Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Size: px
Start display at page:

Download "Security solutions Executive brief. Understand the varieties and business value of single sign-on."

Transcription

1 Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005

2 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies implement SSO in a variety of computing models 5 Complete Web SSO encompasses a variety of capabilities 6 Desktop SSO 7 Back-end and portal SSO 8 Three-tier SSO 8 SSO to host application emulators 9 Cross-domain SSO 9 Deploy federated SSO to facilitate cross-enterprise interactions 10 Derive additional value from legacy applications with client/ server SSO 10 Enjoy security management benefits beyond SSO 12 For more information 12 About Tivoli software from IBM Executive overview Although many businesses are interested in single sign-on (SSO) because of the promise that it can simplify administration and enhance user experiences, there is more than one kind of SSO. By surveying the different types of SSO and the benefits of each, you ll be in a good position to clearly articulate your company s SSO requirements and to identify a solution that can deliver a full range of SSO capabilities. SSO delivers multiple business benefits To be an on demand business, a company frequently requires SSO capabilities. By providing users with the ability to log in once across the applications and operating systems that they need to access, a business delivers both quantifiable and qualitative benefits, including: Reduced administration costs When users must log in multiple times, they are more likely to forget passwords, which in turn leads to greater help-desk costs. In fact, Gartner estimates that 15 to 35 percent of the calls to a help desk are for password resets, and each call generates, on average, $20 in IT costs.* SSO can significantly reduce these calls and their resulting costs. Greater user productivity and experience SSO allows users to access business systems faster, which enables them to get more done. And users who can sign in once feel better about their transaction experience than users who must log in multiple times with many different IDs and passwords. Faster application deployment When companies deploy a superior SSO and security system that allows application developers to call out to external security services, security no longer has to be coded into each application. As a result, a company can get new applications to market quickly, and can later update application business logic and enhance security much more efficiently.

3 3 Highlights IBM helps companies implement SSO in a variety of computing models The benefits of SSO grow as it is applied against an expanded pool of IT environments. As computing models have evolved from distributed client/server systems to Web-based applications and now even to federated SSO configurations often involving emerging standards such as Security Assertion Markup Language (SAML), Liberty Alliance and Web Services Federation Language (WS-Federation) businesses are able to realize increasingly significant value from SSO solutions particular to each model. IBM software combined with offerings from IBM Business Partners supports Web SSO, federated SSO and client/server SSO By leveraging IBM Tivoli Access Manager for e-business in conjunction with IBM Tivoli Federated Identity Manager and offerings from IBM Business Partners, companies are implementing SSO under each of these models: The predominant computing model today is the Web model, involving HTTP/HTTPS transactions, with applications on Web servers, application servers or both. More than 1,400 customers worldwide deploy Tivoli Access Manager for e-business to provide SSO to Web-based applications. The software integrates with more than 70 software vendor applications. Many businesses are moving toward federated, cross-domain configurations to cost-effectively introduce partner-hosted capabilities into their customers Web experiences. These environments typically involve a business that has partner relationships, where the partner isn t necessarily using the same software as the business itself. Consequently, it is essential that federated, cross-domain software supports the latest interoperability standards used in SOA-based environments: SAML, Liberty Alliance and WS-Federation. IBM addresses these requirements with Tivoli Federated Identity Manager, which tightly integrates with Tivoli Access Manager for e-business.

4 4 IBM software along with IBM Business Partner solutions address SSO requirements for three coexisting computing models. Although few, if any, of the more modern computing solutions being developed today use the client/server model, many legacy client/server applications can still benefit from SSO. The flexible integration of Tivoli Access Manager for e-business with offerings from IBM Business Partners facilitates the extension of SSO to distributed client/server environments. On the following pages, you can learn more about IBM solutions for Web SSO, federated SSO and client/server SSO. Later, this document explores additional key benefits that the core solution, Tivoli Access Manager for e-business and Tivoli Federated Identity Manager, can provide.

