You are here:

About Identity & Access Management

Identity and Access Management (IAM) is the security discipline that enables individuals to access the right resources at the right times for the right reasons. IAM addresses the mission-critical need to ensure appropriate access to University resources across heterogeneous technology environments, and to meet increasingly rigorous compliance requirements. The goal of this program is to implement an IAM platform to address University of Utah and University Health needs to manage identity and access issues for internal and external users.

Organizational Chart


Program Goals & Objectives

  • Automate processes that enable positive identification and authorization for all business data and technology services access requests.
  • Integrate, consolidate, and simplify the IAM infrastructure into one architectural framework.
  • Enable students, faculty, community partners, and the public to access information securely.

Program Scope

Justification

The IAM program addresses multiple key business needs and ensures compliance with regulatory requirements. This program is critical for the following reasons:

  • Reduce complexity in the provisioning/de-provisioning process
  • Strict ownership of data
  • One person, one identity
  • Administrative review and restructuring
  • Confirmed assurance levels
  • Federation
  • Compliance with the following regulations:
    • Family Educational Rights and Privacy Act (FERPA)
    • Health Insurance Portability Act (HIPAA)
    • Payment Card Industry (PCI)
    • Data Security Standards (DSS)
    • InCommon
    • Government National Institute of Standards and Technology (NIST)
  • Risk reduction

Deliverables

The IAM program determines business requirements and defines a strategic roadmap that incorporates the following:

  • Identity lifecycle management – Includes management of identity creation, identity provisioning and de-provisioning, identity change processes, attribute maps, and authentication (e.g. password policies and synchronization) for risk-based critical applications not limited to end users but also for generic accounts and system/service accounts.
  • Role mining and role management – Adapt and deliver a framework for the management of groups of identities by roles, which are typically based on attributes or business rules.
  • Authentication – The process of verifying that a user (or system) is who they claim to be. This includes single sign-on, multi-factor authentication, Integrated Windows Authentication (IWA), password management, and identity proofing.
  • Federation – The utilization of trusted connections, which allow authorized users such as non-system affiliates to access University resources, delivering a single sign-on experience for cloud host applications, research collaboration, etc.
  • Authorization – The process of determining whether a user is permitted to access a particular resource. Includes role-based authorization, re-certification processes, and exception requests.
  • Access auditing and compliance control – Automated compliance processes for use in the review of current user access. Includes the ability to revoke access no longer required.
  • Identity business intelligence – The ability to provide real-time and historical reports regarding identity-related data and activities. The goal is to provide answers to critical questions about access, improve the ability to respond to auditing inquiries, provide information regarding identity regulatory compliance, answer daily security operation questions, and provide other information regarding identities associated with the University.

Governance

The IAM Program Steering Committee governs the program. View the list of committee members here.

The committee fulfills the following responsibilities:

  • Participate in program decision-making, including the review and approval of program changes
  • Review progress and provide guidance to aid the program team in achieving objectives

Out of Scope

The IAM program will not include the following:

  • Changing the format of the University ID Number (uNID)
  • Reconciliation of duplicate accounts

IAM Program Sponsors

  • University Information Technology (UIT)
  • Information Technology Services (ITS)

Program Lead

Chris Stucker
IAM Associate Director
Information Security Office
801-587-1962

Steering Committee

View committee members


Documents & Resources

Last Updated: 2/5/18