<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1922773519802400625</atom:id><lastBuildDate>Wed, 11 Sep 2024 13:47:33 +0000</lastBuildDate><title>Identity Management Lessons</title><description></description><link>http://idmlessons.blogspot.com/</link><managingEditor>noreply@blogger.com (Mike Conklin)</managingEditor><generator>Blogger</generator><openSearch:totalResults>16</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-4771288868963250530</guid><pubDate>Thu, 18 Mar 2010 15:36:00 +0000</pubDate><atom:updated>2010-03-18T11:36:48.969-04:00</atom:updated><title>Almost a year...</title><description>It has been almost a year since my last post here... &amp;nbsp;apparently, when you&#39;re in the middle of an IdM rollout, you don&#39;t get much time for things like blogs. &lt;br /&gt;
&lt;br /&gt;
And sadly enough, this is actually going to be one of my last posts here. &amp;nbsp;Lots of things have happened over the past year, including me leaving the University to start my own company, doing independent consulting. &amp;nbsp;All of my posts now will be on my new company&#39;s site, &lt;a href=&quot;http://www.conklintechnology.com/&quot;&gt;www.conklintechnology.com&lt;/a&gt;. &amp;nbsp;I still plan on posting articles about IdM news, but will also branch out to include some other topics, such as Intranets and CMS platforms, like Drupal, Plone and Joomla, &amp;nbsp;as well as some brand new services that I&#39;m planning to offer, including a &lt;a href=&quot;http://conklintechnology.com/site/2010/03/16/hosted-ldap-server-announcemen/&quot;&gt;cloud-based LDAP server&lt;/a&gt; to get you up and running within minutes. &lt;br /&gt;
&lt;br /&gt;
I will plan on posting one final summary of the IdM project at UofR, some thoughts on what went well, what didn&#39;t, and things you can learn from our experience. &amp;nbsp;But for now, you might want to &lt;a href=&quot;http://conklintechnology.com/site/feed/&quot;&gt;subscribe to my new blog&#39;s feed&lt;/a&gt; to stay up-to-date.</description><link>http://idmlessons.blogspot.com/2010/03/almost-year.html</link><author>noreply@blogger.com (Mike Conklin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-3872431326944602266</guid><pubDate>Wed, 08 Apr 2009 12:29:00 +0000</pubDate><atom:updated>2009-04-08T09:09:28.935-04:00</atom:updated><title>Those crazy Rock Hounds</title><description>I got a &lt;a href=&quot;http://identigral.com/blog/2009/04/03/opt-me-in-opt-me-out&quot;&gt;great response&lt;/a&gt; from Deborah Volk at Identigral regarding my little thought exercise on dynamic opt-in/opt-out mailing lists.   In this case, a mailing list for Geology majors, as well as anyone else interested in the occasional  spelunking field trip.&lt;br /&gt;&lt;br /&gt;Her approach is perfectly valid (and truthfully, makes more sense than what I was trying to do...).  Basically, her suggestion is to use the various provisioning mechanisms of an identity management package, like &lt;a href=&quot;http://www.oracle.com/products/middleware/identity-management/identity-management.html&quot;&gt;OIM&lt;/a&gt;, to maintain the membership of a particular mailing list or group.   People could be automatically provisioned into a group at time of account creation, or be event-based, such as someone switching majors.  By providing other workflows, such as opt-in or opt-out, users could also add or remove themselves from that static group ad hoc.&lt;br /&gt;&lt;br /&gt;What I was trying to accomplish was to put the logic of list membership into the list definition itself.  Meaning, if I wanted to send out this week&#39;s Geologic Times newsletter, the group membership would be dynamically determined as soon as I hit the &quot;Send&quot; button.  Anyone, at that point in time, who was either a Geology major, or had opted in to the list, would then be sent the email.&lt;br /&gt;&lt;br /&gt;In summary...&lt;br /&gt;&lt;br /&gt;The IdM-centric approach:&lt;br /&gt;IdM workflows provision users into a static group for mailing list membership.  The triggers for adding users into this group could be event-driven, such as at time of account creation, or manual, such as an end-user opting in or out of the list.  The &#39;dynamic&#39; part of the list is handled by the IdM software.&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;http://idmlessons.blogspot.com/2009/03/combining-dynamic-and-static-groups.html&quot;&gt;mailing list logic approach&lt;/a&gt;:&lt;br /&gt;Using advanced LDAP filters, create a mailing list that would dynamically determine membership at the point in time an email was sent to the list.  This would most likely be driven off of attributes or roles assigned to the user objects in a directory store, such as Sun Directory Server or Active Directory.  