IGA Modernization

March 17, 2023

The IGA Modernization project team is completing configurations and verifications in the Test environment. The team is continuing the collaboration with the D2I Initiative to support Role-Based Access Control (RBAC) at the university with the delivery of group and role management (G&RM) functionality. Initial group and role use cases are configured and have been tested. 

Program Goals

The goal of the IAM Modernization Program is threefold:

  • Consolidate IAM solutions to reduce technical debt
  • Improve IAM processes
  • Join the InCommon community

Program Phases

Due to the significant scope of this effort, the program has been divided into program phases with distinct deliverables.

Phase 0: Research

(tick) Complete.

Phase 0: Research was comprised of solution analysis and determined that our target tool set would be midPoint and Grouper.

The project team determined that the program would move forward with the InCommon Trusted Access Platform (TAP), implementing midPoint for identity management and Grouper for group and role management.

Phase I: Group and Role Management

(info) In Progress.

Phase I: Group and Role Management will create the infrastructure to facilitate Role-Based Access Control (RBAC) at the university. Project Charter attached. 

Phase II: Password Management

(info) In Progress.

Phase II: Password Management is focused on the modernization of the university's password management tool set.

Future Phases

Future phases may change based on campus and team priorities.

Phase III: Identity Management is expected to modernize the toll set used to create, update, maintain, and administer identities.

Phase IV: Password Store is expected to modernize the infrastructure used to store passwords and integrate with downstream systems.

Phase V: Employee Records Business Logic is expected to review and improve how the identity management systems consolidate, analyze, and process employee data.

Phase VI: Other Business Logic is expected to review and improve how the identity management systems consolidate, analyze, and process all other identity data.