Why it s Time to Make the Change Analysis of Current Technologies for Multi-Factor Authentication in Active Directory

Size: px
Start display at page:

Download "Why it s Time to Make the Change Analysis of Current Technologies for Multi-Factor Authentication in Active Directory"

Transcription

1 GoldKey vs RSA Why it s Time to Make the Change Analysis of Current Technologies for Multi-Factor Authentication in Active Directory WideBand Corporation

2 Analysis of Current Technologies for Multi-Factor Authentication in Active Directory Introduction Many of today s large organizations rely on two-factor authentication. The principal motive for adopting multi-factor authentication is the large number of known attacks that have been made possible by the simple nature of the username and password model. The purpose of this paper is to provide a technology comparison between the GoldKey solution for multi-factor authentication into Microsoft Active Directory and the RSA SecurID solution. Special attention will be given to the strengths and weaknesses of these systems as they pertain to both the security provided and the expertise and effort required to deploy and administer them. Active Directory is Microsoft s implementation of an LDAP directory, and is the industry leader in central management for user accounts and permissions, as well as computer configuration within the enterprise. With their SecurID solution, RSA is currently the leading provider of OTP tokens. RSA SecurID Basics of OTP Tokens OTP tokens are often used to secure login to Active Directory, and are also widely used to provide twofactor authentication to VPN and web services. Initially, OTP tokens (either hardware or software) are assigned a serial number and are provisioned with a symmetric cryptographic key, also known as a seed, which will be used along with a time-based algorithm to generate the necessary passcodes. This algorithm converts the current time into a number of minutes since a predefined time (originally January 1, 1986), and cryptographically combines it with the token s seed to generate the OTP code [1]. The OTP codes are calculated independently by the tokens and a central appliance (called an Authentication Manager, or AM) during authentication, and compared at the AM to determine the status of the authentication. The initial seeding is done by RSA and customers receive their seed lists with the delivery of an order. GoldKey vs RSA Why it s Time to Make the Change 2

3 Prerequisites and AD Configuration The SecurID solution requires the presence of an AM for OTP code verification. The seed lists from RSA must be loaded into the AM by the customer, and the AM must be configured to use Active Directory as an LDAP Identity Source, which the AM will use to gather information about current users. This allows users and groups to be created within Active Directory as usual, and token mapping to be done within the AM Security Console. Other configuration options are available, but for Active Directory this provides the most straight-forward and maintainable solution from among the available options. Additionally, replica AM units may be configured to provide performance scalability and AM redundancy. This is often desirable since the AM maintains an internal database of user attributes not associated with Active Directory, such as the tokens that have been assigned and a SecurID PIN. In order to provide scalability and automatic redundancy, you must configure a load balancer to manage traffic destined for the AM units. Deployment After the prerequisites are in place, tokens must be assigned to the users who are to perform multifactor authentication. To accomplish this, a security administrator must log into the RSA Security Console, locate the correct user and link up a token by serial number (available tokens are listed from the seed list you imported previously). Then, care must to taken to make sure that assigned tokens are distributed to the correct users [2]. The last setup step is to provision the token. This is usually done by the user assigning a PIN to the token using the Self-Service Console after token distribution. Some user training is required in order for this process to be successful. Long-Term Deployment Considerations RSA SecurID tokens come with a sealed, unreplaceable battery, and are further preprogrammed with a lifetime specified at the factory. These tokens must be replaced at the end of their lifetime. Unless a user is willing to allow authentication traffic to traverse the internet, the number of required AM appliances will grow as the SecurID solution is deployed to multiple locations. GoldKey vs RSA Why it s Time to Make the Change 3

4 Authentication Once the tokens are provisioned and a user attempts to authenticate with the SecurID system, they are prompted for their username and passcode. A passcode is a concatenation of their PIN and the OTP that appears on their token. The username and passcode are then submitted to the Authentication Manager, which independently generates the correct passcode for the token assigned to the specified user [2] [3]. Figure 1. Signing into Active Directory with RSA SecurID If the passcode matches, the Authentication Manager returns the user s Active Directory password to the RSA authentication software, or agent, on the client s computer. The client then passes this information to the domain controller where it is checked with the Authentication Manager to confirm that a two-factor authentication has in fact occurred. GoldKey vs RSA Why it s Time to Make the Change 4