There is no &#39;group&#39; per se -- it is the LDAP query filter that determines list membership.&lt;br /&gt;&lt;br /&gt;Like I said earlier, Deborah&#39;s approach makes much more sense, if you have the IdM workflow engine already.  However, true dynamic opt-in/opt-out lists are still possible without an IdM solution, but would be more difficult to create and maintain.</description><link>http://idmlessons.blogspot.com/2009/04/those-crazy-rock-hounds.html</link><author>noreply@blogger.com (Mike Conklin)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-7446605106476402567</guid><pubDate>Wed, 01 Apr 2009 17:18:00 +0000</pubDate><atom:updated>2009-04-01T13:25:40.456-04:00</atom:updated><title>Another use case for good IdM workflows?</title><description>While I&#39;m sure UC San Diego will learn all sorts of valuable lessons from this situation, what it should teach everyone else is the importance of establishing proper approval chains for workflows (such as sending out acceptance letters), and a strong business case for some sort of distribution list management tool...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.nbcsandiego.com/news/local/Youre-Out-Youre-In-No-Youre-Out.html?yhp=1&quot;&gt;http://www.nbcsandiego.com/news/local/Youre-Out-Youre-In-No-Youre-Out.html?yhp=1&lt;/a&gt;</description><link>http://idmlessons.blogspot.com/2009/04/another-use-case-for-good-idm-workflows.html</link><author>noreply@blogger.com (Mike Conklin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-3487565123220954038</guid><pubDate>Wed, 01 Apr 2009 14:37:00 +0000</pubDate><atom:updated>2009-04-01T11:05:20.281-04:00</atom:updated><title>ILM2 delayed until Q1 2010</title><description>This news certainly comes as a surprise, considering our Microsoft sales team apparently wasn&#39;t even aware of the delay.  Architecting a solution around software that &lt;span style=&quot;font-style: italic;&quot;&gt;might &lt;/span&gt;ship sometime in the next 12 months doesn&#39;t seem like a wise decision to me though...&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://jacksonshaw.blogspot.com/2009/03/microsofts-ilm2-delay-hurts.html&quot;&gt;Jackson&#39;s Identity Management &amp;amp; Active Directory Reality Tour Travelblog: Microsoft&#39;s ILM&quot;2&quot; delay hurts&lt;/a&gt;</description><link>http://idmlessons.blogspot.com/2009/04/jacksons-identity-management-active.html</link><author>noreply@blogger.com (Mike Conklin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-135396748682660487</guid><pubDate>Fri, 13 Mar 2009 12:38:00 +0000</pubDate><atom:updated>2009-03-13T09:10:28.455-04:00</atom:updated><title>Directory Self-service applications</title><description>These are some of the vendors that provide products that enable end-users to update their own records in a directory server (most, if not all, of the products below are primarily AD focused though).  This could include the ability to do password resets without calls to the help desk, but I was looking at their capability for managing opt-in/opt-out of distribution lists.&lt;br /&gt;&lt;br /&gt;(Note:  I haven&#39;t used any of these products, although several do offer live demos from their web sites)&lt;br /&gt;&lt;br /&gt;Imamani:&lt;br /&gt;Their &lt;a href=&quot;http://www.imanami.com/products/smartdl/default.aspx&quot;&gt;Smart DL&lt;/a&gt; product allows end-users to create dynamic distribution lists based on AD attributes.  I don&#39;t know whether they also provide an opt-in/opt-out capability though.&lt;br /&gt;&lt;br /&gt;Namescape:&lt;br /&gt;There are several different versions of their rDirectory product.  However, according to their &lt;a href=&quot;http://www.namescape.com/Products/rDirectory/Editions/Default.aspx&quot;&gt;comparison chart&lt;/a&gt;, both the Professional and Enterprise editions offer a &#39;Group Self-Subscription&#39; feature.  The Enterprise edition looks to be a full-fledged IdM solution, with User Provisioning capabilites,&lt;br /&gt;&lt;br /&gt;ManageEngine:&lt;br /&gt;Their AD Self-Service Plus product looks to primarily be aimed at allowing end-users to perform password resets without calling in to a help desk, but according to the &lt;a href=&quot;http://www.manageengine.com/products/self-service-password/index.html&quot;&gt;product page&lt;/a&gt;, one of the listed features is &#39;Update Personal AD Info&#39;.  I&#39;m not sure if this could be extended to provide some sort of group/mailing list subscription capability though.