In an increasingly digital and connected world, security and accessibility requirements are getting more crucial.
A fundamental security prerequisite at SLU (Swedish University of Agricultural Sciences) is the digital identity of every employee and student. This user account is used for login, email, and other authorizations.
IGA – the replacement for IDIS
In spring 2024, several systems and platforms were evaluated for their effectiveness in managing digital identities, authorizations, and governance. A process mapping was conducted, and systems were assessed based on how well they supported SLU's digital identity processes.
The choice fell on Knowit (delivery organization) and Omada Identity (platform), which during the evaluation phase demonstrated their ability to support SLU's processes in a good and cost-effective way. The new system is called IGA (Identity Governance Administration).
Why are we doing this?
There are several reasons for this initiative:
- External auditors have criticized SLU’s identity and access management security. This is a step to improve security and gain better control.
- The technical platform in IDIS (Microsoft Identity Manager) has a designated End of Life date—meaning it will no longer receive support.
- Commercial platforms are becoming highly advanced and offer functionalities we could not develop ourselves.
How will this affect me?
Everyone at SLU has a digital identity (a username and password). Moving forward, IGA will automatically create these user credentials and assign basic authorizations to you.
Employees
As an SLU employee, you will gain access to a self-service portal. Through this portal, you can request access to systems or services you need. This will simplify your work, as all access management will eventually be centralized. You will be able to order everything from file areas and file access to mail groups and system access through the portal.
Managers
As a manager, you will approve or reject access requests submitted by your staff. The process will function similarly to how it works today.
You will receive an email with a link. By clicking the link, you can choose to approve or deny the request. Additionally, you will be able to request access on behalf of your employees via an easy-to-use interface and ensure your team has the correct access over time.