5 5 Highlights Complete Web SSO encompasses a variety of capabilities Tivoli Access Manager for e-business offers robust Web application SSO support, with excellent coverage of the initial point of focus between browsers and Web and application servers and much more. To facilitate browser/web server interactions, Tivoli Access Manager for e-business supports: Web trust configurations using IBM WebSphere Application Server SSO capabilities and others. Basic authentication SSO. Forms-based SSO. Lightweight third-party authentication (LTPA) SSO. Passing user information in the HTTP header. A global sign-on (GSO) mechanism for retrieving user names and passwords for back-end application resources. Address desktop SSO, back-end and portal SSO, three-tier SSO, SSO to host application emulators and cross-domain SSO Because IBM customers have been using Tivoli Access Manager for e-business and its precursors to solve Web SSO issues since the early 1990s, there have been many additions to its Web SSO capabilities, addressing a wide variety of business needs. Consequently and unlike products with a more limited scope Tivoli Access Manager for e-business can be used to address desktop SSO, back-end and portal SSO, three-tier SSO, SSO to host application emulators and cross-domain SSO. Only a robust Web SSO solution addresses all these areas.

6 6 Tivoli Access Manager for e-business extends Windows desktop SSO to a wide variety of Web application platforms. Desktop SSO Many IBM clients appreciate desktop SSO the way that they can log on once to the Microsoft Windows operating system and avoid subsequent sign-in requests to all their Windows applications. But a number of years ago, IBM made it possible to further leverage the Windows desktop SSO, extending it to Web applications protected by Tivoli Access Manager for e-business and running on UNIX, Novell and mainframe systems. (This is sometimes called Kerberizing Tivoli Access Manager for e-business because the technology is based on the Kerberos protocol that Microsoft uses in its Simple and Protected GSSAPI Negotiation Mechanism [SPNEGO] and Microsoft Windows NT LAN Manager [NTLM] implementations.) Companies who have used the last few releases of Tivoli Access Manager for e-business have appreciated the convenience and time savings that this expansion of desktop SSO provides.

7 7 Back-end and portal SSO It s not uncommon for companies to implement a so-called SSO solution for a portal, only to find that they still get many password prompts. This is because inferior SSO solutions handle the link between the Web browser and the portal, but not those between the portal and its portlets, which connect to other applications that need ID and password combinations. But with Tivoli Access Manager for e-business, user information can be passed to an application server or portal server, and that information can be used to build a credential appropriate to the back-end application environment. To extend SSO to back-end applications and portals, Tivoli Access Manager for e-business includes: Java Authentication and Authorization Services (JAAS ) standardized support for programmatic security. J2EE -standardized support for declarative security. A technology preview that enables programmatic and declarative security for.net applications. Special GSO support integrated with the WebSphere Portal credential vault to extend SSO support to the portal s back-end applications.

8 8 Tivoli Access Manager for e-business coordinates with WebSphere, RACF and J2EE technologies to enable SSO to mainframe applications. Three-tier SSO Mainframe applications protected by IBM RACF are widely appreciated for their high degree of security. Many businesses have Web-enabled these applications to extend their value, but not every SSO solution can manage authentication with mainframe applications. Tivoli Access Manager for e- business works in concert with WebSphere software, and RACF and J2EE Connector Architecture (JCA) capabilities to map user information for use in each environment that is involved in a user s request for enterprise server, or mainframe, data. Because such transactions involve browsers, middle-tier servers and enterprise servers, they are typically called threetier transactions. SSO to host application emulators Another set of applications that have had their value extended by Web enablement are emulation applications running on IBM zseries, IBM iseries and DEC/UNIX. The integration of Tivoli Access Manager for e-business with IBM WebSphere Host Access Transformation Services and IBM WebSphere Host On-Demand enables clients to provide SSO to these emulation applications.

9 9 Highlights Cross-domain SSO Cross-domain SSO is an area growing in significance, largely spurred by the popularity of federated configurations and the Web services revolution. For companies that need broad coverage of protocols and token types in support of a variety of cross-domain and cross-enterprise relationships, the following section provides more information. But for customers who want to implement more limited cross-domain SSO with fewer management capabilities and a community of partners all running Tivoli Access Manager for e-business IBM includes toolkits with a number of design alternatives in Tivoli Access Manager for e-business. Deploy federated SSO to facilitate cross-enterprise interactions As more and more customers implement complex solutions involving federation with third parties, customer demand is growing for extending the value of SSO to transactions that cross enterprise or domain boundaries. This is sometimes called federated SSO, which may or may not involve the use of a Web services architecture. Support a range of key federated SSO interoperability standards The powerful IBM solution for addressing federated SSO is Tivoli Federated Identity Manager, which includes Tivoli Access Manager for e-business. Together, these technologies provide robust management of identities involved in business-to-business SSO transactions. A key aspect of Tivoli Federated Identity Manager is its support of three key federated SSO interoperability standards: SAML, Liberty Alliance and WS-Federation. This is important because in business-to-business exchanges, you can t always be sure which protocol your partner will be able to support.