&lt;br /&gt;&lt;br /&gt;Securitay:&lt;br /&gt;Like the Imanami product, the &lt;a href=&quot;http://www.securitay.com/GMP.html&quot;&gt;Group Management Portal&lt;/a&gt; allows end-users to create and manage their own distribution lists in AD/Exchange.  Although from what I could tell from the live demo site, it seems to be only managed groups (meaning, members are manually added vs. dynamically updated based on user attributes)&lt;br /&gt;&lt;br /&gt;And I would remiss if I didn&#39;t mention Microsoft&#39;s new &lt;a href=&quot;http://www.microsoft.com/windowsserver/ilm2/overview.mspx&quot;&gt;ILM&quot;2&quot;&lt;/a&gt; product (which is only a release candidate now, but should available soon).  This latest version of their identity management offering does have some pretty nice group management capabilities, along with the ability to delegate dynamic list creation to end-users.  Of course, the primary focus of ILM&quot;2&quot; is user provisioning and the synchronization of identity data across many different target systems.  But the rich end-user self-service interface is a nice differentiator compared to many other full-service IdM stacks out there today.</description><link>http://idmlessons.blogspot.com/2009/03/directory-self-service-applications.html</link><author>noreply@blogger.com (Mike Conklin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-6951915105013398615</guid><pubDate>Thu, 12 Mar 2009 14:40:00 +0000</pubDate><atom:updated>2009-03-12T15:40:19.354-04:00</atom:updated><title>Combining dynamic and static groups</title><description>After my &lt;a href=&quot;http://idmlessons.blogspot.com/2009/03/dynamic-distribution-lists-with-opt-out.html&quot;&gt;previous post&lt;/a&gt;, I&#39;ve been trying to figure out some solutions to the scenario I presented (a dynamic email group with opt-in/opt-out capabilities).  I got some good suggestions from &lt;a href=&quot;http://360tek.blogspot.com/&quot;&gt;Matt Flynn&lt;/a&gt; and will have a subsequent post with some commercial tools that provide end-user  self-service for things like distribution list management in AD or LDAP.&lt;br /&gt;&lt;br /&gt;My bigger concern, though, was trying to prove out my little quasi-code example in Sun Directory Server.  While the software supports dynamic groups, defined with an LDAP search URL, it seems to be client-specific as to whether those dynamic URLs in the group definition are actually followed (meaning, the users matching the URL filter are returned to the client).  I was unable to get a command-line ldapsearch query to successfully return all the members of a dynamic group (suggestions, anyone?).  However, by using a combination of managed and filtered roles, instead of groups, it was quite easy to accomplish this. &lt;br /&gt;&lt;br /&gt;First, you can define a managed (static) role and manually assign users in.  This could be your &quot;opt-in&quot; group -- those users who would like to receive an email newsletter, for example, but would not normally be included automatically based on degree or major or what have you.  With a self-service tool, users could add themselves into this managed role as a sort of &#39;subscribe&#39; functionality.&lt;br /&gt;&lt;br /&gt;Secondly, if needed, you could assign an attribute for the opt-out capability.  Unfortunately, you can&#39;t use the &#39;nsRole&#39; calculated attribute as part of the filter in the definition of another role.  But there are certainly ways around this limitation (extend the schema to include an attribute called &#39;optout&#39; with the value of the list name, or just use an existing attribute like &#39;memberof&#39; with a value of your choice).  You also can&#39;t use the &#39;isMemberOf&#39; attribute (which is used to return all the static group memberships for a particular user), because, again, this is a calculated attribute.&lt;br /&gt;&lt;br /&gt;For reference purposes, here is the filtered role definition I used for testing my example:&lt;br /&gt;&lt;span style=&quot;font-family: courier new;&quot;&gt;nsRoleFilter: (&amp;amp;(sn=Black)(!(memberof=optout_dllist)))&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;(All users with a last name of &quot;Black&quot;, EXCEPT for those who have a memberof attribute set to &quot;optout_dllist&quot;)&lt;br /&gt;&lt;br /&gt;Once the filtered role is defined, you can then create a nested role with the managed (static) role you created for &#39;opt-ins&#39;, along with the filtered role with users matching a particular criteria (and optionally, excluding those who may have opted out)  After the nested role has been defined, you can simply query a given user for the &#39;nsrole&#39; attribute to see which roles they belong to, or search directly against the &#39;nsrole=nested_role_dn&#39; to show all the members of the role.  