{"id":126,"date":"2023-02-27T17:30:29","date_gmt":"2023-02-27T17:30:29","guid":{"rendered":"http:\/\/localhost\/scillcon\/?post_type=casestudie&#038;p=126"},"modified":"2025-02-06T12:25:03","modified_gmt":"2025-02-06T12:25:03","slug":"access-management-in-the-backbone","status":"publish","type":"casestudie","link":"https:\/\/beta.scillcon.com\/eng\/casestudie\/access-management-in-the-backbone\/","title":{"rendered":"Access Management in the Backbone"},"content":{"rendered":"\n<p>The customer: > 500 employees<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The general conditions:<\/h2>\n\n\n\n<p>A regulation for controlled access to defined network areas (routers, switches) of a network component infrastructure in the backbone network with several thousand devices had to be created.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The client&#8217;s requirements:<\/h2>\n\n\n\n<p>The access rights should be assigned and implemented according to the areas of responsibility in the specialist departments in the central user management system (Identity &amp; Access Management).&nbsp;Depending on the user&#8217;s activities, it should only be possible to access the network components released in the central user administration with the appropriate rights.<\/p>\n\n\n\n<p>The optimization of system availability and redundancies as well as accelerated takeover by a second system in the event of a fault (failover) of the existing access control system rounded off the requirements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The role of the consultant:<\/h2>\n\n\n\n<p>Requirements and project management<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The tasks of the consultant:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Compilation of the requirements<\/li>\n\n\n\n<li>Identification of project stakeholders<\/li>\n\n\n\n<li>Creation of a coordinated requirements document<\/li>\n\n\n\n<li>Assumption of responsibility for project management, taking into account a&nbsp;<a href=\"http:\/\/www.scillcon.com\/fallstudien\/einfuehrung-eines-benutzerverwaltungssystems\/\">parallel project<\/a>&nbsp;, which was a prerequisite for the implementation of this project<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The result:<\/h2>\n\n\n\n<p>As part of the multi-project management provided, attention was paid to the systemic cooperation of the existing and the newly created IT interfaces.&nbsp;The developers deployed were successfully motivated to work together and cleanly to link the IT systems.<\/p>\n\n\n\n<p>Capacities were increased, the existing TACACS server landscape was expanded and additional load balancers were set up as planned.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advisor&#8217;s Comment:<\/h2>\n\n\n\n<p>We have succeeded in building a functioning and unique constellation between the interconnected IT systems.&nbsp;One of the challenges in the project was to prepare tens of thousands of data in such a way that they corresponded to the current status of the hardware components in the backbone network.<\/p>\n\n\n\n<p>We have also provided the data with additional information, transferred it to a user management system and successfully migrated it to the appropriate user profiles.<\/p>\n\n\n\n<p>We would be happy to provide you with further information in a personal conversation.<br>In this regard, please contact Mr. Thomas Scislowski.<\/p>\n\n\n\n<p>Phone:&nbsp;<a href=\"tel:+492131-7084030\">+49 (0) 2131 70 840 30<\/a><\/p>\n\n\n\n<p>Email:&nbsp;<a href=\"mailto:kontakt@scillcon.com\">kontakt@scillcon.com<\/a><\/p>\n\n\n<figure class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/beta.scillcon.com\/eng\/wp-content\/uploads\/sites\/2\/2023\/02\/Access-Management-In-The-Backbone.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"object-fit:cover;\" \/><\/figure>","protected":false},"excerpt":{"rendered":"<p>The customer: > 500 employees The general conditions: A regulation for controlled access to defined network areas (routers, switches) of a network component infrastructure in the backbone network with several thousand devices had to be created. The client&#8217;s requirements: The access rights should be assigned and implemented according to the areas of responsibility in the [&hellip;]<\/p>\n","protected":false},"featured_media":174,"template":"","meta":[],"categories":[],"tags":[],"class_list":["post-126","casestudie","type-casestudie","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/beta.scillcon.com\/eng\/wp-json\/wp\/v2\/casestudie\/126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beta.scillcon.com\/eng\/wp-json\/wp\/v2\/casestudie"}],"about":[{"href":"https:\/\/beta.scillcon.com\/eng\/wp-json\/wp\/v2\/types\/casestudie"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.scillcon.com\/eng\/wp-json\/wp\/v2\/media\/174"}],"wp:attachment":[{"href":"https:\/\/beta.scillcon.com\/eng\/wp-json\/wp\/v2\/media?parent=126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.scillcon.com\/eng\/wp-json\/wp\/v2\/categories?post=126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.scillcon.com\/eng\/wp-json\/wp\/v2\/tags?post=126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}