Search /
Advanced search  |  Help  |  Site map
Click for Layer 8! No, really, click NOW!
Networking for Small Business
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested

Role-based access control on a roll

Today's breaking news
Send to a friendFeedback

SAN DIEGO - Provisioning network and application resources for employees can be a time-consuming task, but large corporations are starting to simplify the process by centralizing network user information and assigning users to role-based groups.

Chevron, Anthem Blue Cross/Blue Shield and State Farm Insurance are among the companies taking steps to do this by investing in commercial software or developing systems internally. By working with upper management, in particular the human resources department, to assign each employee at least one "role," such as sales or engineering, the process of granting or terminating predefined network privileges promises to become more automated and much faster.

"We need to ease the burden on IT managers," said David Everett, a systems specialist who detailed how Chevron is moving to role-based access control in the presentation he gave at last week's Catalyst Conference, an event put on by The Burton Group. Chevron will use Business Layers' Day One software, which can take input directly from human resources applications to generate requests for new user accounts for application resource access.

As part of a workflow process that involves approving the new user for certain mail or server resources across Chevron's intranet, the Business Layers software will send an instruction to a separate repository - in this case, an IBM SecureWay Meta-Directory - to activate accounts at Windows NT, Exchange or Lotus Notes servers. For the first time, those accounts will be defined by assigning the user to a "role" that assumes people with different jobs can be neatly assigned predetermined types of access based on business need.

"It takes a long time to get users provisioned, and we see role-based access control as a real productivity enhancement," Everett said. Chevron will start testing the process this fall at its lubricants division with help from systems integrator ePresence.

Meanwhile, Anthem has already begun implementing role-based access control using OpenNetworks' Directory Smart provisioning software in conjunction with Microsoft's Active Directory (see, DocFinder: 5355).

Anthem will use role-based access control for 13,000 internal end users and to put corporate business partners, such as contractors or trading partners, into specific groups defined for network access. Anthem sees automation of end-user provisioning on its intranet as crucial to meeting tough new data security guidelines outlined by the federal government.

The move to centralized role-based user access control has brought about the need for new and more coordinated efforts with the Anthem human resources department, which has put restrictions on how far IT can go with its role-based assignment system, said John Reynolds, director and technical architect for e-commerce. The human resources department has a strong sense that it "owns" this employee data, he said, and it took Anthem's IT department some time to convince human resources that combining data from across Anthem's offices into one metadirectory was acceptable.

Access control graphic

One drawback to role-based access-control systems is that they can be expensive, Reynolds said. It's costing Anthem $400,000 for the enterprise license for Microsoft's Active Directory alone, although that is far less than the $4 million Novell wanted to charge based on per-entry pricing to use its eDirectory, he said.

In fact, cost played a role in the decision by another insurer - State Farm - to design its own technology for handling role-based access control before venturing into commercial software and beyond pilot tests. State Farm is looking at an automated access-control system for the company's more than 75,000 employees and agents, said Neal Shah, a security specialist with the company.

Cost has to be a concern because the typical price for role-based provisioning software, such as that from competitors such as Business Layers and Access360, runs from $600,000 to $800,000, said Christy Hudgins, an analyst with The Burton Group.

Another obvious problem with these new systems, she noted, is that some individuals are just not going to fit neatly into "roles" and have to be assigned as exceptions.

As customer interest in these new access-control systems increases, more vendors are responding.

Siemens and iPlanet last week separately announced that their online directory products will support role-based access control. Siemens is the first to build its directory on a role-based specification developed by the National Institute of Standards and Technology. iPlanet will have a beta version of role-based access in its iPlanet Directory in a few weeks.

Microsoft and Sun will add role-based access-control support in their operating systems.

Role-based access control is still an experimental idea for commercial systems, though the Defense Department developed something similar in trusted operating systems more than a decade ago. But with customer interest now on the rise, software vendors are hoping it's an idea whose time has come.


NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.