Note that you must explicitly ask for the nsrole attribute in an ldapsearch command -- just doing a normal search against a user&#39;s attributes will not show their role memberships.&lt;br /&gt;&lt;br /&gt;And to save you some of the same headaches that I went through, since a role is defined as a subentry, it is not returned in a normal ldapsearch command.  You must specifically ask for them using a search filter like : &lt;span class=&quot;codeline&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family: courier new;&quot;&gt;&quot;(&amp;amp;(objectclass=nsManagedRoleDefinition)(objectclass=ldapSubEntry))&quot; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;For additional information about Roles in SUN DSEE 6.3, the documentation is &lt;a href=&quot;http://docs.sun.com/app/docs/doc/820-2763/bcajv?a=view&quot;&gt;here&lt;/a&gt;.</description><link>http://idmlessons.blogspot.com/2009/03/combining-dynamic-and-static-groups.html</link><author>noreply@blogger.com (Mike Conklin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-1686319973865548872</guid><pubDate>Wed, 04 Mar 2009 19:10:00 +0000</pubDate><atom:updated>2009-03-05T12:48:57.766-05:00</atom:updated><title>Dynamic distribution lists with opt-out capabilities?</title><description>After posing this question to several vendors in our IdM evaluation meetings, I actually think that there are no current solutions out there that will allow you to create dynamic distribution lists with opt-in/opt-out capabilities.  I&#39;m not entirely sure &lt;span style=&quot;font-style: italic;&quot;&gt;why&lt;span style=&quot;font-style: italic;&quot;&gt; &lt;/span&gt;&lt;/span&gt;one might want to do this, but being at a university, I can do things simply for academics&#39; sake, right?&lt;br /&gt;&lt;br /&gt;Here&#39;s the scenario:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;A school wants to offer a newsletter to all of its Geology majors.  Maybe it will provide information about guest lecturers or other events.  This DL could be pretty easily set up in Exchange 2003 (or 2007) using a query-based distribution group (ie: an AD attribute matching &quot;studentMajor=Geology&quot;).  As new students join the program, they will automatically receive the newsletter because their &#39;studentMajor&#39; attribute will match the filter criteria, without any manual intervention from list owners or AD administrators.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;However, maybe there are students with other majors who have an interest in geology, and would like to receive the weekly email newsletter. Or conversely, a Geology major who wants to reduce his inbox clutter and wishes to opt out.&lt;/li&gt;&lt;/ul&gt;I realize that you could construct a complex filter for the mailing list, which would take into account these other two situations (an opt-in, and an opt-out).  So now your filter string for the DL would look something like this (in quasi-code...):&lt;br /&gt;(((studentMajor=Geology)(|optInDL=Geology))(&amp;amp;!optOutDL=Geology))&lt;br /&gt;&lt;br /&gt;(roughly translated: your major is Geology, or you&#39;ve opted in to the DL, AND you have not opted out of the list)&lt;br /&gt;&lt;br /&gt;However, I haven&#39;t really found anything out there to do something like this.  There are some products from &lt;a href=&quot;http://www.imanami.com/&quot;&gt;Imanami &lt;/a&gt;called SmartDL and WebDir, though I&#39;m not sure they&#39;re a fit either.  SmartDL allows for the creation of query-based distribution groups (just like in Exchange...), and WebDir offers end-users some control over their AD attributes.  I guess a combination of these two products would (somewhat inelegantly) accomplish the above scenario.&lt;br /&gt;&lt;br /&gt;Any other ideas out there?</description><link>http://idmlessons.blogspot.com/2009/03/dynamic-distribution-lists-with-opt-out.html</link><author>noreply@blogger.com (Mike Conklin)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-1249682371589489206</guid><pubDate>Wed, 04 Mar 2009 01:20:00 +0000</pubDate><atom:updated>2009-03-05T12:49:14.983-05:00</atom:updated><title>Long overdue update</title><description>Despite the lack of posts over the past few weeks, the project has been making good progress.  Here are some of the things that we&#39;ve been working on:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Wrap-up of initial round of interviews&lt;/span&gt;&lt;br /&gt;After meeting with all the schools and departments around the University, Identropy took the information, analyzed it, and boiled it down into a nice presentation for all the participants.  