The ability to effectively manage the different steps of the service lifecycle is fundamental to the success of mobile service platforms. Indeed, while service lifecycle has been traditionally viewed as largely isolated steps, the need to take into a
Engineering Data Management (EDM): EDB + concepts to structure engineering ... Optional: product data as BLOBs or in Database File System. â¢ Information ...
knowledge and best practices gained on prior engagements using Microsoft internal implementations of Application Lifecycle Management (ALM) practices and ...
The Premier Event for Software and Systems Innovation. Application Lifecycle ... Project Reporting. Project Reporting ... New SAP. Solution. Solution Manager. Business Process. Change Analyzer. Rational Quality ... ALM Process Flow.
Mar 16, 2010 - What is ALM? The Software Development Life Cycle. (SDLC) is part of ALM â but its not the whole thing. ALM extends on both ends of SDLC ...
in any datacenter or cloud environment .... With CloudCenter, Enterprise IT organizations can migrate and manage .... service account with a fixed budget plan.
Feb 26, 2013 - and an army of support staff ... Broadest, Most Complete Range of Enterprise .... PowerPoint, PDF ... Cloud operations are enabled through.
A Product Lifecycle Management System (PLM System) is a software system that ... Historical Landscape: Engineering Data. Schallehn: Data .... SAP PLM (SAP).
impact of PLM processes, they need to examine two dimensions: ... department's black box, resulting in a critical enterprise ... data management; direct material sourcing; and product quality and ... True enterprise PLM requires a company to build ..
Apr 18, 2005 - Product Lifecycle Management Support: A Challenge in Supporting Product ...... researchers, practitioners, users and students to continuously ...
Mar 11, 2010 - Lector's DLCM â Data Lifecycle Management ... Microsoft, Oracle .... Target Database 2. Web- browser. Oracle 10g. Oracle/. DB2/. MS SQL ...
System. Admin. Central? Both. BU. Both. Central Central Central Central. Central. Central. Offering. PHASE. 1. 1. 1. 1. 3. 2. 2. 2. 1. Define KPIs, Analysis and ...
Henrik Zimmermann, Digital Business Services, SAP SE. December ... FB Document Management â Basic Concept ... Change ControlLcsp System Landscape.
Jan 1, 2008 - New Product Co-Development: A Case Study Between Europe and China" (2008). ... precisely, this paper aims at understanding how Product Lifecycle Management ... findings of previous researchers that have taken a cross-sectional ..... As
Nov 24, 2014 - Life Cycle Management solution framework in order to improve the ... to manage the lifecycle of products and the information created and ...
Information Lifecycle Management strategy. Recent ... management strategy. 3 .... migration. Technology refresh. Data center relocation/consolidation. Dallas.
Jul 13, 2014 - the whole of the city in one of its functions (smart grid, smart mobilityâ¦). ... sustain the development over time of this ecosystem: Urban Lifecycle ...
Today's challenges in adapting to lifecycle management . ... outdated information, investment in multiple hardware and software systems, and costly integration.
This paper is authored by Configit and Joy Batchelor, Technical Specialist Product Configuration, Jaguar Land Rover, Banbury. Road, Gaydon .... in a single enterprise system, called a Configuration Lifecycle Management (CLM) system. This paper ... ch
Abstract. Starting from the framework of Product Lifecycle Management (PLM), sustainability should be provided by continuous sharing of information among the different product lifecycle phases. A PLM system provides lifecycle knowledge generated by P
teams can no longer efficiently manage the product development effort in its entirety. In order to avoid ... describing the role of PLM in supporting knowledge-intensive processes throughout product lifecycle. For this ... Over time, PDM solutions we
Product lifecycle management (PLM) is a concept that aims at integrating the ... As the backbone of PLM approach, product information model enable the.
