.1 Upgrade Configuration Management Online Directory
More informationFraud and identity verification consulting case study maximize bookings and reduce operational costs by using the right data
Fraud and identity verification consulting case study maximize bookings and reduce operational costs by using the right data Client Top-tier U.S. card issuer Chris Ryan Experian Experian and the marks
More informationUSERS GUIDE. Change Management. Service Management and ServiceNow SERVICE EXCELLENCE SUITE
USERS GUIDE Change Management Service Management and ServiceNow SERVICE EXCELLENCE SUITE Table of Contents Introduction... 3 Overview, Objectives, and Current Scope... 4 Overview... 4 Objectives... 4 Current
More informationCIO Council Meeting Minutes
CIO Council Meeting Minutes September 24, 2015 Madison, WI Attending: Jim Barrett*, Bob Beck, Mark Clements*, Chip Eckardt, Mohamed Elhindi*, David Kieper, Joe Kmiech*, Tom Janicki*, John Krogman, Bruce
More informationSystem and Software Architecture Description (SSAD)
System and Software Architecture Description (SSAD) Version 2.0 System and Software Architecture Description (SSAD) Leamos Team #7 Name Primary Role Secondary Role Monty Shah Project Manager Life Cycle
More informationQlik Sense Seminar. An introduction to Qlik Sense. COPYRIGHT 2014 RESULT DATA - All Rights Reserved SLIDE 1
Qlik Sense Seminar An introduction to Qlik Sense SLIDE 1 Introductions Presenters & Result Data Team Tom Meers President, Result Data Troy Gottfried Principal, Director, Result Data Joe Roberts Senior
More informationMore than Mobile Forms Halliburton s Implementation of an End to End Solution
CUSTOMER INTERVIEW More than Mobile Forms Halliburton s Implementation of an End to End Solution Hosted by: Mark Scott, VP Marketing, ProntoForms Yamina Hibbard, Global Asset Manager, Halliburton Mike
More information1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
More informationUCD IT Services. Project Initiation Document. Version February Version History
UCD IT Services Application Jukebox Project Initiation Document Version 1.2 12 February 2015 Version History Version Date Summary of Changes Changed by 1.0 01.12.2014 Initial Draft 1.1 09.12.2014 Revisions
More informationEMV and Apple Pay. The world of credit cards is on the move.
EMV and Apple Pay The world of credit cards is on the move. Today we will talk about The basics of EMV and Apple Pay. There are a lot of details we could get lost in. This is a high-level overview. We
More informationPROJECT CONTROL DOCUMENT
PROJECT CONTROL DOCUMENT UCLA-IAM-PCD-0006 Draft January 23, 2008 [NOTE: THE IAM UCLA PCD IS A CONTINUATION OF THE EDIMI PCD FROM 2004. FOR DETAILS REGARDING THE OVERALL PROJECT VISION AND THE EARLIER
More informationT U T O R I A L Creating a Temporary Stipend Job Description using OACIS
T U T O R I A L Creating a Temporary Stipend Job Description using OACIS Getting Started 1. First, log on using your employee ID and personal password. If you don t yet have an account, contact HR at x3166.
More informationAegle. Department of Computer Science and Engineering The University of Texas at Arlington. Outreach Inventory System
Department of Computer Science and Engineering The University of Texas at Arlington Aegle Outreach Inventory System Team Members: Joseph Finnegan Karla Hernandez Joe Martinez Carlos Torres Last Updated:
More informationFRCS VMS PKI - PKI Disclosure Statements Version 1.0 FRCS VMS PKI. PKI Disclosure Statements. Effective Date: 27 Dec Version: 1.0.
FRCS VMS PKI PKI Disclosure Statements Effective Date: 27 Dec 2017 Version: 1.0 Page 1 of 8 Important Note About this Document The present document is the FRCS VMS PKI public PKI Disclosure statement (PDS).
More informationOSS ENTERPRISE E-PRODUCUREMENT MANANGEMENT SYSTEM (ASP.NET) Version: ASP.NET (3) Updated: 4Q/2007, v:g/1 Reference: Core Application 0103/88
OSS ENTERPRISE E-PRODUCUREMENT MANANGEMENT SYSTEM (ASP.NET) Version: ASP.NET (3) Updated: 4Q/2007, v:g/1 Reference: Core Application 0103/88 1 CONTENT DESCRIPTION 1. INTRODUCTION 1.1 BUSINESS APPLICATIONS
More informationThe due date for return of RFP responses has been extended to July 11, 2017 at 2:00 p.m. CST due to the large volume of questions we have received.