This initial analysis helped us to decide on an initial scope for the pilot phase of the project -- something manageable, but that will still provide tangible and meaningful benefits to the University.  We chose to focus first on one school and its various user populations, including students, faculty and staff.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;An in-depth business process analysis&lt;/span&gt;&lt;br /&gt;In an effort to better understand the current business process for on-boarding students in the &lt;a href=&quot;http://www.rochester.edu/warner/index.php&quot;&gt;Warner School&lt;/a&gt;, we had several days of meetings with the various departments within the school.  These meetings were very useful, had great participation (from the Registrar, Admissions department, Financial Aid office, and especially Dave Garcia, their IT director), and allowed us to really delve into the processes in place today, as well as the target systems involved.  Doing this upfront work also brought to light some places in the processes that could be improved, both from an efficiency standpoint, as well as to prevent some problems with creating bad or duplicated identity data.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Vendor evaluations are underway&lt;/span&gt;&lt;br /&gt;We&#39;ve had several good vendor demos already, with a few more later on this week.   Once these have been completed, we&#39;ll look at the feedback from the various technical folks from the University who have been in attendance, weigh the strengths and weaknesses of the different solutions, and select the one with the best fit for our environment and business processes.&lt;br /&gt;&lt;br /&gt;After having made it this far, there are a few early lessons that we&#39;ve learned that might help another institution starting a similar project:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;For a University especially (or any highly decentralized organization), it is good to keep the different parts of the organization involved and engaged as the project progresses.  Even though the initial phase will focus on one school, the lessons learned there will be applied to other schools and departments, and it&#39;s good to keep the other organizations apprised of the project&#39;s status.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Limit your vendor analysis to a handful of ones you want to really focus on.  But don&#39;t necessarily include only those vendors that may already be existing partners of your institution.   It&#39;s good to include current vendors, since the integration time (and ultimately, cost) might be reduced, but by bringing in a few new faces, you might be surprised at the number of different approaches to the same problems.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;When evaluating vendors, we have tried to keep a level playing field by providing each vendor with the same set of use cases, and then evaluating them with the same weighting system.  Identropy really helped to facilitate this process for the University of Rochester, by creating that initial set of use cases based upon our business process analysis.  As your project begins to get ready to evaluate product offerings, use your BPM analysis results to create simplified, but representative, use cases that the vendors can demonstrate for you.&lt;/li&gt;&lt;/ul&gt;</description><link>http://idmlessons.blogspot.com/2009/03/long-overdue-update.html</link><author>noreply@blogger.com (Mike Conklin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-6376365513584791588</guid><pubDate>Mon, 19 Jan 2009 21:35:00 +0000</pubDate><atom:updated>2009-01-21T10:29:53.578-05:00</atom:updated><title>A balancing act</title><description>We had some great sessions last week!  Throughout the 10+ meetings, we had excellent turnout and participation from the many different schools and departments around the University.  A ton of good process information was collected, and now Identropy has the (unenviable) task of analyzing it all and presenting a distilled version back to the team.&lt;br /&gt;&lt;br /&gt;One common theme that sort of emerged for me after mentally digesting last week is the sense that any identity management project is really a series of balancing acts.  On many different fronts, decisions need to be made that will impact large numbers of users, while still accomplishing the overriding goal of the project.  For example, &lt;br /&gt;&lt;br /&gt;Business Processes:&lt;br /&gt;Current processes are most likely deficient in some way (inefficient, or insecure) but introducing new processes or procedures requires the buy-in of many different departments.  