Scroll Top
Cybersecurity Lock

IdM Migration: Leading Global Security Company

Client is a leading global security company providing innovative products and solutions in unmanned systems, cyber, C4ISR, and logistics and modernization to government and commercial customers worldwide.

[image_with_animation image_url=”11897″ alignment=”center” animation=”Fade In” hover_animation=”none” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”50%” max_width_mobile=”default” img_link=”https://staging.sdgc.com/wp-content/uploads/IdM_Migration.pdf” margin_bottom=”20″]

Download Case Study

Key Challenges

The client needed to migrate from their end of life SUN IdM to Oracle’s solution. They also needed help streamlining existing IAM processes and to refine and simplify the existing implementation.

[text-with-icon icon_type=”image_icon” icon_image=”11562″]

Identity and Access Management Migration

  • Migrate the current Sun Identity
  • Management system to Oracle Identity Manager (11gR2)
  • No impact to business continuity
  • Support all ongoing upgrade initiatives for workstations and other applications.

[/text-with-icon]

[text-with-icon icon_type=”image_icon” icon_image=”11566″]

Security and Compliance Requirements

  • Robust capability for access monitoring
  • Consistent de-provisioning capability
  • Improve Job-change and transfer processes

[/text-with-icon]

[text-with-icon icon_type=”image_icon” icon_image=”11566″]

User Productivity

  • Onboarding process was manual & error prone with multiple touchpoints
  • Additional access process was cumbersome and time-consuming

[/text-with-icon]

[text-with-icon icon_type=”image_icon” icon_image=”11566″]

Infrastructure Optimization

  • Setup the infrastructure to be robust, highly available, secure and reliable
  • Improve performance

[/text-with-icon]

SDG Solution

SDG accomplished this by doing an assessment of the existing implementation and identifying the process deficiencies, improvement areas, and pain points. Designed a robust approach for migration using SDG’s proprietary connector bridge framework. Refined role-based access and introduced improved lifecycle event management and access review processes.

[icon_timeline timeline_line_color=”#425b76″ time_block_bg_color=”#f7f7f7″ time_sep_color=”#000000″ time_sep_bg_color=”#69d72d” tl_animation=”tl-animation-shadow” timeline_margin=”margin-right:5px;margin-left:5px;”][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]

Phased Migration Approach – Multiple phases to support parallel migration by dividing the responsibility of resource management

[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]

Connector Bridge – Provided a seamless integration between SIM adaptors and OIM connectors. Provided option of data push during the migration phase. Easy deployment or rollback.

[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]

Provisioning – Phased migration of all provisioning components to OIM using connector bridge frameworks, OIM membership rules, and role-based access policies.

[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]

Data Migration – User data, passwords including expiration, password history, challenge questions, roles and membership, delegated administration.

[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]

Access Policies – Defined the membership rules with access policies, event handlers for business logic.

[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]

Form Customization – Complex logic built into the process forms for masking or unmasking the data using process tasks.

[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]

Delegated Administration and Scoping – Scoping of entities like users, roles, and other objects. Handled OIM user scoping exceptions using OES and role exceptions using managed beans

[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]

Reports – OIM BI publisher reports covering user access, rogue accounts, exception reports etc.

[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]

UI Customization – ADF customization for adding new page sections, AJAX refresh using managed beans. Handled scoping exceptions from Oracle using OES and managed beans.

[/icon_timeline_item][/icon_timeline]

Benefits Delivered

[nectar_icon_list animate=”true” color=”Accent-Color” direction=”vertical” icon_size=”small” icon_style=”border”][nectar_icon_list_item icon_type=”numerical” title=”List Item” id=”1731952536819-7″ tab_id=”1731952536820-5″ text=”Our migration solution provided a seamless migration of different types of adaptors, enabling business as usual without any immediate training needs. Provided multiphase migration approach designed to align with ongoing business initiatives and system upgrades to avoid any disruption to business.”] [/nectar_icon_list_item][nectar_icon_list_item icon_type=”numerical” title=”List Item” id=”1731952536866-5″ tab_id=”1731952536867-2″ text=”Provided a highly available and secure clustering setup. Complete with disaster recovery and load balancing.”] [/nectar_icon_list_item][nectar_icon_list_item icon_type=”numerical” title=”List Item” id=”1731952536897-7″ tab_id=”1731952536898-10″ text=”Introduced clean approval and user lifecycle event management workflows. Including resource owner-based certification reviews to manage exceptions and transmute access.”][/nectar_icon_list_item][/nectar_icon_list]

Download Case Study

About SDG

SDG is a global cybersecurity, identity governance, risk consulting, and advisory firm that advises and partners with clients to address their complex security, compliance, and technology needs and delivers on strategy, transformation, and long-term management of their cybersecurity and IAM programs.