Step-wise implementation approach based on best-practice minimizes your implementation risk.
Step-Wise Implementation Approach
Omada's implementation approach is based on our best-practice experience acquired and perfected by designing and implementing complex identity management and access governance solutions for market -leading global companies. Omada’s solutions and professional services team create significant value for companies by combining technology with business insight. Customers choose Omada's solutions and services because of our proven track record, our understanding of key business challenges and needs of our customers, and our commitment to add value and deliver.
Central to the Omada reference implementation approach and reference solution architecture is to enable large enterprises to establish control of users’ entitlements and data access across a wide range of systems, and at the same time enable them to continuously remain in control.
Avoid "BIG BANG" Implementations
Imperative to achieving this goal is the ability to incrementally establish an IAM solution, perform necessary data cleaning, and to manage and control critical business systems. This will minimize the implementation risk and avoid “big bang” implementations and go-lives.
Starting up a project – the initial discussions will cover the business case, challenges, and a prioritization of which factors regarding risk and compliance or efficiency and cost, should have key focus.First step, is typically to start with data from AD and HR to ensure that appropriate HR data for the employees and their managers is correctly reflected in the account, so we establish an overview of who has which account and who can log on to systems.
Omada's Implementation Approach
The advanced reporting capabilities of Omada Identity Suite are applied to clarify any identity and access data issues. Critical systems are connected to the solution enabling attestation / re-certification processes. Any identity or access related items that should not be in the systems are de-provisioned – either automatically or manually.
In a step-wise approach we onboard more and more systems and also add self-service functionality and perhaps create organizational roles so for example a new employee always gets a mail box and certain AD account and access to certain systems on the first day of work. For selected systems we start provisioning of access in the target system as soon as an access is requested or deleted.