It&#39;s important to balance their needs when implementing changes -- not to cause too much disruption to their daily routines and deliverables, while still making meaningful improvements to the processes as required by the project.&lt;br /&gt;&lt;br /&gt;Technology:&lt;br /&gt;Specifically, keeping current technology versus introducing new products.  There may be times when existing products may be sufficient to achieve the goals laid out by the IdM project, but more often than not, you&#39;re going to have gaps in the stack of software installed today.  The bigger question is whether to replace current systems with different vendors.  It&#39;s a tough call -- on the one hand, you have already invested time and energy into learning your current product, and have some institutional knowledge around it.  On the other hand, it may not be the right solution for the ultimate end-state, and the project would be better served with a new or different product, which of course introduces some learning curve issues for admins, on top of all the other process changes going on simultaneously.  &lt;br /&gt;&lt;br /&gt;Project Timeline/Deliverables:&lt;br /&gt;As I discussed in a &lt;a href=&quot;http://idmlessons.blogspot.com/2008/12/put-one-foot-in-front-of-other.html&quot;&gt;previous post&lt;/a&gt;, determining the scope of the initial phase of your IdM project is key to the overall success of it.  Doing too much at once will likely cause burnout, and potential failure, but making too little concrete progress will cause problems with project sponsors and the leadership team who want to see that the (increasingly tight) IT budget is being well-spent.</description><link>http://idmlessons.blogspot.com/2009/01/balancing-act.html</link><author>noreply@blogger.com (Mike Conklin)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-5735364287914218744</guid><pubDate>Tue, 13 Jan 2009 01:32:00 +0000</pubDate><atom:updated>2009-01-12T20:47:26.936-05:00</atom:updated><title>A long week ahead</title><description>Today we kicked off the week-long information gathering sessions with &lt;a href=&quot;http://www.identropy.com/&quot;&gt;Identropy&lt;/a&gt;.  We spent the day filling in Ash and Byron about the various meetings that have been scheduled, and a little overview of the technical architecture, as well as I could do, at least...  &lt;br /&gt;&lt;br /&gt;We should have a very informative week ahead of us -- the meetings have been scheduled with many of the key people around the University, including business and technical people from many of the colleges and departments, as they pertain to identity management.  The response to the meeting invitations has been good so far -- hopefully the sub-zero temperatures later in the week don&#39;t discourage people from attending!&lt;br /&gt;&lt;br /&gt;These first sessions will help to provide a general overview of many of the processes and systems for the vast majority of user populations at the UofR.  Once this first round of meetings is complete, we&#39;ll have some more &quot;deep-dive&quot; sessions to really drill down into the details of whatever subset of users/processes is decided to be phase 1 of the project.  &lt;br /&gt;&lt;br /&gt;I&#39;ll post again at the end of the week, with some more thoughts about the interview sessions with the data and system owners.</description><link>http://idmlessons.blogspot.com/2009/01/long-week-ahead.html</link><author>noreply@blogger.com (Mike Conklin)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-8627463128294166259</guid><pubDate>Thu, 11 Dec 2008 14:00:00 +0000</pubDate><atom:updated>2008-12-11T09:07:04.872-05:00</atom:updated><title>Contacts at other Universities</title><description>As things start to pick up speed here after the holidays, it would be nice to talk with people out there in Academia who have undertaken similar efforts at their own institutions.  This wouldn&#39;t have to be anything terribly formal, but it might involve an hour-long phone call with some of the members of our project team, or, depending on your proximity to upstate New York, we might even be able to arrange a trip out to your school for a face-to-face meeting.  &lt;br /&gt;&lt;br /&gt;Basically, we&#39;d be looking for any of the roadblocks you overcame in your Identity Management project, understand the choices you made in your implementation, and any words of wisdom you might have for our team as we begin to delve deeper and deeper into our project.  &lt;br /&gt;&lt;br /&gt;If you and your project team would be interested in talking to us, you can contact me via the LinkedIn button on the right hand menu.  I look forward to hearing from you!