Sensis produce the White Pages and Yellow Pages books in Australia as well as supporting the White Pages On-Line, automated voice-response directory assistance and Yellow Pages electronic directories. To support the migration of these services, new facilities for customer data were abstracted to a stand-alone electronic directory.
The project involved the documentation of the information requirements, accommodating the multiple scenarios for customer listings, documentation of the data components and documentation of the entity diagrams supporting he architecture. In addition a directory architecture document was produced detailing the directory information tree and schema to accommodate the customer listing scenarios.
Other projects ICA consultants have been involved in are in Fiji, Saudi Arabia, Singapore, China, Hong Kong, Europe, New Zealand and Tahiti.
Cathay Pacific Airways requirement was for a roadmap to guide the development of the identity and access management environment in a way that would improve the efficiency of the three main business divisions: Airline Operation, Passengers and Back-office Operations.
Initially the existing environment that had developed over a 15 year period was analysed and
understood. The main requirements of the business was then determined through a series of key person interviews and workshops. The requirements formed the basis for the IAM Roadmap that positioned the organisation on a “maturity index” in order to plan for the improvements to be accommodated in the Roadmap. The workshops were used to prioritise the development of IAM environment in order to ensure the activities with the greatest payback were tackled first.
The final component of the Roadmap was the identification of six prospective vendors to provide the backbone products for the IAM environment.
One of ICA’s senior consultants worked with a major Australian Port Authority for over a year assisting in the specification, selection and customisation of a Port Management and Port Community System. The system is comprised of 3 major modular areas: Navigation management, Safety management including dangerous goods and Permits, and Financial Processing. Our consultant is responsible for the safety management and financial processing areas.
The senior consultant brought to the project decades of experience in the trade and transport industry, and port authorities in particular. The task involved understanding the business and its processes, both internal and external, to analyse and document the requirements, and to recommend improvements. This project has, to date, encompassed four phases:
The National Dangerous Good Hub is a computer system that significantly improves the ability of participants in the supply chain of sea-going freight to create, submit and manage dangerous goods notifications and thereby comply with Australian and international regulations. The new system not only makes it easier for those involved in the supply chain to submit notifications, it also makes it easier to manage notifications and identify mis-representation of dangerous goods. The net result is an improved conformance to the dangerous goods regulation and legislation. The new application replaces existing, paper-based, systems that are hard to manage, prone to abuse and do not facilitate the notification process.
This project investigated the risk associated with the current authentication and authorisation process utilised by the Dangerous Goods Hub system and provided an evaluation of the adequacy of the mechanism currently employed. The Australian Government Authentication Framework (AGAF) was used to evaluate the site. AGAF evaluate two aspects of the system in order to determine the risk associated with access to the system: the registration process itself and the authentication assurance required by the system.
The project involved interviews with major freight forwarders to identify disconnects in the current process of receiving a dangerous g goods notification, packing the consignment in accordance with regulations and providing access to the various entities requiring notification. Important information regarding in-correct application of federal government regulation was identified.
The ICA Consulting team also were involved in all aspects of the design and implementation of the system including end user training sessions for Shipping Lines, Stevedores and Freight Forwarders.
The Identity Management environment at Griffith University is mature and robust but there was a concern that it was not suitable to accommodate the organisation’s requirements in the future with the advent of cloud computing and virtualisation. The University was determined to undertake a review of the infrastructure and personnel in order to be in a position to exploit new technological opportunities.
The first step was to conduct an Environmental Scan to document the current situation and
understand the interaction of the various components that provided identity management
services to the University.
The next step was the development of the Roadmap document. This required extensive
consultation across the University to understand the organisation and to build support for the
various components of the Roadmap, particularly those that impacted operational departments and faculties.
Internet Commerce Australia – Corporate Profile – Identity & Access Management Consultancy.
The Roadmap highlighted not only the technical requirements of the target solution but the
personnel requirements as well, in order to avoid the situation in which the University was
vulnerable to loss of key personnel.
ICA subsequently assisted with the installation of an advanced federated authentication
infrastructure to accommodate the increasing trend to cloud-based applications..
ICA was selected through an RFT process to develop an identity management Roadmap for the University to migrate from the current maturity level of 2.5 to an integrated level of 4 (on a 5- level maturity index). The project involved a mixture of key-person interviews, workshops and working group presentations.
The first step was to generate an Environmental scan that was used to defined the scope of the project, all directories (six in total) were included and agreement was reached on a core-set of applications to be included in the identity management environment considerations.
The second step was to conduct a series of workshops that investigated the use of identity data and documented the desired operation of the identity management environment.
The final step of the project was the generation of the Roadmap document which was presented to management with a defence of the recommendations at a Steering Committee meeting.
The Roadmap recommended: