• Collecting Identities
     

    Collecting Identities

  • Entitlements Management
     

    Entitlements Management

  • Federating Identities
     

    Federating Identities

  • Identity Governance
     

    Identity Governance

  • Leveraging Identities
     

    Leveraging Identities

Stage 2 – Deployment

ICA was engaged to assist in the deployment activity for the IAM program. The initial step was to define a program of work, aligned to the Roadmap, that would deploy the infrastructure while providing distinct benefits to the university. A program developing the following was devised:

  • Centralised governance over UNIX systems to reduce the work associated with on-boarding and off-boarding of staff that require access to UNIX systems within their faculty.
  • Faster on-boarding for new staff, including casual and seasonal staff.
  • Improved contact information to be made available to the university community.
  • More appropriate removal of system access rights as a result of more detailed user information in the Enterprise Directory.
  • Internet Commerce Australia – Corporate Profile – Identity & Access Management Consultancy.
  • Smarter Logon for Staff Intranet applications will be experienced by users accessing applications via the University’s Portal. .
  • Enhanced Library experience to be provided with no need for staff to present in-person prior to first use.
  • Improved security will be afforded with the adoption of a single, lifetime identifier.

A balanced scorecard approach was followed to develop a cost/benefit analysis for the initial

deployment stage. It was recognised that the new IAM environment will impact the business

processes within the university. A baseline survey was used to quantify the related benefits.