Add Consuming IT Solutions - NCBC
49
Consuming IT Solutions - NCBC.-.md
Normal file
49
Consuming IT Solutions - NCBC.-.md
Normal file
@@ -0,0 +1,49 @@
|
|||||||
|
Improvements to Members consuming IT Solutions
|
||||||
|
Assumption:
|
||||||
|
– [ Members ] leverage IT Solutions to better serve self and corporate body [ NCBC ]
|
||||||
|
– [ NCBC ] leverage IT Solutions to better interface with the world systems
|
||||||
|
Purpose:
|
||||||
|
This is a proposed effort to provide greater insights and transparency to Elders of [ NCBC ] to better oversee the complexities of enterprise IT Solutions, used to serve and improve the lives of [ Members ].
|
||||||
|
Solution Approach:
|
||||||
|
To improve [ Members ] consuming many IT Solutions, there exists the need to orchestrate the management of ...
|
||||||
|
1. [ Members ] digital identities & personas,
|
||||||
|
2. [ Members ] membership in roles & groups, and to
|
||||||
|
3. identify, capture & persist essential data & information to relay to downstream oversight providers and continuous improvers
|
||||||
|
High Level Concept for Orchestrating Many IT System Solutions
|
||||||
|
|
||||||
|
High level solution concept is the creation of an [ IT Solution ] to orchestrate [ IT Solutions ] consuming and providing IaaS, PaaS and SaaS via available Application Programming Interfaces.
|
||||||
|
|
||||||
|
|
||||||
|
Concept: Customizing for NCBC
|
||||||
|
There is no existing [ IT Solution ] out of the box that can everything required. To provide the greatest value, all IT Solution(s) require customizing the solution, specific to the institutional constraints.
|
||||||
|
Subset of Consumed IT Solutions by [ NCBC ] for Orchestration
|
||||||
|
|
||||||
|
Above is a sample capture of the IT Solutions being consumed by [ NCBC ] [ Members ].
|
||||||
|
Generally, each IT Solution has their own approaches to managing identities, roles and permissions. This creates multiple siloed solution methods and approaches to common issues across platform management.
|
||||||
|
Here are 4 examples of IT Solutions used by [ NCBC ] to interface with the worlds enterprise systems.
|
||||||
|
1. Namecheap: Namecheap is the DNS provider for NCBC, i.e. newcovbap.church.
|
||||||
|
a. Note: This is the defacto digital identifier representing the logical, real world entity called [ NCBC ], i.e. our church, in the digital realm called the internet. Configurations contained here are globally replicated, so that anyone on the internet, anywhere in the world, has a way to find the published information concerning [ NCBC ].
|
||||||
|
b. Namecheap has their own username and password management
|
||||||
|
c. Current administrator username is linked to a specific member. [mattk***]
|
||||||
|
2. Google: Google approach to digital identities management observed, is that for every physical person, itheir gmail account, as an identifiable personna in the digital realm of the internet. Other google related services, are linked to the persons Gmail username.
|
||||||
|
3. Planning Center: Planning Center approach to digital identities management, is the creation of username and password, with limited group role management. Due to cost, not all [ Members ] to have access to capabilities available.
|
||||||
|
4. Chase Bank: Chase Bank also has their own username and password, with accounts linked to their credit card management solution, cd management etc. Named elder has the user account with delegated permissions to other members.
|
||||||
|
Concerns arise in the continuity and transitions between volunteer members, filling those roles interfacing with the IT Solution. The loss of identities, permissions, access.
|
||||||
|
Hence, this proposed effort to provide greater insights and transparency to Elders to better oversee the complexities of enterprise IT Solutions.
|
||||||
|
|
||||||
|
on their Some solutions provide API’s to automate the operations but some don’t
|
||||||
|
|
||||||
|
|
||||||
|
To improve our [ Members ] consuming many IT Solutions, there exists the need to orchestrate the management of ...
|
||||||
|
4. [ Members ] digital identities & personas,
|
||||||
|
5. [ Members ] membership in roles & groups, and to
|
||||||
|
6. identify, capture & persist essential data & information to relay to downstream oversight providers and continuous improvers
|
||||||
|
|
||||||
|
|
||||||
|
High Level Concept for Consuming Many IT System Solutions
|
||||||
|
|
||||||
|
Simplified Tech Concept Breakdown of Concepts for Consuming Many IT System Solutions
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Reference in New Issue
Block a user