Conceptual. Functional. Analysis. Construction. Physical. Bentley managed suite of applications ... Every Offshore project is different and risks are high ... MS Project,. Primavera. â¢ Animations. â¢ Visualizations. â¢ Mobile applications. Analys
Integrated Lifecycle Management of Smart Cards, USB Tokens & User Credentials
Badge & Credential Management
Agenda • Introduction – – – –
IT Security: Too many challenges… A strong need for “Trusted Identities” “Trusted Users” Key Benefits A strong need for Integrated Badge & Credential Management (CMS)
• OpenTrust SCM Overview – – – – –
OpenTrust SCM Key Benefits A Simple and Full Featured Enterprise CMS Making “Trusted Users” a reality OpenTrust SCM Architecture and Ecosystem Worldwide References & related business cases
• Use Cases: eBanking, IAM Integation Confidential - OPENTRUST - Page 2
IT Security: too many challenges …
How to allow IS access to roaming users, third parties and remote application services to secure access control without How compromising IT security ? to business applications, while authentication schemes to (safely) provide enough logins relyHow (mostly) on shareable/spoofable flexibility to andISpasswords ? adapt to : How to warrant Enterprise privacy and ► Evolving business workflowdata requirements ? integrity in order to protect mission critical ► Organization and regulations changes ? assets,ofwith respect to existing regulations How to take advantage electronic ► Heterogeneous connection means and devices ? (SOX, PCI, Bale II, SAFE, etc.) ? transactions to leverage business processes and to increase global How to productivity ? get better protected against internal threats & frauds ? etc…
Confidential - OPENTRUST - Page 3
Electronic Trust… a global answer
The widespread use of Digital Identities securely granted to any user and IS component establishes the basis of new and powerful security At OpenTrust, we believe that implementing a policy enforcement paradigms : global Trust Infrastructure is the Corporate only foundation User to address upcoming IT security challenges ► “Trusted Networks” all in one, with respect to : Authorized Employee External User
Business SSO Application Server Portal OTP Server Confidential - OPENTRUST - Page 4
Key benefits of “Trusted Users” (1/2)
Prevent user security credentials disclosure using a single, safe and personal cryptographic support Enabling IS-wide “two factor” strong authentication, regardless of connection means and user types ► Confining multiple user “secrets” (OTP, SSO, Key pairs…) in a single support that can be fully managed locally and remotely at any time ► Providing a suitable mean of convergence for logical (certificate, key pairs…) and physical (contactless, biometrics…) access control credentials… one step toward unified Corporate Badging ►
Allow a simple, cost effective and deep integration of asymmetric cryptography standards in the IT environment Already supported by most of the IT (infrastructure: routers, switches… & software components: web servers, email clients, SSO, Windows Logon…) ► Enabling easy user (or server) based data encryption and regulation compliant digital signature ►
Confidential - OPENTRUST - Page 5
Key benefits of “Trusted Users” (2/2)
Establish a user friendly “state of the art” security model ►
No more passwords (goal : not even a few) ► Simple and secure handling of personal authentication means ► Enhanced user capabilities and asset protection (encryption, digital signature) ► Empowered user productivity (focus on core business rather than getting lost with multiple access control schemes)
Provide secure and integrated credential lifecycle management to existing X.509 Certificate (PKI), SSO, OTP & IAM solutions ►
Allowing them to rely on secure digital identities that can be trusted far beyond logins and passwords… and that belong to a global, consistent and business effective security policy ► Lowering TCO : multiple (i.e. per solution) credential management tasks are automated and handled from a focal point : the Card Management System (CMS)
Confidential - OPENTRUST - Page 6
Requirements for an Enterprise CMS Widespread use of Digital Identities stored on personal cryptographic supports is a very attractive approach of user security But it requires strong and complete management capabilities to become a reality across the Enterprise
Multiple Lifecycle Operations Distribution & Enrollement Revocation Credential renewal Badge recycling Self care (unlocking, PIN change, replacement, etc.)
