Top Banner
Self-Service Active Directory Group Management © 2014 Hitachi ID Systems, Inc. All rights reserved.
14

Self-Service Active Directory Group Management

Jan 14, 2015

Download

Technology

Hitachi ID Group Manager is a self-service group management solution. It allows users to request access to resources such as shares and folders, rather than requesting access to groups. Group Manager automatically maps requests to the appropriate security groups and invites group owners to approve or reject
the proposed change.

Group Manager is available both as a stand-alone solution and as a no-cost module included with Hitachi ID
Identity Manager.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Self-Service Active Directory Group Management

Self-Service

Active Directory

Group Management

© 2014 Hitachi ID Systems, Inc. All rights reserved.

Page 2: Self-Service Active Directory Group Management

Hitachi ID Group Manager is a self-service group membership request portal. It allows users to requestaccess to resources such as shares and folders, rather than initially specifying groups. Group Managerautomatically maps requests to the appropriate security groups and invites group owners to approve orreject the proposed change.

Group Manager is available both as a stand-alone solution and as a no-cost module included with Hitachi IDIdentity Manager.

Contents

1 Challenges in Large-Scale Active Directory Group Management 1

2 Addressing Complexity Using Self-Service 2

3 Introducing Hitachi ID Group Manager 3

4 Hitachi ID Group Manager Technology 4

5 User Interface Workflow 5

6 Windows Shell and SharePoint integrations 7

7 Robust approvals workflow 8

8 Installing, Configuring and Managing Hitachi ID Group Manager 9

9 Logging and Reporting 9

10 Network Architecture 11

11 Platform Support 12

i

Page 3: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

1 Challenges in Large-Scale Active Directory Group Management

Many organizations have deployed Windows servers and Active Directory, and leveraged the powerful ac-cess control infrastructure in this platform to manage user access to data. This infrastructure uses securitygroups to control user access to resources:

• Groups are defined in Active Directory to reflect business functions or organizational structure.

• Groups are assigned rights to network resources, such as shares, folders and printers.

• Users are attached to groups based on their job requirements.

• Groups may be nested, to simplify management.

Over time, the number of groups grows and in some organizations may surpass the number of users.Moreover, in dynamic organizations users frequently change responsibilities and are assigned new projects.This churn creates complexity:

• User requirements must be reflected by changes to user membership in groups.

• A user support group must be created to respond to user access problems by attaching users toappropriate groups.

• Users are frequently unaware of the security infrastructure, so their calls to the help desk typicallybegin with: "I got an ‘access denied’ error..."

• Problem resolution is time consuming: first map the user’s problem description to a network UNC,then find the groups with rights to that resource, then find owners for the groups, then call them to getpermission to attach the user and finally attach the user to the group.

Complexity in managing large numbers of changes in security group membership leads to real businessproblems:

• Staffing cost in the user access management group, due to high call volumes.

• Long turnaround and lost productivity when users wait hours or days to get required access rights.

• Users with inappropriate access rights, as a result of failures in the change authorization process.

© 2014 Hitachi ID Systems, Inc.. All rights reserved. 1

Page 4: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

2 Addressing Complexity Using Self-Service

The complexity of group membership management can be greatly reduced by implementing a self-servicesolution in place of the security administration group. Users should then be able to:

• Sign into an Intranet web application.

• Search or browse for the resource they would like to access.

• Request access rights directly.

• Automatically route requests to the appropriate authorizers, namely the owners of the appropriate ADsecurity group.

• Use e-mail and web-based workflow to enable authorizers to approve requests directly.

• Automatically attach users to requested groups, upon approval.

Deploying self-service to reduce the complexity of group membership management eliminates:

• The need for users to understand the security infrastructure.

• The cost of operating a security administration group.

• Security exposures due to unauthorized group memberships.

• Lost productivity due to long delays in change authorization.

© 2014 Hitachi ID Systems, Inc.. All rights reserved. 2

Page 5: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

3 Introducing Group Manager

Hitachi ID Group Manager is a self-service group membership request portal. It allows users to requestaccess to resources such as shares and folders, rather than initially specifying groups. Group Managerautomatically maps requests to the appropriate security groups and invites group owners to approve orreject the proposed change.

Group Manager is available both as a stand-alone solution and as a no-cost module included with Hitachi IDIdentity Manager.

Group Manager is a component of the Hitachi ID Management Suite designed to streamline user requeststo network resources.

Using Group Manager, users sign into a secure web application and request new access to a networkresource, such as a share, folder, printer or mail distribution list. From the Group Manager web form, usersfirst select a resource container (examples: share; directory OU) and then use a tree view to browse for aspecific resource (examples: folder, mail DL). Once they have selected a resource, users simply submit therequest.