10 10 Highlights Customers looking to leverage federated configurations to expand their business with relatively minor investments can now do so with great security, thanks to the combination of Tivoli Federated Identity Manager and Tivoli Access Manager for e-business. Leverage integrated offerings to extend SSO to client/server transactions Derive additional value from legacy applications with client/server SSO To extend the support of SSO to client/server transactions, Tivoli Access Manager for e-business can be integrated with leading client-centric SSO solutions from IBM Business Partners, including: ActivCard ActivClient. Encentuate TCI. Passlogix v-go Single Sign-On. Note that IBM Tivoli Identity Manager can provision users for each of these solutions. Deploy a full range of security management capabilities Enjoy security management benefits beyond SSO Tivoli Access Manager for e-business not only delivers substantial SSO value, it also provides a number of additional security management benefits, including: Authorization for Web applications, enabling uniform application of policies that specify who can and who cannot access sets of resources. Reverse proxy, protecting intranet, Web and application servers from Internet access (and, optionally, from intranet access).

11 11 Front-end authentication for applications: Out-of-the-box support for multiple authentication mechanisms (including user identities and passwords, certificates and tokens), without requiring modification of back-end applications to support these technologies. Switch user capability (where an administrator can take over a user s session), and authentication step-up and forced reauthentication (for accessing highly sensitive target data and applications) essential authentication options for some businesses. Audit capabilities when combined with a clear, unified access-control policy, can be a key enabler of audit readiness and compliance with such regulations as Sarbanes-Oxley. Tivoli Access Manager for e-business is designed to help companies maintain and certify the validity of their records and disclosures of pertinent information. In addition to its federated SSO capabilities, Tivoli Federated Identity Manager extends the Web services security function of WebSphere and WebSphere Web Services Gateway by: Expanding support for security token types, which allows out-of-the-box use of SAML and Liberty Alliance tokens. Mapping user identities received from another domain to identities understood locally, and then mapping and adding attributes as necessary. Authorizing local identities for access to requested Web services, ensuring only legitimate use of the Web services.

12 For more information Many vendors talk about their SSO solutions, and yet they only address a small piece of the puzzle. Today, Tivoli Access Manager for e-business delivers SSO in the area where its need is most prevalent today the Web. Additionally, the software works with Tivoli Federated Identity Manager to address federated and Web services SSO, and with business partners to address legacy client/server configurations. To learn more about how Tivoli software can help you achieve your SSO goals and address a broad range of security challenges throughout your enterprise contact your IBM sales representative or IBM Business Partner, or visit ibm.com/tivoli About Tivoli software from IBM Tivoli software from IBM helps organizations efficiently and effectively manage information technology (IT) resources, tasks and processes in order to meet ever-shifting business requirements and deliver flexible and responsive IT service management, while reducing costs. The Tivoli portfolio spans software for security, compliance, storage, performance, availability, configuration, operations and IT lifecycle management, and is backed by world-class IBM services, support and research. Copyright IBM Corporation 2005 IBM Corporation Software Group Route 100 Somers, NY U.S.A. Produced in the United States of America All Rights Reserved IBM, the IBM logo, iseries, RACF, Tivoli, WebSphere, z/os and zseries are trademarks of International Business Machines Corporation in the United States, other countries or both. Linux is a trademark of Linus Torvalds in the United States, other countries or both. Microsoft, Windows and Windows NT are trademarks of Microsoft Corporation in the United States, other countries or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries or both. Other company, product and service names may be trademarks or service marks of others. * R. Witty, K. Brittain, A. Allan. Justify Identity Management With Metrics. Gartner Research. February 23, G

White paper December 2008. Addressing single sign-on inside, outside, and between organizations

