eviden-logo

Evidian > Services > Consulting

Consulting

Evidian provides a series of IAM consulting services to help you build your identity and access management project. These services cover three principle domains:

  •  Implementation/demonstrator's assistance with implementation/model
  •  Advice and audit services
  •  Design: technical architecture with the constraints of high availability (IT safety plan), detailed IAM functional specifications (workflow, policy, upstream and downstream provisioning), SSO and strong authentication, Web SSO

Demonstration

For our E-SSO & Authentication Manager, WAM, IAM and SafeKit products, Evidian offers to implement a POC (Proof of concept)

Prerequisites
  • POC specification/Needs requirement from the pilot project
  • List of constraints: number of sites, deadlines, costs, number of persons, number of applications, etc.
  • Technical infrastructure: VM, directory technology (e.g. AD/ADLS, Fedora, database)
Participants
  • RSSI/Project Manager, MOA, MOE
Content
  • POC script
  • Installation and configuration of the EVIDIAN software according to the POC specification
  • Assistance
  • Restitution
Equipment
  • VM with the Evidian WAM software installed, presentation for the restitution

Design

Evidian offers you support in the design phase of your project using our E-SSO & Authentication Manager, WAM, IAM and SafeKit products.

Here are some examples of tasks that can be achieved in Evidian:

Task

Content

ESSO technical and functional specifications
  • Managing user security profiles
  • Managing security profiles for access points (workstations)
  • Managing application security profiles
  • Fast user switching
  • Administration of the solution
WAM technical and functional specifications
  • Managing the portal and/or local or remote web agents
  • Defining web servers
  • Managing services
  • Managing access control
  • Managing SSO
  • Managing data input
  • Managing authentication
  • Managing certificates and keys for CRLs
  • Administration of the solution
IAM technical and functional specifications
  • Synchronisation feed specifications
  • Workflow specifications
  • Security policy specifications
  • Provisioning specification

Advice & Audit

The advice and audit group offers to support you with:

  • Preparation studies
  • Defining the project (outline, project plan, WBS)
  • The design stages of the identity and access management solution

We will spend time specifically on considering the organisational and technical aspects of such projects, and the ROI: financial, for users, professionals, IT support teams and of course security teams (implemented from an SMSI, professional regulatory constraints: Bale II/III, Solvency, HIPAA).

With regard to audit, the methodology adopted is the following:

Here are some examples of consulting tasks that can be achieved in Evidian:

Task

Content

Audit of the existing set-up
  • Identifying the references and applications to be taken into account
  • Identifying existing processes and analysing how they take place
  • Analysing the directory architecture
  • Analysing the access control policy in place
  • Identifying access control measures
  • Identifying the applications provided/adapted
  • Identifying any SPOFs (Single Point of Failure) as well as Split Brain cases
Proposing a management model for the organisation's authorisations with Policy Manager
  • Modelling applications
  • Modelling professional roles
  • Defining professional roles
  • Defining rules for the separation of powers
Needs assessment in terms of strong authentication
  • Offering an access control policy based on the following three criteria:
  • User profiles
  • Access point profiles (user positions)
  • Application profiles
  • Detailed authentication mechanisms based on target users, terminals used and access achieved

Expert testimony

Issue

A major player in the aeronautical sector, let's call it X, decided to provide shared access for all its branches and divisions. At the same time, X had set up a private cloud to store the access portal and shared services. To facilitate access to these services, X wished to offer a Single Sign-On service to its users, and extend this service to all its divisions.
X wanted to simplify the authentication process for users to access the "cloud", which had to comply with four successive authentications at the time.

Our proposal

We analysed the existing portal

It was a web application installed in the "cloud", federating access to all divisions, and allowing access to the shared resources of the company. The "cloud" contributed to direct access to shared services such as the CRM, intranet applications, HR, etc.

Choosing the right technical solutions

  • E-SSO (Enterprise SSO): An SSO device is installed on each workstation.  Whenever the user enters a login/password, the SSO remembers it locally. After the user has successfully logged on, the SSO agent waits for the application's login request. It intercepts those requests and automatically fills in the fields.
  • Web SSO: Web SSO is an extension of the E-SSO device, designed specifically for web applications. A web portal is the interface between the client and the applications.
  • SSO federation:

Analysing each scenario

  • Scenario 1: Using E-SSO for various divisions
  • Scenario 2: Using WAM for the main portal and offering E-SSO as an option
  • Scenario 3: Integrating the access portal into the WAM and offering E-SSO as an option

Analysing the costs: in terms of equipment, licences and effort required to implement each scenario

Offering an analysis of the different scenarios: selection criteria, decision matrix, SWOT table

Evidian Products - Protect your company from cyber attacks by unauthorized users

Identity as-a-service

Evidian takes care of everything related to your Identity and Access Management with IDaaS

Learn more   >

Identity Governance and Administration

Manage access and authorization of all your users in your company

Learn more   >

Web Access Manager

Gateway for web apps with SSO, multi-factor authentication, identity federation

Learn more   >

Analytics

Monitoring and powerful reporting for regulatory compliance

Learn more   >

Authentication Manager

Authentication Manager

Enterprise multi-factor & passwordless authentication on Windows PCs

Learn more   >

Enterprise Single Sign-On (SSO)

Secure access to legacy and web apps on PCs & mobiles with SSO

Learn more   >

Self Service Password Reset (SSPR)

Reset Windows passwords online and offline

Learn more   >

SafeKit

High availability software for Evidian and partner applications

Learn more   >

Evidian IAM leader in the French and German markets and in U.S. Public Sector

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in France

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in Germany

Evidian IAM

Evidian IAM cyber security tools and solutions – Leader in Identity and Access Management in U.S. Public Sector

What are IAM cyber security tools and solutions?