Once the user has selected a resource, Group Manager:

• Dynamically maps the user resource selection to a specific managed target system and to a securitygroup on that system.

• Determines whether the security group is already under Group Manager access control and if notautomatically adds the group to its workflow system.

• Checks whether at least one authorizer is already available for the group and if not automaticallyextracts a new authorizer list from the target system itself (e.g., identifies the group’s owners).

• Initiates a workflow request, asking the appropriate authorizer(s) whether the user should be allowedto join the group in question.

The Group Manager workflow system automatically tracks change authorization and adds the user to therequested group if and when the proposed change is approved.

Group Manager produces real, concrete business value:

Group Manager improves security by ensuring that changes to membership in security groups are properlyauthorized before being implemented.

Group Manager reduces the cost of IT support by moving requests and authorization for changes to groupmembership out of IT, to the community of business users.

Group Manager streamlines service delivery regarding the management of membership in security groupsby making it easier for users to submit clear and appropriate change requests and automatically routingthose requests to the right authorizers. This makes the request process painless and the approvals processfast.

© 2014 Hitachi ID Systems, Inc.. All rights reserved. 3

Page 6: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

4 Group Manager Technology

Hitachi ID Group Manager is currently designed to target a single platform – Active Directory. Its userinterface exposes resources that are typically made accessible by user membership in AD groups:

• Shares on file servers.

• Folders on shares, including the full depth of folder hierarchy.

• Printers and print server queues published in AD.

• Mail distribution lists, for example as used by MS Exchange.

Group Manager uses plugins to connect to target platforms. The Windows/AD resource discovery pluginis able to drill down into Windows-based network resources, find out which groups have rights to whichresources, and lookup group owners on Active Directory. The Hitachi ID Management Suite Active Directoryconnector, included with Group Manager, can enumerate AD users and groups, authenticate AD passwordsand update AD group memberships.

© 2014 Hitachi ID Systems, Inc.. All rights reserved. 4

Page 7: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

5 User Interface Workflow

Hitachi ID Group Manager can be used to manage many different types of resources. A plug-in programbinds Group Manager to a specific type of resource, such as Windows shares, whose access is mediatedby membership in an Active Directory group. Other resources include network printers and mail distributionlists.

The description is best clarified with a concrete example:

© 2014 Hitachi ID Systems, Inc.. All rights reserved. 5

Page 8: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

User Group Manager Resource-Type Plug-in TargetSystem

1 Sign inusing anetworklogin IDandpassword.

Validate credentials

2 Initiate anewresource-accessrequest.

3 Display a list of descriptive namesfor configured Windows fileservers and shares.

4 Select ashare.

5 Display a tree view of folders inthe selected shares

6 Browse forand selecta folderwhereaccess isdesired.

Interactive tree view display Iteratively provide a list ofsub-directories from the selectedshare.

7 Select aset ofprivilegesand anauthorizerto request.

..Display and user input.. Provide a list of groups that haveprivileges on the share and thesecurity privileges each one hasbeen assigned. (read-only?read-write? etc.) One or moreowners (authorizers) are providedfor each group.

8 Workflow to track changeauthorization

9 (Change approved) Run agent toupdate the user’s groupmembership. Send a confirmatione-mail to the user and to allowner/authorizers.

Updatedprivileges.User cannowaccess thefolder.

© 2014 Hitachi ID Systems, Inc.. All rights reserved. 6

Page 9: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

6 Windows Shell and SharePoint integrations

A shell extension is included with Hitachi ID Group Manager which can be deployed on Windows XP, Win-dows Vista/7/8 PCs. If installed, this component can intercept Windows “access denied” error messagesand present an expanded message which allows users to open a web browser to the Group Managerapplication, where they can request membership in the appropriate AD group.

Figure 1: Windows Shell Extension: Replacing the Native Access Denied Dialog

An analogous integration with SharePoint is provided, which works by extending the "access denied" errorpage on each SharePoint server.

© 2014 Hitachi ID Systems, Inc.. All rights reserved. 7

Page 10: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

7 Robust approvals workflow

The built-in workflow engine is designed to get quick and reliable feedback from groups of business users,who may be individually unreliable. It supports:

• Concurrent invitations to multiple users to review a request.• Approval by N of M authorizers (N is fewer than M).• Automatic reminders to non-responsive authorizers.• Escalation from non-responsive authorizers to their alternates.• Scheduled delegation of approval responsibility from unavailable to alternate approvers.