White paper December 2008. Addressing single sign-on inside, outside, and between organizations White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli

More information

IBM Tivoli Federated Identity Manager

IBM Tivoli Federated Identity Manager IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations

More information

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Service management White paper. Manage access control effectively across the enterprise with IBM solutions. Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

How To Use Ibm Tivoli Composite Application Manager For Response Time Tracking

How To Use Ibm Tivoli Composite Application Manager For Response Time Tracking Track transactions end to end across your enterprise to drive fast response times and help maintain high customer satisfaction IBM Tivoli Composite Application Manager for Response Time Tracking Highlights

More information

IBM Tivoli Identity Manager

IBM Tivoli Identity Manager Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,

More information

Collaboration solutions for midsized businesses Buyer s guide

Collaboration solutions for midsized businesses Buyer s guide Collaboration solutions for midsized businesses Buyer s guide Increase productivity by improving collaboration across and beyond your business. Give employees access to the information, people and resources

More information

IBM Tivoli Composite Application Manager for WebSphere

IBM Tivoli Composite Application Manager for WebSphere Meet the challenges of managing composite applications IBM Tivoli Composite Application Manager for WebSphere Highlights Simplify management throughout the Create reports that deliver insight into life

More information

IBM Tivoli Access Manager for Enterprise Single Sign-On

IBM Tivoli Access Manager for Enterprise Single Sign-On Deliver seamless access to applications with an easy-to-deploy solution IBM Single Sign-On Highlights Help simplify the employee experience by eliminating the need to remember and manage user names and

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com

More information

Provide access control with innovative solutions from IBM.

Provide access control with innovative solutions from IBM. Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business

More information

IBM Tivoli Composite Application Manager for WebSphere

IBM Tivoli Composite Application Manager for WebSphere Meet the challenges of managing composite applications IBM Tivoli Composite Application Manager for WebSphere Highlights Simplify management throughout the life cycle of complex IBM WebSphere-based J2EE

More information

IBM Security & Privacy Services

IBM Security & Privacy Services Enter Click Here The challenge of identity management Today organizations are facing paradoxical demands for greater information access and more stringent information security. You must deliver more data

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

IBM Tivoli Monitoring for Network Performance

IBM Tivoli Monitoring for Network Performance Optimize networks to increase application performance and availability IBM Tivoli Monitoring for Network Performance Highlights Performance management for today s networks Today s networks are a combination

More information

Security Services. Benefits. The CA Advantage. Overview

Security Services. Benefits. The CA Advantage. Overview PRODUCT BRIEF: CA SITEMINDER FEDERATION SECURITY SERVICES CA SiteMinder Federation Security Services CA SITEMINDER FEDERATION SECURITY SERVICES EXTENDS THE WEB SINGLE SIGN-ON EXPERIENCE PROVIDED BY CA

More information

Remove barriers to innovation by choosing the right identity and access management solution.

Remove barriers to innovation by choosing the right identity and access management solution. Identity and access management solutions Buyer s guide: purchasing criteria Remove barriers to innovation by choosing the right identity and access management solution. March 2008 Business leaders everywhere

More information

Choose an IBM WebSphere Application Server configuration to suit your business needs

Choose an IBM WebSphere Application Server configuration to suit your business needs IBM is the industry s market leading foundation for building, deploying, reusing, integrating and managing applications and services Choose an IBM configuration to suit your business needs Highlights Unparalleled

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution. IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services Combine resources for one complete online business security solution. Big e-business opportunities demand security to match

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

IBM WebSphere Application Server Family

IBM WebSphere Application Server Family IBM IBM Family Providing the right application foundation to meet your business needs Highlights Build a strong foundation and reduce costs with the right application server for your business needs Increase

More information

IBM Tivoli Service Request Manager

IBM Tivoli Service Request Manager Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate

More information

IBM Tivoli Monitoring for Databases

IBM Tivoli Monitoring for Databases Enhance the availability and performance of database servers IBM Tivoli Monitoring for Databases Highlights Integrated, intelligent database monitoring for your on demand business Preconfiguration of metric

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

and the software then detects and automates all password-related events for the employee, including:

and the software then detects and automates all password-related events for the employee, including: Reduce costs, simplify access and audit access to applications with single sign-on IBM Single Sign-On Highlights Reduce password-related helpdesk Facilitate compliance with pri- costs by lowering the vacy

More information

WebLogic Server 7.0 Single Sign-On: An Overview

WebLogic Server 7.0 Single Sign-On: An Overview WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Delivering a platform-independent based ESB for universal connectivity and transformation in heterogeneous IT environments.

