Reference

More than 30 IDM realisations in the Czech Republic and abroad

AMI Praha Reference IDM and KDM development at Czech Post
Česká pošta

IDM and KDM development at Czech Post

Česká pošta

Following on from the previous years, in 2022 development work continued on the IdM and KDM (Key Distribution Manager designed to centralize and synchronize authentication resources in a Linux/UNIX environment) solutions for the customer Česká pošta. The main objective of the sub-projects was to extend the IdM and KDM solution with additional end systems and the development of solutions extending the original concept.

Project goal

In 2022, as part of our development activities, we implemented the connection of two end systems and several development requirements.

  • Connection of the new SMAX Service Desk
  • Extension of IdM connector functionalities to Microsoft 365
  • Minor development
    • Addition of external user management
    • Registration of service accounts
    • Edit workflow permissions, user attributes
    • User management in MLAN
    • Managing mailboxes in Microsoft 365
    • Operational optimization
    • Server reconciliation report in KDM
    • MidPoint-to-midPoint connector
    • KDM performance optimization

Solution description

IdM development – connection of the new SMAX Service Desk

CP has replaced the HP SM service desk with SMAX. For this reason, it was necessary to modify the logic in IdM so that all the account management and role assignment options for the service desk – SMAX were retained.

All user management and role assignment in the SMAX system was handled through LDAP. IdM performs the creation/modification/deletion of users in LDAP and assigns/removes roles via multivalue attribute values (already implemented functionality). SMAX performs periodic synchronization with the LDAP.

IdM development – IdM connector to Microsoft 365 – guest account management

CP started using Microsoft 365 environment, which created needs for user and permission management in this environment.

Regular users and administrators are managed in the Microsoft 365 tenant by integration through AD Connect.

The most pressing issue was unmanaged “guest” accounts for external users, this functionality was addressed first. Externalists have registered identities in IDM, called ext accounts. Managing guest accounts allows freelancers to use sharing in SPO and take advantage of other Microsoft 365 functionality without requiring a license. Furthermore, it is no longer necessary to manage passwords for external users using only these services in Microsoft365.

Minor IdM development

Addition of external user management

External user management is routinely used to manage hundreds of vendors. In operation, major limitations including operational cleanup requirements and user transfers between contracts became apparent, so it was necessary to:

  • Change attribute checking for external users to check the attributes entered directly on the input form,
  • modify the archiving of users so that they can be returned to the contract by the sponsors,
  • add a Company attribute,
  • create permissions to display contract attributes,
  • archive invalid contracts with outsourcers,
  • create new notifications about valid external users in an invalid contract.

Registration of service accounts

Service accounts were not managed by IdM. The change required service accounts to be registered in IdM at a minimum for the purposes of registering guarantors and role requests.

Modifications to workflow permissions, user attributes

IdM operation deepened the maturity of IT processes, which required modifications to permissions and notifications:

  • New notification of missing application guarantors and role approvers,
  • modification of roles for changing email address so that the change can be made by email administrators,
  • grouping and modification of user attributes in the profile view,
  • modifying the approval when there is no supervisor so higher supervisor, then up to approver 999999,
  • modify notification to work on approver assignments and modify role names.

User management in MLAN

A new MLAN administration network has been created to manage network elements, where users are stored in a separate LDAP. These were not managed using IdM.

We implemented a new connector for MLAN on Open LDAP technology including all standard user management processes.

Role management in Microsoft 365

The connector to Microsoft365 has been added with Microsoft 365 role management. These are administrator roles in the Misrosoft365 tenant.

Operational optimization

The application lifecycle required additional adjustments on the IdM side to respond to the changing state of the surrounding applications, infrastructure and processes:

  • Removal of functionality for NAKIT,
  • modification of synchronization policies in AD and CAS,
  • adding attribute mappings between IdM and AD, including Exchange mailbox status.

Minor development of KDM

Server Reconciliation Report

The subject was to create a server task that will provide a *.csv report listing the reconcilations of the connected UNIX KDM servers.

Connector midPoint-midPoint

The subject was to create and deploy a new connector to connect KDM to IdM using a REST interface.

KDM performance optimization

According to the requirements of the Czech Post, modifications were made to optimize the running of KDM during and at the end of the migration of a large number of UNIX servers so that the solution is operable.

Conclusion

It can be concluded that the development of IdM at the Czech Post is proceeding successfully and in accordance with the requirements of IT management and the requirements of Cyber Security in successive partial steps. This brings with it the advantage and possibility of thorough testing and fine-tuning of each partial modification before its deployment into production, with no IdM downtime and almost no need for downtime.

Another projects for the client

Are you interested in this reference?