×

Process for removing stale users, accounts and entitlements from a networked computer environment

  • US 20060015930A1
  • Filed: 07/15/2004
  • Published: 01/19/2006
  • Est. Priority Date: 07/15/2004
  • Status: Abandoned Application
First Claim
Patent Images

1. A method for collecting, presenting to stake-holders, reviewing and cleansing data about users and their entitlements in a networked computer environment, called access certification, comprising the steps of:

  • (a) Periodically constructing an inventor, of login IDs by extracting this data from the internal user profile databases of a number of networked computer systems. (b) Periodically constructing an inventory of entitlements by extracting group membership and security attribute data from the internal user profile databases of some or all of the abovementioned networked computer systems. (c) Constructing a list of users by merging login IDs from one or more systems of record. (d) Identifying managers in the above mentioned list of users, by referring to an electronic representation of an organization chart, to identify users with one or more subordinates. (e) Checking the review status of each manager. At least three status codes are required;

    unprompted, prompted and completed. (f) Sending electronic notification to unprompted managers, and reminders to prompted managers, requesting them to sign into an access certification application and to review the users, accounts and entitlements of their subordinates. (g) Authenticating managers when they sign in by accepting their login ID and password to some system of record, and requesting that system to check those values. (h) Displaying to each manager a list of their subordinates, login accounts and other user objects associated with each of their subordinates, and entitlements associated with each login account or user object, and asking each manager to identify suspicious or erroneous users, accounts and entitlements in the list. Conversely, managers may be asked to identify reasonable users, accounts and entitlements in the list, so that suspicious or erroneous ones can be inferred. (i) Displaying to each manager the review status of each of their subordinate managers, so that each manager will communicate with and cause their subordinate managers to complete the process as well. (j) Prompting each manager with no subordinate managers, upon completion of his/her review, to review the text of a legal agreement validating completion of the review process, and to electronically sign that legal agreement by re-authenticating (as in step 1g). (k) Prompting each manager whose subordinate managers have no subordinate managers of their own, and who have completed step 1j, upon completion of his/her review, to review the text of a legal agreement validating completion of the review process, and to electronically sign that legal agreement by re-authenticating (as in step 1g). (l) Repeating step 1k by traversing the organization chart from bottom to top, until at last all managers except the very top one have completed step 1k, and the top manager (e.g., in a private corporation typically the CFO or CEO) can certify the appropriateness of the users, accounts and entitlements of the people who report directly to him, and also can offer some assurance that every other manager in the organization has done likewise.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×