Delivering a platform-independent based ESB for universal connectivity and transformation in heterogeneous IT environments. IBM WebSphere Message Broker To support your IT objectives Delivering a platform-independent based ESB for universal connectivity and transformation in heterogeneous IT environments. The evolution of application

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...

More information

IBM WebSphere Business Integration Monitor, Version 4.2.4

IBM WebSphere Business Integration Monitor, Version 4.2.4 View business results in real time to accelerate informed decision making and help improve business effectiveness IBM WebSphere Business Integration Monitor, Version 4.2.4 Highlights Tracks business process,

More information

Passlogix Sign-On Platform

Passlogix Sign-On Platform Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

SAML SSO Configuration

SAML SSO Configuration SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting

More information

Web Express Logon Reference

Web Express Logon Reference IBM WebSphere Host On-Demand Version 10 Web Express Logon Reference SC31-6377-01 IBM WebSphere Host On-Demand Version 10 Web Express Logon Reference SC31-6377-01 Note Before using this information and

More information

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Application integration solutions To support your IT objectives IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Market conditions and business

More information

When millions need access: Identity management in an increasingly connected world

When millions need access: Identity management in an increasingly connected world IBM Software Thought Leadership White Paper January 2011 When millions need access: Identity management in an increasingly connected world Best practice solutions that scale to meet today s huge numbers

More information

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,

More information

HOBCOM and HOBLink J-Term

HOBCOM and HOBLink J-Term HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Germany Tel: +49 09103 / 715-0 Fax: +49 09103 / 715-271 E-Mail: support@hobsoft.com Internet: www.hobsoft.com HOBCOM and HOBLink J-Term Single Sign-On

More information

IBM Digital Experience meets IBM WebSphere Commerce

IBM Digital Experience meets IBM WebSphere Commerce Portal Arbeitskreis - 27.10.2014 IBM Digital Experience meets IBM WebSphere Commerce Stefan Koch Chief Programmer IBM Digital Experience 2013 IBM Corporation 2 2013 IBM Corporation Integration Pattern

More information

- Identity & Access Management

- Identity & Access Management IBM Software Group NSHE - Identity & Access Management 2006 IBM Corporation Identity & Access Management Access Management and The Monitoring, Auditing and Reporting for Compliance So What s The Problem

More information

IBM Tivoli Directory Integrator

IBM Tivoli Directory Integrator IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,

More information

Microsoft and Novell - A Case Study in Identity Federation

Microsoft and Novell - A Case Study in Identity Federation Boosting interoperability and collaboration across mixedtechnology environments Standards-based identity federation solutions from Microsoft and Novell May 2009 Executive summary Despite remarkable gains

More information

IBM Maximo technology for business and IT agility

IBM Maximo technology for business and IT agility IBM Software Tivoli March 2010 IBM Maximo technology for business and IT agility IBM asset and service management solutions 2 IBM Maximo technology for business and IT agility Contents 2 Executive summary

More information

IBM WebSphere Enterprise Service Bus, Version 6.0.1

IBM WebSphere Enterprise Service Bus, Version 6.0.1 Powering your service oriented architecture IBM WebSphere Enterprise Service Bus, Version 6.0.1 Highlights Supports a variety of messaging Requires minimal standards including JMS, Version 1.1 programming

More information

AND SUN OPENSSO MICROSOFT GENEVA SERVER ENABLING UNPRECEDENTED COLLABORATION ACROSS HETEROGENEOUS IT ENVIRONMENTS. White Paper May 2009.

AND SUN OPENSSO MICROSOFT GENEVA SERVER ENABLING UNPRECEDENTED COLLABORATION ACROSS HETEROGENEOUS IT ENVIRONMENTS. White Paper May 2009. MICROSOFT GENEVA SERVER AND SUN OPENSSO ENABLING UNPRECEDENTED COLLABORATION ACROSS HETEROGENEOUS IT ENVIRONMENTS White Paper May 2009 Abstract Interoperability between applications in heterogeneous technology

More information

Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal

Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal Guideline Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal Product(s): IBM Cognos ReportNet Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).

