Identity Management Training Academy

SEARCH:

Identity Management Training Academy

Learning Seminars

Integrating Aurion with Enterprise Applications

Enterprises are increasingly investing heavily in solutions and technologies to solve urgent compliance, user management and role management problems.

Many Enterprises are trying to build new, flexible and automated infrastructure for managing users and access rights.

In this seminar, understand the benefits of integrating Aurion with Enterprise Applications and see how AurionHR can be used to automate and streamline the driving demands of Compliancy, Security and Audit across the enterprise through automated user lifecycle and role based management.

Integrating chris²¹ with Enterprise Applications

Enterprises are increasingly investing heavily in solutions and technologies to solve urgent compliance, user management and role management problems.

Many Enterprises are trying to build new, flexible and automated infrastructure for managing users and access rights.

In this seminar, understand the benefits of integrating chris21 with Enterprise Applications and see how chris21 HR can be used to automate and streamline the driving demands of Compliancy, Security and Audit across the enterprise through automated user lifecycle and role based management.

Integrating Talent2 with Enterprise Applications

Enterprises are increasingly investing heavily in solutions and technologies to solve urgent compliance, user management and role management problems.

Many Enterprises are trying to build new, flexible and automated infrastructure for managing users and access rights.

In this seminar, understand the benefits of integrating Talent2 with Enterprise Applications and see how Talent2HR can be used to automate and streamline the driving demands of Compliancy, Security and Audit across the enterprise through automated user lifecycle and role based management.

Password management using FIM Portal

FIM extends the password synchronisation capabilities of its ILM and MIIS predecessors to include Self Service Password Reset (SSPR) for Microsoft Windows Active Directory domain network-authenticated users.  This feature is designed to address the spiraling costs of Help Desk support calls simply for users who have forgotten their passwords.

In this seminar, learn how FIM integrates with both the XP and Windows 7 desktops to provide out-of-the-box mechanisms to

  1. design SSPR policy to suit your organization;
  2. synchronize a user’s AD password with passwords stored in other connected systems for that individual
  3. auto-register users for the SSPR service;
  4. provide an integrated windows desktop facility at point of login to authenticate by providing the correct answers to questions recorded at registration; and
  5. provide those same SSPR facilities to users accessing the network over the internet (SP2)

Understand how this not only increases productivity and satisfaction for employees, while significantly reducing Help Desk overheads, but importantly provides an unprecedented capability of extending company services to persons outside of the enterprise network, the volumes of which would be unmanageable without this type of capability.

Workflow using FIM Portal

FIM extends the identity provisioning and synchronisation capabilities of its ILM and MIIS predecessors by providing a policy-driven automated identity and access management (IAM) workflows delivered via a SharePoint portal.  The fully extensible schema of the FIM metaverse is now extended to a portal to provide a means to define and drive IAM policy at the most granular of levels through FIM’s change notification service architecture built on Windows Workflow Foundation (WWF).

In this seminar, learn how policies governing

  1. provisioning
  2. user self service
  3. password management
  4. group management
  5. approvals, and
  6. an infinite number of custom activities

are designed and implemented in the portal, and where synchronization and provisioning is involved, how this is executed by what is now referred to as the FIM Synchronization engine.

Head in the clouds – navigating the identity pitfalls of a complex cloud migration

You hear a lot about the wonderful world of directory sync, SSO and federation with cloud applications, and all of these technologies really can do what they say on the tin, so long as you have an immaculately managed local directory. But do you? Migrating to the cloud may be just about to expose all those cracks that have been papered over for so long – be careful of what falls through!
This session will draw on the experience of a complex, multi-national BPOS migration, sharing the slip-ups, oversights and rude awakenings, as well as the steps taken to keep the project on track to a successful completion.

Using FIM to manage BPOS/Office 365

The BPOS administration experience is limited in a number of key areas which make it insufficient to the needs of a large organization. While Office 365 brings some much needed delegation flexibility, it will still fall short in several key areas.
This session will demonstrate how the FIM 2010 Portal can be extended to become an administration console for BPOS, including:
• Password reset,
• Subscription and activation management,
• Ability to assign subscriptions to different cost codes for internal billing, and
• Making available information unavailable in the BPOS admin console, such as mailbox size, and tracking of mobile devices.

Writing your Identity and Access Management Blueprint

This seminar is for those who need to develop a plan which prioritises their identity and access management (IAM) objectives and projects and would like to hear about the experiences in other organisations. The implementation of an IAM solution will address a number of business and IT service issues.  A number of IAM initiatives are commenced to address a specific pain point, and organisations may or may not have a “bigger picture” perspective on the opportunities to generate significant business value from an enterprise IAM solution.  An IAM Blueprint will highlight those opportunities, present a target IAM Conceptual Architecture and propose an implementation roadmap that will achieve the target outcomes in a controlled and risk-managed manner.  This Learning Seminar will outline how UNIFY analyses the existing identity-related business processes together with the related systems, technical and ICT services environments to identify opportunities to enhance business value.  We will also cover the architectural options for IAM solutions and the range of development, implementation and transition issues that need to be considered when finalising am IAM strategy and implementation blueprint.

Integrating SAP HCM with Enterprise Applications using FIM

Enterprises are increasingly investing heavily in solutions and technologies to solve urgent compliance, user management and role management problems.

Many Enterprises are trying to build new, flexible and automated infrastructure for managing users and access rights.

In this seminar, understand the benefits of integrating SAP HCM with Enterprise Applications and see how SAP HCM can be used to automate and streamline the driving demands of Compliancy, Security and Audit across the enterprise through automated user lifecycle and role based management.

SSO is the latest “must have”. But what is it?

In this session, gain understanding of the differing options around SSO such as Same Sign On, Single Sign On and potential pitfalls together with the key points and drivers that need to be considered before embarking on your SSO journey.