5 Security Considerations With this authentication model, it becomes obvious that the Authentication Manager must have access to a list of the seeds for the user s tokens, or a Master seed that can be used to derive the individual token seeds on demand. If an attacker were able to obtain the list of token seeds, or a Master seed used to derive token seeds, the security of this system could be compromised. See the Known Attacks section for more information. The SecurID solution relies on lists of symmetric keys that are generated by RSA and subsequently communicated to the customer. While this can be handled properly, it does not inherently preclude the accidental disclosure of that sensitive information. Security concerns that should be raised in this type of deployment include: 1. Are the seed lists, or the ability to derive these lists, retained by RSA? Since this information is retained by RSA, several valid questions should be considered: a. How well does RSA protect this information from unauthorized access? b. What constitutes authorized access, and does the customer have control of authorization? c. Since access to this information facilitates unauthorized access the customer s protected resources, should RSA, or any other third party, be trusted to make this decision? 2. How well protected are these lists in transit to the customer? 3. How well are the seed lists protected by the AM device itself? 4. Are seed lists retained by the customer, outside of the AM internal database? If they are: a. Are these lists stored in an encrypted form? b. How well are the encryption secrets protected? c. What measures are taken to ensure that even encrypted copies of these lists are protected from unauthorized access? Any security implementation that relies on a pre-shared key is only as secure as the means employed to store and distribute those keys. Generated seed files must be communicated to the customer securely, and then protected for the lifetime of the tokens. Known Attacks On March 17, 2011 the security of RSA s network was compromised and the seeds for a large number of SecurID tokens, or Master seeds used to derive these token seeds, were stolen [4] [5] [6]. In the following months, attacks against high-profile SecurID customers leveraged this information [4] [6]. GoldKey vs RSA Why it s Time to Make the Change 5

6 GoldKey Built-In Smart Card Basics of PKI and the GoldKey Solution In contrast to OTP solutions, PKI deployments utilize asymmetric encryption and digital signature using related keys. Instead of provisioning tokens and loading a list of seeds into a central appliance, unique secret keys called private keys are generated and loaded onto a GoldKey token. A particular public key can only be used for communicating with the individual that has access to the associated private key, and so can be freely distributed. For security, private keys are generated directly on the GoldKey device. GoldKey tokens include a built-in, PIV-compliant smart card and reader and provide an elegant integration with Microsoft's Active Directory and security infrastructure. GoldKey tokens allow a user to securely store and transport private keys for use within a PKI deployment, and have been widely adopted as a multi-factor authentication mechanism for Microsoft s Active Directory. GoldKey tokens are also often used for more than Active Directory authentication due to the wide range of possible uses for certificates. Common examples are authenticating to VPN and web services, digitally signing documents, and providing signing and encryption for secure communication. Prerequisites and AD Configuration The frameworks and management software required to deploy and manage a PKI solution are already built into Microsoft s operating system and Active Directory. As in other PKI solutions, the GoldKey deployment requires the existence of a root certificate authority (CA), and recommends that intermediate CAs also be deployed, allowing the root CA to remain offline, which is recommended in order to protect its private key. Once the CAs have been installed, the Smart Card User template should be duplicated and autoenrollment enabled for the new template. Enabling auto-enrollment requires a modification to the template and enabling a setting in group policy. Unlike all other Smart Card solutions, GoldKey is a fully integrated hardware solution for Microsoft Certificate Services. Deployment The deployment process consists of distributing a blank token to each user who will be required to perform multi-factor authentication. Once auto-enrollment has been enabled, users will be prompted GoldKey vs RSA Why it s Time to Make the Change 6

7 by Windows to obtain a certificate every time they log into their account until they have a valid certificate that can be used for authentication. Auto-enrollment can be enabled for all users or just users in a specific group. During the auto-enrollment process, the user will be prompted to insert their token and set a PIN. The heavy lifting involved in this process will be handled by the driver automatically installed by Windows for the GoldKey device. No central authentication appliance is required since GoldKey seamlessly integrates with the Microsoft Active Directory environment. When the process is finished, a key pair will have been generated directly on the token, and the certificate automatically signed by the Active Directory CA. This process takes place behind the scenes and does not require additional software on the user s machine. Long-Term Deployment Considerations The GoldKey solution uses a feature called auto-renewal to eliminate the labor and inconveniencies that arise from limited certificate lifetime. This process works very similarly to the auto-enrollment feature. When a user s certificate is getting ready to expire, they will be notified automatically by Windows that they need to enroll for a new certificate. The new certificate will be placed in an unused certificate slot, and the old certificate will remain in place. GoldKey tokens come with 24 available certificate slots. GoldKey tokens do not require batteries, and do not have a limited lifetime by contract or programming. Authentication When a user inserts their GoldKey token, the token is examined for valid certificates having the Smart Card Logon enhanced key usage, having a valid UPN, and having been signed by a trusted CA. If one is found, the user is prompted for their PIN. Once the user has entered their PIN, a message signed by the user s private key residing on the GoldKey will be sent to the Active Directory KDC (a component of the domain controller). The KDC then uses the certificate s UPN to find the user in Active Directory, and checks both the client s certificate and the validity of the signed message. If these steps are successful, the KDC responds with a signed message of its own indicating the user s login status, including an encrypted version of their Kerberos ticket-granting ticket (TGT) [7]. GoldKey vs RSA Why it s Time to Make the Change 7