More information

The Challenges of Managing Multiple Cloud Identities and Enterprise Identity by BlackBerry

The Challenges of Managing Multiple Cloud Identities and Enterprise Identity by BlackBerry MANAGING CLOUD APPS IN THE ENTERPRISE How to Overcome the Complexity Whitepaper 2 The Trouble with Managing Multiple Cloud Identities Over the last decade, cloud-based apps have become fundamental to how

More information

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for

More information

NetworkingPS Federated Identity Solution Solutions Overview

NetworkingPS Federated Identity Solution Solutions Overview NetworkingPS Federated Identity Solution Solutions Overview OVERVIEW As the global marketplace continues to expand, new and innovating ways of conducting business are becoming a necessity in order for

More information

IBM Tivoli Web Response Monitor

IBM Tivoli Web Response Monitor IBM Tivoli Web Response Monitor Release Notes Version 2.0.0 GI11-4068-00 +---- Note ------------------------------------------------------------+ Before using this information and the product it supports,

More information

Address IT costs and streamline operations with IBM service request and asset management solutions.

Address IT costs and streamline operations with IBM service request and asset management solutions. Service management solutions To support your IT objectives Address IT costs and streamline operations with IBM service request and asset management solutions. Highlights Help service desk technicians become

More information

Cybersecurity and Secure Authentication with SAP Single Sign-On

Cybersecurity and Secure Authentication with SAP Single Sign-On Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle

More information

IBM Sales and Distribution IBM and Manhattan Associates

IBM Sales and Distribution IBM and Manhattan Associates IBM Sales and Distribution IBM and Manhattan Associates Innovating across the supply chain and beyond 2 IBM and Manhattan Associates Market-leading companies realize that their supply chains are strategic

More information

identity management in Linux and UNIX environments

identity management in Linux and UNIX environments Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual

More information

Integration and Infrastructure Software. IBM WebSphere Application Server Family. Flexible infrastructure for todayʼs business world.

Integration and Infrastructure Software. IBM WebSphere Application Server Family. Flexible infrastructure for todayʼs business world. Integration and Infrastructure Software IBM WebSphere Application Server Family. Flexible infrastructure for todayʼs business world. Build on demand solutions with a more flexible infrastructure. Today

More information

Consolidated security management for mainframe clouds

Consolidated security management for mainframe clouds Security Thought Leadership White Paper February 2012 Consolidated security management for mainframe clouds Leveraging the mainframe as a security hub for cloud-computing environments 2 Consolidated security

More information

Authentication: Password Madness

Authentication: Password Madness Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the

More information

User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources)

User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources) User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources) Nature of Document: Guideline Product(s): IBM Cognos 8 BI Area of Interest: Security Version: 1.2 2 Copyright and Trademarks Licensed

More information

Successfully managing geographically distributed development

Successfully managing geographically distributed development IBM Rational SCM solutions for distributed development August 2004 Successfully managing geographically distributed development Karen Wade SCM Product Marketing Manager IBM Software Group Page 2 Contents

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

IBM Security Access Manager for Web

IBM Security Access Manager for Web IBM Security Access Manager for Web Secure user access to web applications and data Highlights Implement centralized user authentication, authorization and secure session management for online portal and

More information

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on

More information

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents

More information

Address IT costs and streamline operations with IBM service desk and asset management.

Address IT costs and streamline operations with IBM service desk and asset management. Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT

More information

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011 NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:

More information

Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On

Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On SAP Brief SAP NetWeaver SAP NetWeaver Single Sign-On Objectives Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On Single sign-on in the SAP software architecture Single sign-on

More information

G00123440 A. Allan. Directory authentication providing a common ID and password across multiple systems

G00123440 A. Allan. Directory authentication providing a common ID and password across multiple systems . llan Research Note 21 October 2004 Commentary Enterprise Single Sign-On Tools re Comprehensive but Costly Managing multiple user identities and passwords is difficult for companies and users. ESSO can

More information

How To Get A Single Sign On (Sso)

