Académique Documents
Professionnel Documents
Culture Documents
Contents
Business Rationale
Services
Our Solution
Our Approach
Near-future Developments
About Us
the way we do it
Business Rationale
the way we do it
Services
Service
Authenticate Subject
(administrative functions behind
identities i.e. Identity
Management)
Functionality
I
I
I
I
I
I
Access Resource
(Entitlement i.e. Access
Management)
I
I
I
I
I
I
I
Monitoring
I
I
I
the way we do it
Our Solution
1. Security
y
4. Business Operations
6. Systems and
applications
Non-Personal Accounts -, ACL -, Profile
Management
Execution Track
9. Daily
use
Technical Track
Design and Implementation
of :
7. Business Architecture
8. HR- and process
User management
tooling
Organizational structure
registration
IAM-tooling Registration of:
IAM-tooling-governance
Which activities belong to which role
Which employee has which role in which context
IAM reporting
(Ist/Soll)
A1
A2
A4
A3
A6
A5
A8
A7
Businessproces 1
A1
A4
A3
A2
A5
A6
A7
A8
A9
A8
A9
A10
Businessproces 2
A1
A2
A3
A4
A5
A6
A7
HR-proces
A1
A2
A3
A4
A5
Afdelingsproces
Design
Completion
Realization
Resources
1 Invisible Infostructure is the end-state of infrastructure as we currently know it, using virtualization, grid and automated management technologies to deliver infrastructural services as a
commoditizedpreferably invisibleutility.
Our Approach
the way we do it
Near-Future Developments
Figure 2
Education / Awareness
Business
Aligned
IT-centric
Mindset
Ecosystem
Integrated
Federation
Context Based
Access Control
User Centric
Identity
Business
Process
Alignment
Role Based
Access Control
Delegated
Administration
Integrated
Identity
Rule Based
Access Control
Advanced
Self Service
Execution
Reactive
Managed
Agile
the way we do it
About Us
TechnoVision 2012
Our TechnoVision 2012 provides a
clear picture of the information
technologies that are the most relevant
to users and sheds some light on how
these technologies and their evolution
will impact business. It places Identity
and Access Management in various
clusters:
User Management as part of the
YOU Experience
Real-Time Business Process Control
and Composite Applications as part
of Process-on-the-Fly
Identity and Access Management is
essential in order to be able to
Thrive on Data. This includes
Mastered Data Management (Data
Governance)
Software-as-a-Service as part of the
Sector-as-a-Service
Deperimeterized Jericho style
Security and Identity as part of the
Invisible Infostructure
And the virtual Service Orientation
cluster.
About Capgemini
Capgemini, one of the
worlds foremost
providers of consulting,
technology and outsourcing services,
enables its clients to transform and
perform through technologies.
Capgemini provides its clients with
insights and capabilities that boost their
freedom to achieve superior results
through a unique way of working - the
Collaborative Business Experience -
www.capgemini.com