</description><link>http://idmlessons.blogspot.com/2008/12/contacts-at-other-universities.html</link><author>noreply@blogger.com (Mike Conklin)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-8737964745764812229</guid><pubDate>Thu, 04 Dec 2008 18:42:00 +0000</pubDate><atom:updated>2008-12-04T14:13:20.271-05:00</atom:updated><title>Put one foot in front of the other</title><description>So as I was watching &lt;a href=&quot;http://www.amazon.com/gp/product/B000R7G6JA?ie=UTF8&amp;tag=identmanagles-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=B000R7G6JA&quot;&gt;&quot;Santa Claus is Coming to Town&quot;&lt;/a&gt; with my son the other night, I realized how many different things the song &quot;Put One Foot in Front of The Other&quot; could apply to, including Identity Management projects!&lt;br /&gt;&lt;blockquote&gt;Put one foot in front of the other&lt;br /&gt;And soon you&#39;ll be walkin&#39; &#39;cross the flo-o-or&lt;br /&gt;Put one foot in front of the other&lt;br /&gt;And soon you&#39;ll be walkin&#39; out the door.&lt;/blockquote&gt;&lt;br /&gt;Many times, people involved with large-scale IdM rollouts become overwhelmed with where to even begin.  But taking things one step at a time not only makes the work more manageable, it also gives you some tangible benefits along the way.  The first thing to do is understand what you&#39;ve already got -- meaning, map out current processes, understand the various systems involved, and figure out who the key players are in each process.  &lt;br /&gt;&lt;br /&gt;Once all of your processes have been identified and documented, start with one or two of them.  With your new understanding of these processes, it will be easier to decide on a vendor or product that will suit your needs.  And if the product has already been decided/implemented, you can begin work on incorporating those business processes into the software.  &lt;br /&gt;&lt;br /&gt;If those first two steps seem too difficult, break them down into smaller steps.  At a university, maybe instead of tackling all the various user populations, start with only students.  Or even only undergraduates.  Whatever seems manageable in your environment.  The key is to tackle tasks in a way that allows you to complete them in a reasonable amount of time and effort -- this provides not only concrete results, but gives team members a sense of accomplishment along the way.  A 2 year project without any sort of tangible results will certainly cause some burnout on your project team.  So...    &lt;br /&gt;&lt;br /&gt;You never will get where you&#39;re goin&#39;, if you never get up on your feet! Come on! There&#39;s a good tail wind blowin&#39; A fast walkin&#39; man is hard to beat!</description><link>http://idmlessons.blogspot.com/2008/12/put-one-foot-in-front-of-other.html</link><author>noreply@blogger.com (Mike Conklin)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-6744695556800949713</guid><pubDate>Mon, 01 Dec 2008 03:15:00 +0000</pubDate><atom:updated>2008-11-30T22:49:36.554-05:00</atom:updated><title>IAM Success Tips</title><description>I just finished reading Corbin Links&#39; &lt;a href=&quot;http://astore.amazon.com/identmanagles-20/detail/1434890767&quot;&gt;IAM Success Tips, Volume 1&lt;/a&gt; and really think it would be a great resource for any new IdM initiative your organization might be starting.  I know that I will try to implement many of the suggestions in the book as we move forward with our project.  Many of the &quot;bad&quot; examples in the book -- the things &lt;span style=&quot;font-weight:bold;&quot;&gt;not &lt;/span&gt;to do -- brought back some memories for me...  I hope that this project at the U of R can avoid many of those common pitfalls.  Things like not understanding your current environment, and expecting a vendor&#39;s software package to solve all the IdM problems that have grown out of bad business processes.&lt;br /&gt;&lt;br /&gt;I look forward to the imminent release of Volume 2 (which, according to &lt;a href=&quot;http://www.linksbusinessgroup.com/blog/stepping-it-up&quot;&gt;this post&lt;/a&gt;, is slated for tomorrow!)</description><link>http://idmlessons.blogspot.com/2008/11/iam-success-tips.html</link><author>noreply@blogger.com (Mike Conklin)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-1313883410974804361</guid><pubDate>Wed, 26 Nov 2008 16:15:00 +0000</pubDate><atom:updated>2008-11-26T11:26:17.787-05:00</atom:updated><title>Identity management at a university</title><description>There are a few unique aspects to doing an identity management project at a university.  Well, if not unique, then certainly more pronounced or common than in a typical enterprise...&lt;br /&gt;&lt;br /&gt;One challenge is the decentralized nature of the university.  