Deployment2017-10-09T17:03:27-03:00

Deployment

Guidance from adherence analysis to software activation.

Deploying an access management solution is no simple task. Because the tool changes the way critical resources are accessed, it is more than natural to face resistance and fear of unavailability among users. That is why we have developed a deployment roadmap to ensure greater user engagement and security in the process.

The process can be carried out securely by our team of partners and certified resellers. The entire deployment is divided into the following steps:

Kickoff

Introduction of teams, project scope and deployment phases, and definition of focal points.

Planning

According to the company’s need and the mission of the project, the best approach is designed for installation, configuration and go-live process.

Besides strategies, architecture issues, operational installation plan and requirements are defined.

Physical Appliance Installation

For clients who opt for physical appliance solutions, the installation activities include:

  1. Removing equipment from boxes;
  2. Physical installation on racks;
  3. Connecting the network and power cables;
  4. Organizing wiring;
  5. Configuring Management IPs;
  6. Connectivity Tests;
  7. Monitoring;
  8. Power source redundancy tests;
  9. Preliminary high availability tests.

Physical Appliance Installation

This consists of installing Virtual Appliances in the client’s virtualization system or on physical appliances, starting with the activities:

  1. Updated virtual machine upload;
  2. Basic network configurations;
  3. License Activation;
  4. Monitoring.

Logical Configuration

This consists of configuring the application itself:

  1. Registration of administrator users;
  2. Integrating authentication with Active Directory, LDAP, Radius, Tacacs and Certificates;
  3. Integration with email for notifications;
  4. Integration with SYSLOG;
  5. Configuring backup environment;
  6. Configuring critical information backup;
  7. Integration testing;
  8. Access testing for managed devices;
  9. Testing managed device password change.

Policy Configuration

  1. User registration;
  2. Access profiles;
  3. Registration of managed assets;
  4. Creation of access policies;
  5. Password policies;
  6. Policy integration with Active Directory.

Training and Qualification

Once the environment is configured, users and administrators will be prepared through official senhasegura training sessions.

Environment Certification

After complete environment configuration, a complete testing process is started to ensure that all configurations and integrations are in place.

The following tests are performed in this phase:

  1. Physical Appliances;
  2. Integration;
  3. Application failure;
  4. Configurations;
  5. Password change;
  6. Integration with managed devices;
  7. Backup Restore;
  8. High Availability;
  9. Disaster Recovery.

Environment Activation

Once certified, the environment goes live in production and is ready for rolling out.

Roll Out

After environment certification and activation, it is time to start the process of including devices, credentials and users in the system.

At well-defined stages, server groups and their credentials are inserted into the tool. From there on, users lose access to generic credentials and only access from within the vault.

This process repeats many times, as planned, until all credentials, devices and users access through the system and the company is secure.

Assisted operation

After go-live, it is common that questions rise. In this case, senhasegura offers, straight from the vendor or through its certified partners, the option of assisted operation during any period of time.

This eliminates initial questions and the client can operate with more assurance and comfort.

Find out why senhasegura is the fastest growing PAM solution in Brazil

REQUEST DEMO