8.1 Lawson Security Overview Del Dehn Product Manager.

34
8.1 Lawson Security Overview Del Dehn Product Manager

Transcript of 8.1 Lawson Security Overview Del Dehn Product Manager.

Page 1: 8.1 Lawson Security Overview Del Dehn Product Manager.

8.1 Lawson Security Overview

Del DehnProduct Manager

Page 2: 8.1 Lawson Security Overview Del Dehn Product Manager.

Agenda

• Security domains• Upgrade considerations• Summary• 8.1 Technology project update• Questions and answers

Page 3: 8.1 Lawson Security Overview Del Dehn Product Manager.

Lawson Security Domains

8.1.0 Technology Security Domains

• User management

• Authentication

• Authorization

Page 4: 8.1 Lawson Security Overview Del Dehn Product Manager.

Lawson Security

AuthorizationAuthentication/Single sign-on

ResourceManagement

Page 5: 8.1 Lawson Security Overview Del Dehn Product Manager.

Lawson Security

• Business process focused security

• Central repository for security administration (Resources)

• Organizational modeling (Roles)

• Rules builder (Rules)

• Single sign-on

• Additive security paradigm

• Database auditing (front-end, back-end sign-on)

Page 6: 8.1 Lawson Security Overview Del Dehn Product Manager.

Lawson Security: Design Features

• Designed as a centralized service – Callable by all Lawson layers

• Roles and Rules based – An industry prevalent approach

• Driven by user and corporate information – Flexible security to accommodate the customer’s business

structures

• Administration tool for policy modeling– Test new structures or security policies

• Attribute based security– Same concept as attributes in LDAP structures

• Fine grained securable objects– For example, field level security

Page 7: 8.1 Lawson Security Overview Del Dehn Product Manager.

User Management

Page 8: 8.1 Lawson Security Overview Del Dehn Product Manager.

User Management Domain

Lawson Resource Management

• Central repository for globally interesting data– user name, email address and roles

• Create custom attributes

• Structure – organizational chart modeling

• Non-organizational chart structures allowed

Page 9: 8.1 Lawson Security Overview Del Dehn Product Manager.

Organizational Modeling: Changes for Individuals

S m a ll C o m p a n y, In c.

P ro je ct M an a g er S e n io r P ro g ram m er

C IO

C o n tro lle r

C F O

C E O

Project Manager is promoted to CFO

“Roles” domain

LDAP ServerMicrosoft

ADAM 2003

Changes to structures can be made in a “drag and drop” fashion

Page 10: 8.1 Lawson Security Overview Del Dehn Product Manager.

Organizational Modeling: Changes for Groups

B ig C o m pa n y, In c.

M a rke tingM a na g er

M a rke tingM a na g er

M a rke tingM a na g er

M a rke tingM a na g er

D ire c to r o f M arke ting

S a lesM a na g er

S a lesM a na g er

S a lesM a na g er

S a lesM a na g er

D ire c to r o f S a les

V P o f S a les V P o f M a rke ting

C E O

Director of Marketing with all of his/her directly reporting Marketing Managers is moved to the direct supervision of the newly created position of VP of Marketing

LDAP ServerMicrosoft

ADAM 2003

“Roles” domain Changes to structures can be made in a “drag and drop” fashion

Page 11: 8.1 Lawson Security Overview Del Dehn Product Manager.

Resource Management: Structure

Page 12: 8.1 Lawson Security Overview Del Dehn Product Manager.

Authentication

Page 13: 8.1 Lawson Security Overview Del Dehn Product Manager.

Authentication Domain

Lawson Authentication 8.1.0

– Single Sign-on

– Database (DB) user authentication

– Session management

– Secure credential storage

– Identity management

Page 14: 8.1 Lawson Security Overview Del Dehn Product Manager.

Single Sign-on for End Users

Page 15: 8.1 Lawson Security Overview Del Dehn Product Manager.

Authorization

Page 16: 8.1 Lawson Security Overview Del Dehn Product Manager.

Authorization Domain

The new Lawson Security model

• Business process focused• Rules and Roles based• Granular security checking• Object oriented• Flexible policy modeling

– Allows organizational modeling for security

– Allows attribute driven policies

– Element based policies

• Allows for distributed administration

Page 17: 8.1 Lawson Security Overview Del Dehn Product Manager.

Authorization: Roles and Rules

• Roles– Organizational roles

– Organizational structures

• Rules– Rules builder

– Simple or complex

• Rules written for Roles govern the security privileges

of end-users assigned to a Role(s)

Page 18: 8.1 Lawson Security Overview Del Dehn Product Manager.

Benefits of Role-Based Security

• Transparency– User’s roles are defined by business needs– Security classes and privileges are defined by business tasks

• Stability– Access needs for a task do not change often– User’s roles change more frequently

• Efficiency– Changing access for a given task accomplishes changes for

all affected users

Page 19: 8.1 Lawson Security Overview Del Dehn Product Manager.

