
IdM Migration: Leading Global Security Company
Client is a leading global security company providing innovative products and solutions in unmanned systems, cyber, C4ISR, and logistics and modernization to government and commercial customers worldwide.
Key Challenges
The client needed to migrate from their end of life SUN IdM to Oracle’s solution. They also needed help streamlining existing IAM processes and to refine and simplify the existing implementation.
Identity and Access Management Migration
- Migrate the current Sun Identity
- Management system to Oracle Identity Manager (11gR2)
- No impact to business continuity
- Support all ongoing upgrade initiatives for workstations and other applications.
[/text-with-icon]
Security and Compliance Requirements
- Robust capability for access monitoring
- Consistent de-provisioning capability
- Improve Job-change and transfer processes
[/text-with-icon]
User Productivity
- Onboarding process was manual & error prone with multiple touchpoints
- Additional access process was cumbersome and time-consuming
[/text-with-icon]
Infrastructure Optimization
- Setup the infrastructure to be robust, highly available, secure and reliable
- Improve performance
[/text-with-icon]
SDG Solution
SDG accomplished this by doing an assessment of the existing implementation and identifying the process deficiencies, improvement areas, and pain points. Designed a robust approach for migration using SDG’s proprietary connector bridge framework. Refined role-based access and introduced improved lifecycle event management and access review processes.
Phased Migration Approach – Multiple phases to support parallel migration by dividing the responsibility of resource management
[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]
Connector Bridge – Provided a seamless integration between SIM adaptors and OIM connectors. Provided option of data push during the migration phase. Easy deployment or rollback.
[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]
Provisioning – Phased migration of all provisioning components to OIM using connector bridge frameworks, OIM membership rules, and role-based access policies.
[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]
Data Migration – User data, passwords including expiration, password history, challenge questions, roles and membership, delegated administration.
[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]
Access Policies – Defined the membership rules with access policies, event handlers for business logic.
[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]
Form Customization – Complex logic built into the process forms for masking or unmasking the data using process tasks.
[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]
Delegated Administration and Scoping – Scoping of entities like users, roles, and other objects. Handled OIM user scoping exceptions using OES and role exceptions using managed beans
[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]
Reports – OIM BI publisher reports covering user access, rogue accounts, exception reports etc.
[/icon_timeline_item][icon_timeline_item title_font_color=”#333333″ desc_font_color=”#333333″ title_font_size=”desktop:18px;tablet:18px;tablet_portrait:18px;mobile_landscape:16px;mobile:16px;” desc_font_size=”desktop:17px;tablet:17px;tablet_portrait:17px;mobile_landscape:15px;mobile:15px;”]
UI Customization – ADF customization for adding new page sections, AJAX refresh using managed beans. Handled scoping exceptions from Oracle using OES and managed beans.
[/icon_timeline_item][/icon_timeline]
Benefits Delivered
About SDG
SDG is a global cybersecurity, identity governance, risk consulting, and advisory firm that advises and partners with clients to address their complex security, compliance, and technology needs and delivers on strategy, transformation, and long-term management of their cybersecurity and IAM programs.