• To test end-to-end user life cycle management, Okta POC was implemented. • Linked Okta for SSO, MFA, and provisioning with Tripwire, Splunk, GitHub, RedLock, SANS, Dome9, and CyberArk
• OKta was integrated with PeopleSoft, Workday, and the Oracle HRDS system.
• Created and enabled workflows and role-based provisioning (RBAC) on the Identity Minder Environment.
•Deployed the Identity Portal (SIGMA portal) for Password Services and Governance Minder Certificates using back end connectors to IDM and decreased load for Identity Manager.
• Developed On the IDM Linux platform, attribute-based access controls (ABAC)
• Okta POC was used to test end-to-end user life cycle management.
• Connected Tripwire, Splunk, GitHub, RedLock, SANS, Dome9, and CyberArk with Okta for SSO, MFA, and provisioning.
• OKta was connected to the Oracle HRDS system, Workday, and PeopleSoft.
• On the Identity Minder Environment, workflows and role-based provisioning (RBAC) were created and enabled.
•Used back-end connectors to IDM to deploy the Identity Portal (SIGMA portal) for Password Services and Governance Minder Certificates, reducing the load on Identity Manager.
• Developed using attribute-based access controls (ABAC) on the IDM Linux platform
• End-to-end user life cycle management was tested using Okta Proof of Concept.
• Linked Okta for SSO, MFA, and provisioning with Tripwire, Splunk, GitHub, RedLock, SANS, Dome9, and CyberArk.
• OKta was integrated with PeopleSoft, Workday, and the Oracle HRDS system.
• Workflows and role-based provisioning (RBAC) were established and enabled on the Identity Minder Environment.
•In order to lessen the strain on Identity Manager, the Identity Portal (SIGMA portal) for Password Services and Governance Minder Certificates was deployed using back-end connectors to IDM.
• Created on the IDM Linux platform utilizing attribute-based access controls (ABAC).