Notice ID: RFI-FY24-TSO-ICAM

The AOUSC requires modernizaton of ICAM technology and process that supports hundreds of applications, hundreds of facilities, tens of thousands internal users, hundreds of thousands external users, and millions of public users. The AOUSC seeks to modernize its Identity Provider (IdP) fabric, and its Identity Access Management (IAM)/Identity Governance and Administration (IGA). The AOUSC understands that this will require one or more transition stages where new technologies and procedures are introduced and current and developing solutions are transitioned. The vendor will be required to provide roadmaps, plans, services, and technology to reach these stages and facilitate required transitions. The vendor may recommend expert consulting and services to propose future stages. The goal is to establish new ICAM capabilities without having unnecessary impact on the users and current ICAM operations. This transition phase, or phases, gives the time for performing smooth migration to using new ICAM capability and consolidating existing ICAM infrastructure into a modern commercially sound ICAM solution.

Initial objectives include:

  1. Consolidate existing and future authoritative identity data
  2. Make identity data available securely via a centralized Identity Provider through User Profiles and views where identity data is filtered, aggregated, formatted, and correlated with other data sources (wherever needed).
  3. Use an Identity Lifecycle Management (ILM) app to perform identity proofing, approving and provisioning. Several existing systems will transition from an identity data provider to an identity data consumer.
  4. Identity data is managed by the ICAM identity data custodian with a defined data governance approach.
  5. User profiles will be defined and used for managing different types of users (employee, collaborating agency personnel, contractor, intern, public, etc.)
  6. Federate identity across diverse store. Using advanced virtualization to feed single sign-on (SSO), access, and identity governance and administration (IGA) tools.
  7. Industry leading IAM products will be used by users in different roles (end-user, IAM user, IGA user, and app owner)
  8. Data-driven and policy-based account and entitlement management will be implemented.
  9. The ICAM architecture will eliminate manual processes in favor of automations.
  10. End-user self-service such as password reset will be available.
  11. Workflow, such as access request along with access certification, will be implemented to secure the access and ensure the right people have the right access.
  12. Migrate applications to use new ICAM capabilities.
  13. Implement a cloud-based enterprise IdP/SP for AuthN and AuthZ with SSO and multi-factor authentication (MFA) support.
  14. Provide a platform that allows use of federated external IdPs to authenticate and authorize partner users and external users to access judiciary services with MFA support …

Read more here.



Is your company an OS AI Premium Member? Learn about all the benefits here. Packages start at $500.

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Leave a Reply