Omada Identity Suite empowers enterprises to manage identities across heterogeneous IT-systems and is also acclaimed for its business-centric approach and flexibility. The Omada Identity Suite solution allows a high degree of configuration, enabling enterprises to meet business specific requirements. This approach reduces the need for custom development, decreasing deployment time, so ROI is achieved fast. The solution offers end-to-end user provisioning and access management.
Key functionality includes:
- Identity lifecycle management
- Self-service processes
- Password management
- Approval workflows
- Segregation of duties (SoD)
- Role management
- Audit reporting
Identity lifecycle management
Identity Lifecycle Management (ILM) processes enable the granting of access rights according to defined roles, rules, and policies.
This includes standard on-boarding and off-boarding processes of employees and contractors, as well as the granting or revocation of access to resources as a user’s relationship to the business changes.
The processes are powered by Omada’s standard Business Processes. To support automated provisioning and de-provisioning of users’ access the solution includes the Omada Provisioning Service. Target system provisioning can be automated from policy-driven access rules and defined roles, or can be manual, supported by integration with a service desk solution.
For connectors between Omada Provisioning Service and target systems, Omada offers a large range of standard connectors. Furthermore, Omada provides an extensive API framework for easy development of custom connectors
Role and policy management
The Omada Identity Suite offers a flexible business-centric approach based on best-practice policies for role-modelling. By defining which processes include the most business critical access policies in systems and applications, it is possible to start ensuring that existing system access and new access requests are driven by business policies and compliance requirements.
Omada Policy and Role management enables Role Based Access Control (RBAC) for managing security in large heterogeneous networks. Role management reduces both the complexity in user administration and the associated costs, thereby increasing the level of control and providing the ability to audit access rights for compliance and security audits.
Handling of processes for on-boarding, transferring, and off-boarding employees, dealing with requests for access rights, and adapting access rights to organizational changes is time-consuming and error prone without a centralized system.
Lack of defined and enforced access management often results in employees not having access rights removed promptly when they leave the organization, and the ‘Least Privilege’ principle may not be applied consistently.
Improve Organizational Efficiency
Organizations can improve the efficiency of the user administration quickly by automating access management processes:
- Implementing business processes driven by changes to HR data, for example triggering tasks for the manager when a new employee is entered into the HR system. Having automated approval processes in place lowers administrative efforts while maintaining a high security level.
- Implementing role-based access management, where access rights are granted based on an identity’s position in one or more hierarchies (such as organizational unit or project), removes the need for requests for every access, as most are granted automatically based on the job profile of the identity.
- For access that is not covered in the role model, a centralized access request process allows end users to request access in a single portal that also triggers workflows for approval and provisioning.