ADDENDUM NUMBER 1 DATED JUNE 23, 2017 TO SPECIFICATIONS TO REQUEST FOR PROPOSALS #17-4011-HR-C FOR OFFICE 0365 PROJECT ONLINE & POWER BUSINESS INTELLIGENCE CONSULTING & TRAINING SERVICES DATED JUNE 9,
More informationMicrosoft 365 Migration
Microsoft 365 Migration Abstract As the new world of automation drives the change of pace in technology, commitment to the next wave of technology for businesses is necessary to remain competitive and
More informationInCommon and edugain: Joining the International Federation Community
InCommon and edugain: Joining the International Federation Community Executive Summary Researchers, faculty, staff, graduate students and others involved in research, scholarship and education increasingly
More informationCUSTOMER: LOCATION: INDUSTRY: OVERVIEW:
CUSTOMER: CATHAY UNITED BANK LOCATION: TAIWAN INDUSTRY: BANKING OVERVIEW: Cathay United Bank (CUB) is a subsidiary of Cathay Financial Holding Company, the largest private business financial holding company
More informationTABLE OF CONTENTS. 1. What is online enrollment? 2. Why online enrollment? 3. How online enrollment works. 4. Online enrollment technology
Why Enroll Online? TABLE OF CONTENTS 1. What is online enrollment? 03 2. Why online enrollment? 04 3. How online enrollment works 06 4. Online enrollment technology 17 5. Online enrollment with EaseCentral
More informationCMMS Expert Series. Part 3: Three Types of CMMS Setup. A helpful guide brought to you by Hippo CMMS Software Experts
CMMS Expert Series Part 3: Three Types of CMMS Setup A helpful guide brought to you by Hippo CMMS Software Experts An Introduction to the CMMS Expert Series The benefits of maintenance management software
More informationTurning PSD2 Challenges into Business Opportunities.
Turning PSD2 Challenges into Business Opportunities www.ebankit.com PSD2 in a nutshell Perfect Competition Payment Services Directive 2 (PSD2) The PSD2 updates and complements the EU rules put in place
More informationOE Project Charter Template
Project Charter EMI Outreach April 12, 2011 OE Project Charter Template Project Name: Energy Management Office Prepared by: Sara Shirazi Date (MM/DD/YYYY): August 1, 2011 Project Charter Version History:
More informationComparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
More informationCHOOSE THE RIGHT IDENTITY & ACCESS MANAGEMENT SOLUTION
E VA L U AT ION C HE C K L I S T CHOOSE THE RIGHT IDENTITY & ACCESS MANAGEMENT SOLUTION Realise business value by protecting critical assets from unauthorised access HELPING YOU TO SECURE AN EXTENDED ENTERPRISE
More informationHR Forum. April 3, 2013
HR Forum April 3, 2013 JEM No Questions Roxie o Hiring an Hourly Employee Who Is Crossing Payroll Areas? As reminder to campus community, we would like to revisit the scenario of the problems that occur
More informationIdentity & Access Management IAM Lifecycle Committee. Feb. 29, 2016 Monday 10:00-11:30 a.m. 561 Smith Center
Identity & Access Management IAM Lifecycle Committee Feb. 29, 2016 Monday 10:00-11:30 a.m. 561 Smith Center Agenda Introductions Meeting Purposes and Intended Outcomes Status Update Discussion: SSN Remediation
More informationCOMPLETING AN ELECTRONIC I-9 FOR A NEW HIRE HR MANAGER INSTRUCTIONS
COMPLETING AN ELECTRONIC I-9 FOR A NEW HIRE HR MANAGER INSTRUCTIONS Overview Process for verifying a new hire s employment eligibility has changed. Effective immediately, your location will use I-9 express
More informationSPE Tech Projects - Status Update Jason Brahms. SPE Technologies - Status Update 9/15/11
SPE Technologies - Status Update 9/15/11 DBB Logging Day to Day Operations Stakeholders: WPF Client Ops / DADC Description: Oversee a staff of 4 loggers executing technical logging and component validation
More informationOhio Environmental Protection Agency Operator Certification Update. March 23, 2017 Tanushree Courlas
Ohio Environmental Protection Agency Operator Certification Update March 23, 2017 Tanushree Courlas What s New in Operator Certification? Reorganization Rule Making Exams Third Party Exams Paper/Pencil
More informationGuardian Location Manager Interface: Electronic I-9
Guardian Location Manager Interface: Electronic I-9 Location Manager Interface When would I use the Location Manager Interface (LMI)? The LMI is a simplified and streamlined interface used to complete
More informationAegis Therapies - Workday (WD)Employee Toolkit
Aegis Therapies - Workday (WD)Employee Toolkit *Click on any bulleted item below to be taken directly to that section, click on the footer to return to this page Workday Employee Toolkit Where Do I Go
More informationDROIDRUSH Problem Statements. (B.Tech 2 nd and 3 rd year, MCA 1 st and 2 nd year)
DROIDRUSH 2018 Problem Statements (B.Tech 2 nd and 3 rd year, MCA 1 st and 2 nd year) Rules and Regulations Before you start developing awesome android apps, have a look at the rules and regulations so
More informationGOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.
GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,
More informationWhy Enroll Online? 148x40
Why Enroll Online? 148x40 TABLE OF CONTENTS 1. What is online enrollment? 03 2. Why online enrollment? 04 3. How online enrollment works 06 4. Online enrollment technology 17 5. Online enrollment with
More informationJustification to Carryover Prior Fiscal Year POs User Guide
Justification to Carryover Prior Fiscal Year POs User Guide Overview: Once a Purchase Order (PO) has been carried over to the next fiscal year, it requires a justification to keep it open and again carry
More informationNovember 2016 Poynt Reseller Portal and Merchant Onboarding Activation
November 2016 Poynt Reseller Portal and Merchant Onboarding Activation 1 Outline 05 Reseller Portal 06 Deployment 07 Merchant Support 2 05 Reseller Portal A tool for onboarding and managing your Poynt
More informationOracle PaaS and IaaS Universal Credits Service Descriptions
Oracle PaaS and IaaS Universal Credits Service Descriptions December 1, 2017 Oracle PaaS_IaaS_Universal_CreditsV120117 1 Metrics... 3 Oracle PaaS and IaaS Universal Credit... 8 Oracle PaaS and IaaS Universal
More informationIdentity Management Services
WHITE PAPER AUGUST 2014 Identity Management Services How Telcos Can Outpace Commoditization in the Application Economy 2 WHITE PAPER: IDENTITY MANAGEMENT SERVICES ca.com Table of Contents Executive Summary
More informationInfor Risk and Compliance for CDM Phase 2: Automate, integrate, manage, and report across your enterprise
Public Sector Infor Risk and Compliance for CDM Phase 2: Automate, integrate, manage, and report across your enterprise Now in its Phase 2 rollout, The Department of Homeland Security (DHS) and General
More informationSTRATEGIC AREAS
STRATEGIC AREAS 2018-2019 chris kielt CIO cio letter Each year, Information Technology Services undertakes a robust technology project portfolio planning process. Individuals and units from across ITS
More informationDo More with Complete Mobile-Cloud Security from MobileIron Access
Do More with Complete Mobile-Cloud Security from MobileIron Access MobileIron Access: Complete cloud-based security Comprehensive security. MobileIron Access leverages device and app posture, user identity,
More informationSympa HR implementation description
Sympa HR implementation description 2/11 Contents 1 Introduction 3 2 Start Up 3 2.1 Sympa HR Go! -starting package 3 2.2 Freedcamp project management tool 3 2.3 Kick-off meeting 3 2.4 The Sympa HR environment
More informationCloud Transformation Program Cloud Change Champions September 20, 2017
Cloud Transformation Program Cloud Change Champions September 20, 2017 W September C C C M! Today s Agenda 1 Welcome and Agenda Overview 2 Preview of Next Quarter s Goals and Accomplishments on Current
More informationTOP 20 QUESTIONS TO ASK BEFORE SELECTING AN ENTERPRISE IAM VENDOR
TOP 20 QUESTIONS TO ASK BEFORE SELECTING AN ENTERPRISE IAM VENDOR The need for a robust and flexible enterprise-grade identity and access management (IAM) solution has never been greater. IAM is increasingly
More information