© 2014 Hitachi ID Systems, Inc.. All rights reserved. 8

Page 11: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

8 Installing, Configuring and Managing Group Manager

Hitachi ID Group Manager is very simple to configure and manage. For example, to configure it to managegroup membership in Active Directory, to enable users to gain access to group-controlled file folders, oneneed only:

• Set up Active Directory as a Group Manager target system.

• Enter the base UNC for each share in which Group Manager will manage access.

• Ensure that the owner field is correctly populated on each AD user group.

Group Manager deployment is typically very quick:

• Install the product.

• Configure the primary target system – a Windows / Active Directory domain.

• Install the resource location plugin (currently a Windows resource plugin is available, supportingshares, folders, printers and Exchange mail distribution lists).

• Configure root nodes for resource browsing, such as share UNCs.

• Verify that group owners are correctly defined in AD, as these people will be used as authorizers.

• Test and debug the installation as appropriate.

The entire process typically requires just 2-3 days of technical configuration work.

9 Logging and Reporting

Hitachi ID Group Manager logs all attempted and completed requests for group membership. GroupManager workflow-related reports include:

Report Description

Authorizer activity Approvals, rejections and failure to respond byauthorizers

Request status by authorizer Lists request-status information for each authorizer towhom a request is assigned. It also includes the actionstaken by each authorizer for each request item

Request status by implementer Lists request-status information for each implementer towhom a request is assigned.

Pre-defined requests Shows the configuration of pre-defined requests

Request event log Details and change history of matching requests

© 2014 Hitachi ID Systems, Inc.. All rights reserved. 9

Page 12: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

Report Description

Search requests Advanced search of and statistics about current andarchived requests.

Request volume trend Trend analysis of request volume per time interval.

Participant response time Analysis of the responsiveness of participants inworkflow processes.

Inactive requests Analysis of requests which have had no activity in Ndays.

Stuck requests Analysis of requests which cannot be completed.

Escalated / delegated requests Analysis of escalation and delegation of requests.

Request popularity Analysis of the popularity of pre-defined request types,managed resources, operations and workflowparticipants.

All workflow requests are retained in the Group Manager database indefinitely, for reporting at any futuredate.

© 2014 Hitachi ID Systems, Inc.. All rights reserved. 10

Page 13: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

10 Network Architecture

The Hitachi ID Group Manager network architecture is illustrated in Figure 2.

Browse resources;request access

Reviewrequest: approve ordeny

Discover resources and ACLs

Access resource

Discoverusers, groups, group owners

Update groupmemberships

Invite authorization

RequesterUser Workstation

Any Client OS

Windows Server OS

File Server

Any Client OSWindows 2003

User Workstation

Authorizer

Web browser Web server Web browser

Windows filesystemclient

ID-Accessapplication Mail client

Share orfolder

Windows Server OS

Domain Controller

AD: Users,Groups

Typically Exchange

E-mail System

Mailboxes

1 6

4

5

7

32

8

Hitachi IDGroup Manager

Figure 2: Group Manager Network Architecture Diagram

In the diagram:

1. A requester signs into Group Manager and locates a network resource of interest, using some com-bination of searching and browsing.

2. The requester asks for access to the resource.

3. Group Manager looks up the ACLs on the resource, and determines which group membership wouldbe appropriate.

4. Group Manager looks up the group’s owners, and sends them an e-mail on behalf of the requester,asking that the requester be attached to their group, in order to enable the requester to access theresource of interest.

5. At some later time, the group owners receive the e-mail, sign into Group Manager, and either approveor deny the request.

6. If the request is received, Group Manager updates the user and group objects in AD, to create a newgroup membership.

Access by the requester and authorizer to Group Manager is typically HTML over HTTPS.

Access by both the requester and Group Manager to the network resources in question may be SMB, DFSor LDAP.

© 2014 Hitachi ID Systems, Inc.. All rights reserved. 11

Page 14: Self-Service Active Directory Group Management

Self-Service Active Directory Group Management

11 Platform Support

Hitachi ID Group Manager currently supports Active Directory group membership management, where ADruns on Windows 2000, 2003, 2008 or 2012 servers.

It also supports management of:

1. SMB and DFS based filesystems.

2. Nested groups. Users and/or policy plugins choose the group for which membership will be requested.

3. Access to shares (i.e., share-level ACLs).

4. Access to folders (i.e., NTFS folder-level ACLs).

5. Access to printers (i.e., ACLs on AD-published print queues).

6. Access to mail distribution lists (i.e., membership in AD mail DLs).

www.Hitachi-ID.com

500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: [email protected]

File: /pub/wp/documents/id-access/id-access-white-paper-1.texDate: 2013-01-21