The number of individual organizations -- departments, schools, libraries, etc. -- is higher than that of a typical corporate environment.  And more importantly, each group has traditionally created its own processes and support mechanisms for their own end-users.  It will be important, as the project progresses, to build the identity framework in a flexible way that allows different organizations to feel like they are still in control of their data, but in turn, make that data (or subsets of that data) available to the University community at large.  Corporate deployments would usually have the luxury of having complete control of the environment, and typically has a central IT department.  This isn&#39;t always the situation, such as in the case of acquisitions, but usually IdM projects have the ability to set policy for the corporate-wide computing resources.&lt;br /&gt; &lt;br /&gt;The other aspect that makes an IdM project at a university different than within a corporate environment is the number of different relationships people may have to the organization.  First, identify the various relationships a person can have with the university and medical center (undergrad, grad student, alumnus/alumna, faculty, staff, contractor, patient).  And what commonly occurs is that a person has more than one relationship with the University (employees are also graduate students, students are doing work-study programs, etc).  Understanding these relationships, and documenting the process by which all the different types of users get added into the system(s) will be job number one for the project.</description><link>http://idmlessons.blogspot.com/2008/11/identity-management-at-university.html</link><author>noreply@blogger.com (Mike Conklin)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-9133629907582472479</guid><pubDate>Fri, 21 Nov 2008 14:46:00 +0000</pubDate><atom:updated>2008-11-21T21:48:12.588-05:00</atom:updated><title>A few more random identity managment thoughts</title><description>Just wanted to say a quick thank you to Ash for the workshop on Monday...  And add a few other thoughts:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://identityman.blogspot.com/2008/11/its-about-business.html&quot;&gt;Ash&#39;s Identity Management Rantings: It&#39;s About the Business...&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&quot;Identity management&quot; as a goal in and of itself doesn&#39;t mean a lot.  Concrete business requirements are necessary in order to have a project succeed.&lt;/li&gt;&lt;li&gt;It doesn&#39;t matter what you do on the back-end -- if the end users (and project sponsors) can&#39;t see tangible results that affect their day-to-day activities, all the process re-engineering and data clean-up in the world is going to go unnoticed and unappreciated.&lt;/li&gt;&lt;li&gt;For whatever reason, hearing the exact same thing come from an outside consultant actually sinks in with management, but this never seems to happen for internal people  :)&lt;/li&gt;&lt;/ul&gt;</description><link>http://idmlessons.blogspot.com/2008/11/just-wanted-to-say-quick-thank-you-to.html</link><author>noreply@blogger.com (Mike Conklin)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1922773519802400625.post-28558390688019197</guid><pubDate>Thu, 20 Nov 2008 17:43:00 +0000</pubDate><atom:updated>2008-11-20T12:58:53.180-05:00</atom:updated><title>The beginning</title><description>Hi!  Glad you stopped by...&lt;br /&gt;&lt;br /&gt;A little about me:  I have been designing and supporting identity management infrastructures long before there was a fancy name for them (like &quot;identity management infrastructures&quot;...)  This includes directory servers, Web access management systems, as well as the rest of the software stack that goes along with that (web servers, Java app servers, etc).  Currently, I work at the University of Rochester, where I am part of the team that will be developing the identity management strategy here, and implementing all the supporting technology.&lt;br /&gt;&lt;br /&gt;&quot;Identity Management Lessons&quot; seemed like an appropriate title for the site, seeing as this current project will be taking place at a university.  The articles will be focused on the overall process we&#39;re undertaking, the problems encountered (and hopefully some solutions to go along with them), unique concerns of rolling out identity management at a university and medical center, and general thoughts about the various technologies involved.</description><link>http://idmlessons.blogspot.com/2008/11/beginning.html</link><author>noreply@blogger.com (Mike Conklin)</author><thr:total>0</thr:total></item></channel></rss>