Lawson Security: New Rules

• Rules apply to “securable objects”– Product lines– System codes– Forms and their fields– Drill Around®– Tables and the columns in a row– Environment objects – printers, etc.

Page 20: 8.1 Lawson Security Overview Del Dehn Product Manager.

Security Rules

• Rules can be unconditional– Grant All Access/Deny Any Access– Builds fast, efficient access control lists

• Rules can be unconditional but allow limited access– Inquire only, for example

• Example– ADD_EMPLOYEE class:

EMPLOYEE table: ALL_ACCESS

(users that are employees can view their own information)

Page 21: 8.1 Lawson Security Overview Del Dehn Product Manager.

Conditional Rules

• Data can be secured based on attributes of the user– If (user.getAttribute(‘Department’)== ‘HR’) then ‘IACD’ else ‘I’

(if user is in HR Department, then can change information)

• Data can be secured based on the data values– If (table.EMPLOYEE == user.getEmployeeId()) then ‘IACD’ else ‘I’

(user can change own information and see all others)

• Data can be secured using other kinds of functions– Time of day, database reads, etc.

Page 22: 8.1 Lawson Security Overview Del Dehn Product Manager.

New Security Model

Rules express security policies- Rule execution allows or denies access to a securable object

Security Classes group rules for common tasks- Constitutes a task oriented privilege pack

Multiple security classes to Roles- Easy creation of Roles with overlapping functionalities

Multiple Roles to users- Allows for multiple responsibilities

Page 23: 8.1 Lawson Security Overview Del Dehn Product Manager.

A Security Policy Illustration

Users Roles SecurityClasses

SecurableObjects

Jane

John

Steve

Mary

Employee

HR Manager

Payroll Manager

Payroll Clerk

Employee Info

Manager Info

Payroll Access

Form HR11

Check Printer

Note: Users can be assigned multiple Roles simultaneously

Page 24: 8.1 Lawson Security Overview Del Dehn Product Manager.

Lawson Security Securable Objects

Page 25: 8.1 Lawson Security Overview Del Dehn Product Manager.

Deny Access to a Form Field

Page 26: 8.1 Lawson Security Overview Del Dehn Product Manager.

Security “Off” – All Form Transfers are Available

*

Page 27: 8.1 Lawson Security Overview Del Dehn Product Manager.

Secured: Form Transfers are Hidden

Page 28: 8.1 Lawson Security Overview Del Dehn Product Manager.

Upgrade Considerations

Page 29: 8.1 Lawson Security Overview Del Dehn Product Manager.

Lawson Security: 8.1 release

• Provides security for all Lawson Portal based products– LAUA security – not required

– Security extensions (Ex. HR security) - not required

• Lawson Security and LAUA security can operate

concurrently– Lawson Security – Lawson Portal Users ONLY

– LAUA security – Lawson Portal Users and LID users

– Each end user must be secured by only one security mechanism,

not both

Page 30: 8.1 Lawson Security Overview Del Dehn Product Manager.

Transitioning to 8.1 Lawson Security

• Security mechanism assignment per end user

• Enables phased migration from LAUA security to

Lawson Security

• Migration from LAUA to Lawson Security by:– End user

– Role

– Group

– Structure

– Etc.

• Not a “Big Bang” approach

Page 31: 8.1 Lawson Security Overview Del Dehn Product Manager.

Lawson 8.1 Technology Release

• 8.1 Technology = Environment, Internet Object

Services (IOS) and Lawson Portal

• 8.1 Technology will support:– 8.1 Applications

– 8.0.X Applications

• Existing or upgrading 8.0.X Applications customers

are not “cut off” from implementing 8.1 Technology

• 8.0.X Applications customers can utilize 8.1

Technology features without needing to upgrade to

8.1 Applications

Page 32: 8.1 Lawson Security Overview Del Dehn Product Manager.

8.1 Lawson Security: Summary

• Flexibility and power to create security policies based on how your organization does business

• Major components:

–Resource Management and LDAP (roles, structures)

–Authorization (rules engine)

–Authentication and Single sign-on (SSO)

Page 33: 8.1 Lawson Security Overview Del Dehn Product Manager.

8.1 Technology Project Update

The scheduled release of Lawson 8.1 Technology has been moved to Lawson’s Q1FY06 (June – August 2005) after a recent review of the project’s milestones and metrics.

This release is being measured against the quality standards and milestones of Lawson’s CMMI methodology and whole company readiness metrics. The review indicated that an adjustment to the proposed schedule would not only deliver much improved performance, usability and security, but also a quicker time to benefit for Lawson clients.

Page 34: 8.1 Lawson Security Overview Del Dehn Product Manager.

Questions?