Champion the elimination of separate passwords for various systems accessed by end users, work with other IT teams to enable Single Sign On, encourage vendors to support SSO, and monitor which vendors roll out SSO support for the products.

More Uses of the Single Sign On Toolkit:

  • Identify: continuously measure and optimize the performance, effectiveness, and uptime of backend services lead data driven culture.
  • Be accountable for analyzing system requirements, user requirements, documenting business processes and selecting appropriate hardware and software for system design.
  • Evaluate: work closely with product, technology, and engineering to develop and maintain expertise across all solution offerings ensuring the latest and most appropriate capabilities are reviewed with account team.
  • Warrant that your planning serves as a go to resource for Identity and Access Management Analysts and contractors (vendors) and/or provides oversight of access provisioning of daily business as usual operations.
  • Arrange that your organization determines and advises the most appropriate technical response to identified complex problems, issues and/or defects by assessing impact and prioritization.
  • Drive: research and respond to complex inquiries that require escalation, highly technical topics or for customers that require executive level support services.
  • Identify areas where team members need additional training, and coordinate/lead training delivery to continuously enhance technical knowledge.
  • Coordinate: proactively reach out to customer contacts, facilitating training opportunities and sharing relevant product and feature information.
  • Ensure your design participates in or leads low to medium complexity projects that support current technology and implement new technologies in an effort to optimize or improve identity management functions.
  • Evaluate: advancement and strategic direction of federation, Single Sign On, identity proofing and MFA services coordinated with management and the service and security architects.
  • Use best practices for O365 product implementation, manage project activities, resources and tasks in a fast and changing project environment.
  • Secure that your enterprise integrates and maintains servers and applications; work proactively with other IT staff to communicate and coordinate infrastructure changes.
  • Pilot: work closely with account development executives (sales) providing technical input into all relevant customer relationship activities as related to SSO and seamless authentication.
  • Identify: track and analyze customer inquiries, diagnose the root cause of complex technical issues and present options to solve problems and recurring issues.
  • Systematize: under direction, plans, implements, upgrades, and monitors all types of information technology (it) to achieve high levels of confidentiality, integrity, and availability of organization IT systems.
  • Identify and evaluate complex business and technology risks, internal controls that mitigate risks, and related opportunities for internal control improvement.
  • Confirm your design complies; principles, theories, standards, practices, protocols, and procedures for systems analysis and design in the applicable systems environments.
  • Construct and assess high level and detailed security programs translating business needs and regulatory requirements into cost effective and risk appropriate controls.
  • Confirm your planning complies; mentors other team members to promote the growth of IT related skills and knowledge; promotes an environment of continual improvement.
  • Secure that your team provides a complex understanding the business usage of information technology (IT) and helping technology add value to the business.
  • Ensure you govern; understand overall application integration space for Single Sign On and user provisioning which uses standard federation protocols as OpenID Connect, OAuth etc.
  • Make sure that your project provides complex technical research and analysis to support business operations needs and presents findings to management or project leader.
  • Secure that your operation keeps abreast of current financial aid regulations and financial aid information systems pertaining to functional areas of responsibility.
  • Be accountable for responding to technical inquiries about the solution relative to architecture, security, privacy, performance and integration capabilities.
  • Analyze and map clients business requirements, processes and objectives; develop necessary product modification requirements to satisfy clients needs.
  • Validate that the management of Spears user directory, Single Sign On and Identify and Access Management capabilities are updated and in line with Policy.
  • Govern: modern access management options, as Single Sign On (SSO), federated identities, multi factor authentication (MFA) and privileged account management.
  • Utilize IAM monitoring tools and industry best practices to monitor systems for potential issues and ensure governance processes and industry best practices are working as designed.
  • Capture and translate business needs into technical requirements, identify gaps, reference architecture impact and the risk profile of VMware technologies used.
  • Be accountable for architecting and reviewing Federated Single Sign On using various open standards, particularly Security Assertion Markup Language (SAML) and OpenID.

 

Categories: Articles