Consulting

Consulting

Evidian provides a series of IAM consulting services to help you build your identity and access management project. These services cover three principle domains:

  •  Implementation/demonstrator’s assistance with implementation/model
  •  Advice and audit services
  •  Design: technical architecture with the constraints of high availability (IT safety plan), detailed IAM functional specifications (workflow, policy, upstream and downstream provisioning), SSO and strong authentication, Web SSO

 

For our E-SSO & Authentication Manager, WAM, IAM and SafeKit products, Evidian offers to implement a POC (Proof of concept)

Prerequisites
  • POC specification/Needs requirement from the pilot project
  • List of constraints: number of sites, deadlines, costs, number of persons, number of applications, etc.
  • Technical infrastructure: VM, directory technology (e.g. AD/ADLS, Fedora, database)
Participants
  • RSSI/Project Manager, MOA, MOE
Content
  • POC script
  • Installation and configuration of the EVIDIAN software according to the POC specification
  • Assistance
  • Restitution
Equipment
  • VM with the Evidian WAM software installed, presentation for the restitution

The advice and audit group offers to support you with:

  • Preparation studies
  • Defining the project (outline, project plan, WBS)
  • The design stages of the identity and access management solution

We will spend time specifically on considering the organisational and technical aspects of such projects, and the ROI: financial, for users, professionals, IT support teams and of course security teams (implemented from an SMSI, professional regulatory constraints: Bale II/III, Solvency, HIPAA).

 

With regard to audit, the methodology adopted is the following:

 

Here are some examples of consulting tasks that can be achieved in Evidian:

Task

Content

Audit of the existing set-up
  • Identifying the references and applications to be taken into account
  • Identifying existing processes and analysing how they take place
  • Analysing the directory architecture
  • Analysing the access control policy in place
  • Identifying access control measures
  • Identifying the applications provided/adapted
  • Identifying any SPOFs (Single Point of Failure) as well as Split Brain cases
Proposing a management model for the organisation’s authorisations with Policy Manager
  • Modelling applications
  • Modelling professional roles
  • Defining professional roles
  • Defining rules for the separation of powers
Needs assessment in terms of strong authentication
  • Offering an access control policy based on the following three criteria:
  • User profiles
  • Access point profiles (user positions)
  • Application profiles
  • Detailed authentication mechanisms based on target users, terminals used and access achieved

Evidian offers you support in the design phase of your project using our E-SSO & Authentication Manager, WAM, IAM and SafeKit products.

Here are some examples of tasks that can be achieved in Evidian:

Task

Content

ESSO technical and functional specifications
  • Managing user security profiles
  • Managing security profiles for access points (workstations)
  • Managing application security profiles
  • Fast user switching
  • Administration of the solution
WAM technical and functional specifications
  • Managing the portal and/or local or remote web agents
  • Defining web servers
  • Managing services
  • Managing access control
  • Managing SSO
  • Managing data input
  • Managing authentication
  • Managing certificates and keys for CRLs
  • Administration of the solution
IAM technical and functional specifications
  • Synchronisation feed specifications
  • Workflow specifications
  • Security policy specifications
  • Provisioning specification

Issue

A major player in the aeronautical sector, let’s call it X, decided to provide shared access for all its branches and divisions. At the same time, X had set up a private cloud to store the access portal and shared services. To facilitate access to these services, X wished to offer a Single Sign-On service to its users, and extend this service to all its divisions.
X wanted to simplify the authentication process for users to access the “cloud”, which had to comply with four successive authentications at the time.

Our proposal

We analysed the existing portal

It was a web application installed in the “cloud”, federating access to all divisions, and allowing access to the shared resources of the company. The “cloud” contributed to direct access to shared services such as the CRM, intranet applications, HR, etc.

Choosing the right technical solutions

  • E-SSO (Enterprise SSO): An SSO device is installed on each workstation.  Whenever the user enters a login/password, the SSO remembers it locally. After the user has successfully logged on, the SSO agent waits for the application’s login request. It intercepts those requests and automatically fills in the fields.
  • Web SSO: Web SSO is an extension of the E-SSO device, designed specifically for web applications. A web portal is the interface between the client and the applications.
  • SSO federation:

Analysing each scenario

  • Scenario 1: Using E-SSO for various divisions
  • Scenario 2: Using WAM for the main portal and offering E-SSO as an option
  • Scenario 3: Integrating the access portal into the WAM and offering E-SSO as an option

Analysing the costs: in terms of equipment, licences and effort required to implement each scenario

Offering an analysis of the different scenarios: selection criteria, decision matrix, SWOT table

Find out more

Complete the form on the right of this page, and you will be contacted by one of the technical agents for this implementation.



contact
CONTACT


contact
NEWS

To receive Evidian news, please fill the following form.