How To Get A Single Sign On (Sso) Single Sign-On Vijay Kumar, CISSP Agenda What is Single Sign-On (SSO) Advantages of SSO Types of SSO Examples Case Study Summary What is SSO Single sign-on is a user/session authentication process that

More information

IBM Tivoli Monitoring for Applications

IBM Tivoli Monitoring for Applications Optimize the operation of your critical e-business applications IBM Tivoli Monitoring for Applications Highlights Helps maintain the performance and availability of your application environment including

More information

Federated Identity and Trust Management

Federated Identity and Trust Management Redpaper Axel Buecker Paul Ashley Neil Readshaw Federated Identity and Trust Management Introduction The cost of managing the life cycle of user identities is very high. Most organizations have to manage

More information

HP Software as a Service. Federated SSO Guide

HP Software as a Service. Federated SSO Guide HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying

More information

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). ITIL-aligned solutions White paper Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). January 2005 2 Contents 2

More information

IBM Rational Asset Manager

IBM Rational Asset Manager Providing business intelligence for your software assets IBM Rational Asset Manager Highlights A collaborative software development asset management solution, IBM Enabling effective asset management Rational

More information

Biometric Single Sign-on using SAML Architecture & Design Strategies

Biometric Single Sign-on using SAML Architecture & Design Strategies Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems Ramesh.Nagappan@sun.com 1 Setting Expectations What you can take away! Understand

More information

Move beyond monitoring to holistic management of application performance

Move beyond monitoring to holistic management of application performance Move beyond monitoring to holistic management of application performance IBM SmartCloud Application Performance Management: Actionable insights to minimize issues Highlights Manage critical applications

More information

IBM Tivoli Remote Control

IBM Tivoli Remote Control Robust remote desktop management across the enterprise IBM Tivoli Remote Control Highlights Enables organizations to Supports Federal Desktop Core remotely manage thousands of Configuration (FDCC) and

More information

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems

More information

SSO Case Study: The USPS Gives SSO Its Stamp of Approval. May 10, 2005. Wayne Grimes, Manager, Customer Care Operations, USPS

SSO Case Study: The USPS Gives SSO Its Stamp of Approval. May 10, 2005. Wayne Grimes, Manager, Customer Care Operations, USPS SSO Case Study: The USPS Gives SSO Its Stamp of Approval Wayne Grimes, Manager, Customer Care Operations, USPS May 10, 2005 Today s topics An overview of the USPS USPS SSO efforts Lessons we learned along

More information

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials

More information

Novell Access Manager SSL Virtual Private Network

Novell Access Manager SSL Virtual Private Network White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...

More information

Leveraging SAML for Federated Single Sign-on:

Leveraging SAML for Federated Single Sign-on: Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.

More information

Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal

Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal Guideline Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal Product: IBM Cognos 8 BI Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).

More information

Simplify and Secure Cloud Access to Critical Business Data

Simplify and Secure Cloud Access to Critical Business Data SAP Brief SAP Technology SAP Cloud Identity Objectives Simplify and Secure Cloud Access to Critical Business Data Gain simplicity and security in a single cloud solution Gain simplicity and security in

More information

IBM CICS Transaction Gateway for Multiplatforms, Version 7.0

IBM CICS Transaction Gateway for Multiplatforms, Version 7.0 Delivers highly flexible, security-rich and scalable SOA access to CICS applications IBM Multiplatforms, Version 7.0 Highlights Connects WebSphere SOA Introduces real-time monitoring Foundation server

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

Extranet Access Management Web Access Control for New Business Services

Extranet Access Management Web Access Control for New Business Services Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control

More information

CA Federation Manager

CA Federation Manager PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

SECURE ACCESS TO THE VIRTUAL DATA CENTER

SECURE ACCESS TO THE VIRTUAL DATA CENTER SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

How To Write An Architecture For An Bm Security Framework

How To Write An Architecture For An Bm Security Framework Security Reference Architecture James (Jimmy) Darwin James.Darwin@au.ibm.com 2010 IBM Corporation 0 Reference Architectures As part of the Time-to-Value Initiative, Reference Architectures have been identified

More information

Biometric Single Sign-on using SAML

Biometric Single Sign-on using SAML Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP Ramesh.Nagappan@sun.com 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On

More information