Multiple Supports Multi vendors Smart Cards & Tokens (and related drivers, middlewares…)
SWISS CARREFOUR ALSTOM Transport THALES TOTAL French Custom Office Minister of Defense MICHELIN DASSAULT RENAULT-NISSAN BNP PARIBAS Aviation Global OpenTrust PKI, security SCM andproject OTP Multiservice Smart Card Worldwide deployment ofaccess a multiservice OpenTrust PKI &deployed SCM Card Management Migration from a Baltimore PKI and Implementation to 40.000 users, OpenTrust SCM Card Management project for both physical and logical control OpenTrust PKI & SCM Card Management OpenTrust Global Strong OpenTrust Authentication SCM Corporate Platform project Badging implementation, targeting project thefor Smart Card for both physical and logical access Project (OCSCards), running in production since targeting 150. 000 holders worldwide (integration From aWorldwide legacy CMS system to OpenTrust (Gemalto Cyberflex cards) for both physical (Mifare) (integration with SSO from Evidian with IAM Project (Gemalto Cards), running inand production both group’s including: physical PKI, and Smart logical Dealing Card access Management, Network. control Each (integration One dealer Time is control – 100.000 enrolled badges since 2004, more 2007 for 20.000 Custom Officers Worldwide with SSO from PassLogix and IAM from IBM “TIM”) and logical control, targeting 20.000 from Sun Microsystems) -with 6on weeks deployment, since 2003 with already users worldwide delivered with Password, SSO with from Digital aaccess ActivIdentity self enrolling Signature USB Web Gemalto security Services Cyberflex token and to PKI & SCM Platform, full recycling 230.000 than 30.000 daily users internal users from thebadges Minister 30.000 enrolled supports get Cards), extranet secure 70.000 access document branch toexisting core exchange office business users platform applications targeted of 30 000 Usage: Strong Authentication (Wifi, VPN,tokens Usage: Physical access control (HID, Mifare), (parts, stoks, orders, etc.), 150.000 enrolled Usage: Strong Authentication,
Usage: Physical &&Digital logical access control Windows) and logical Access Control (via a legacy OpenTrust OTP (on Gemalto Cyberflex cards), Usage: Physical Access Control, X.509 Data Encryption & Signature Usage: Physical (HQ) logical access control Usage: Usage: Strong Physical Authentication, access control Data Encryption, (Mifare) Strong authentication (WIFI, VPN, Windows), Usage: Physical access control (Mifare), SSO System), Data Encryption Strong authentication, and qualified Strong Authentication, Data Encryption, Strong authentication (WIFI, VPN, Windows), Digital Strong Signature Authentication &encryption Proof Management, and Usage: Strong Authentication Data encryption and Digitaland Signature &Digital Digital Signature Strong authentication digital signature (via Xiring Secure Signature Data encryption Secure document access control sendings toLogical business applications PIN Entry readers) Data encryption
Confidential - OPENTRUST - Page 13
“Self Enrolment” by the Badge Holder
Enterprise AD/LDAP User Directory
Central Security Officer
Card Shipping Process
Card Serial Numbers Registration
c Auth. Scheme
Auto Discovery User‘s Card Profile
Confidential - OPENTRUST - Page 14
Badge Enrollement through the « Badge Office »
Enterprise AD/LDAP User Directory Enrolling User
« PIN PersonalCode Q&A » for Formal
Badge Operator Server
OffAuthentication Line c Identification
a User‘s Card Profile
+ « PIN »
Enrolled Empty Support Support
Confidential - OPENTRUST - Page 15
Badge “Pre Personalization” process Recording, Shipping and Assignment Enterprise AD/LDAP User Directory
Central Security Officer
Server Card Serial Numbers (CSV file)
Card Shipping Process
Card Activation Code & Instructions
e Card Delivery Operator Enrolling User Confidential - OPENTRUST - Page 16
“Pre Perso” Process Stage 2 – Final Badge Activation by the Holder
Enterprise AD/LDAP User Directory
« Activation Code »
« PIN Code »
Confidential - OPENTRUST - Page 17
“Pre Perso” Process Stage 1 – Badge recording & “face to face” Issuance
Enterprise AD/LDAP User Directory
Badge Bureau Enrolling User
Confidential - OPENTRUST - Page 18
Use Case : “Trusted Users” in eBanking
Token Serial Numbers Registration
Token’s Central Enrolment
Token Shipping Process
Secure Auth Secure Transactions Customer
Mailing Process B2C eBanking Infrastructure
Personal Token Activation Code Confidential - OPENTRUST - Page 19
Use Case: Tight Coopling with the IAM « User Properties & Identities »
Help Desk Operator
Enterprise Portal / IAM Enterprise AD / LDAP User Directory
Secure LDAP / SOAP Infrastructure
Card Holder Employee, External, Partner, etc.
Security Credentials Authentication : WIFI, VPN, SSO, Windows… Encryption : Certificates & Private Keys Digital Signature : Signing Certificates for Business Applications