Creating a Project Plan
21
no
vd
ocx
(e
n)
17
Sep
te
m
be
r 20
09
It might be advantageous to divide the deployment into phases that enable implementation of a
portion of the deployment earlier and other portions of the deployment later. You can do a
phased deployment approach as well. It should be based on groups of people within the
organization.
Define the prerequisites.
The prerequisites required for implementing a particular phase of the deployment should be
documented. This includes access to the connected systems that you are wanting to interface
with Identity Manager.
Identify authoritative data sources.
Learning early on which items of information system administrators and managers feel belong
to them can help in obtaining and keeping buy-in from all parties.
For example, the account administrator might want ownership over granting rights to specific
files and directories for an employee. This can be accommodated by implementing local trustee
assignments in the account system.
After you have defined your business requirements, proceed to
Section 2.2.2, “Analyze Your
Business Processes,” on page 21
.
2.2.2 Analyze Your Business Processes
After completing the analysis of your business requirements, there is more information you need to
gather to help focus the Identity Manager solution. You need to interview essential individuals such
as managers, administrators, and employees who actually use the application or system. Issues to be
addressed include:
Where does the data originate?
Where does the data go?
Who is responsible for the data?
Who has ownership for the business function to which the data belongs?
Who needs to be contacted to change the data?
What are all the implications of the data being changed?
What work practices exist for data handling (gathering and/or editing)?
What types of operations take place?
What methods are used to ensure data quality and integrity?
Where do the systems reside (on what servers, in which departments)?
What processes are not suitable for automated handling?
For example, questions that might be posed to an administrator for a PeopleSoft system in Human
Resources could include:
What data are stored in the PeopleSoft database?
What appears in the various panels for an employee account?
What actions are required to be reflected across the provisioning system (such as add, modify,
or delete)?
Which of these are required? Which are optional?
What actions need to be triggered based on actions taken in PeopleSoft?
Summary of Contents for IDENTITY MANAGER 3.6.1
Page 4: ...4 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 12: ...12 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 14: ...14 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 26: ...26 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 38: ...38 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 54: ...54 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 68: ...68 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 70: ...70 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 72: ...72 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 74: ...74 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 94: ...94 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 96: ...96 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 98: ...98 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 100: ...100 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 102: ...102 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...
Page 104: ...104 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...