2015-05-27

Description * Stand up OpenAM and OpenIDM environments * Configure OpenAM as an identity provider (External Federation) * Work with Directory Services team to configure connections to data repositories and directories * Working with network and infrastructure engineers to complete build out of Production environments * Define and configure policies * Define methodology for common claims tokens * Build recommendations/patterns around the optimal OpenAM application integration mechanism for given scenarios: * Example: Policy Agent, Fedlet, direct integration, etc. * Needs to take into account Java, .NET, and WebSphere * Configure new application integrations to OpenAM and OpenIDM: * Create \\"circle of trust , Configure protocols, define claim sets, manage certificates, etc for OpenIDM. * Configure \\"out of the box MFA for OpenIDM. * Configure Single Sign On relationships * Implement business defined access workflows in OpenIDM (Activiti) * Support custom development for User interfaces to the Identity tools * Work with developers to implement a MGI branded web login page for OpenAM * Work with developers to implement MGI branded pages for flows for OpenIDM * Work with developers to implement updates and changes to MGI branded pages for custom Self-Service pages for OpenOTP * Support Application integration * Review the OpenAM proof of technology outcomes. * Assist in the creation of recommendations/patterns around the optimal OpenAM application integration mechanism for identified integration scenarios. * Assist with the technical design of agent-facing web sites, web services integrations, and native client applications which are needed to support OpenAM. These applications could be written in .Net, Java, and possibly WebSphere * Support LDAP and other schema changes to OpenIDM that are needed as new applications/use cases integrate. * Operationalize systems * Work with technical writers to document the systems and produce user guides * Complete set-up of current OpenOTP environments to support expanded roll-out of MFA hard token functionality * Review the policies that define how user accounts are created .and. managed. Document changes to reflect discussions and decisions. * Work with IT Security to establish and document password policies, strength, reuse, retry attempts. * Review, validate and document common user roles. * Provide support guidance to first and second tier support organizations, as well as Operational Infrastructure teams for how to handle basic support items * Administration and support of production systems * Consult on upgrade of current OpenOTP environments and contribute as needed * Maintain the service health and answer third-level support issues. * Red Hat Linux admin knowledge required for installation and upgrades. * Operational Transition Activities * Create and support the transition plan for MoneyGram Security and Access teams to take over ownership of the identity framework. Employer's Job# 15-03065 Please visit job URL for more information about this opening and to view EOE statement.

Show more