8 Figure 2. Signing into Active Directory using a GoldKey Once the client s machine receives this message, the validity of the KDC s certificate and the signed message are validated. If everything checks out, the TGT is extracted from the KDC s response and used to obtain a service ticket to the local computer. This ticket is then used to log in to the client machine [8]. Security Considerations In order to have a secure PKI implementation, you must: Protect your users private keys. Avoid the use of broken hashing algorithms, such as SHA-1 and MD5. Use sufficient key sizes for RSA certificates (at least 2048), or use ECC certificates instead. Protect the root CA. This is usually accomplished by keeping it offline, unless you need to issue or revoke subordinate CA certificates. The physical device should also be kept in a locked facility under video surveillance. Protect your subordinate CAs by using strict physical access policies, proper firewall configuration, and regularly applying operating system security updates. Make sure that only authorized individuals are able to issue certificates. GoldKey tokens automatically protect a user s private keys due to the fact that keys are generated on the token itself and only the public key can ever be read from the token. This functionality has been verified as part of the FIPS validation of the token s components. GoldKey vs RSA Why it s Time to Make the Change 8

9 Key sizes and hashing algorithms are decided during CA creation and management, which is performed using Microsoft s configuration tools. The most difficult part of implementing a secure PKI solution is properly protecting the private keys for your root and subordinate CAs. However, this can be done well using the techniques described above and by incorporating HSM technology. Unlike alternative solutions available today, all of the components and processes described for GoldKey authentication to an Active Directory are already built into Microsoft s systems and security infrastructure. Known Attacks Various PKI implementations over the years have suffered from flaws that have led to improper certificate validation and consequently identity impersonation. Additionally, problems with the SHA-1 and MD5 hashing algorithms have allowed rouge CAs to be created [9] and duplicate certificates to be generated [10]. Use of more secure hashing algorithms is required in order to create a secure PKI deployment. Many other attacks have featured the theft of both corporate and individual certificates, underscoring how critical the secrecy of private keys is to the integrity of a PKI system. Solution Comparison Deployment, Administration, and Maintenance The GoldKey solution provides a much simpler deployment scenario than OTP tokens. From an administrative point of view, a token can go straight to the end user untouched by IT. All the provisioning, key generation, and privilege associations will be handled by Windows according to policies established in Active Directory. The major convenience advantages of the GoldKey smart card solution over SecurID are: No additional software is required for either Windows Servers (2008 and higher) or client machines (Vista and higher). For Kerberos support, a minimum of Windows Server 2008 R2 and Windows 7 are required if ECC certificates are in use. Provisioning client certificates is user-driven. A feature called auto-enrollment causes the user to be prompted by Windows to enroll for their login certificate. When a certificate is getting ready to expire, Windows automatically prompts the user in advance to enroll for an additional certificate so that no interruptions will occur, eliminating the need for certificate or token replacement scheduling. No management applications are necessary for provisioning or using tokens all these functions are handled natively by the device driver automatically installed by Windows. GoldKey vs RSA Why it s Time to Make the Change 9

10 No expensive or complicated hardware or virtual appliances are needed. Necessary components are already built-in to the Microsoft infrastructure, eliminating the primary and replica Authentication Managers, load balancers, and web tiers that are typical of an RSA deployment. GoldKey tokens do not require batteries or periodic replacement. They sport well over a decade of useful life. Security As already described, the GoldKey PKI approach to multi-factor authentication has some major security advantages over both traditional OTP solutions and some common PKI implementations. PKI-based implementation allows secure authentication to occur without the need for seed files, which are a major weak point in OTP implementations. Private keys are generated in hardware and protected by FIPS-validated components. They never traverse the network not for generation, archival, or use. Use of a private root CA and local subordinate CAs gives you control over network security parameters and the ability to provide better CA private key protection. When the user is supplied with a token, it is not associated with his account, has not been assigned a PIN, and has neither keys generated nor any access granted. This also eliminates any security risks associated with a provisioned token being stolen before it is received by the user. Gold Security The Next-Generation Solution Already Included In GoldKey Tokens With a side-by-side comparison of OTP and PKI technologies, it is easy to see some definite advantages to the PKI approach. Both PKI and OTP have been around long enough to be considered by some as the tried and true, but industry, with its typical hindsight, is starting to see that they've grown some gray hairs. PKI is an amazing technology, especially considering its age (it was invented in the early 1970s). It has held up amazingly well and still serves a good purpose. The problem with PKI is that it does not provide adequate protection against identity impersonation techniques such as man-in-the-middle attacks. The time has come for a next generation, integrated security solution. What is needed is the ability to seamlessly integrate with existing installations while providing the complex and varied technologies that are becoming necessary to withstand new security threats. Gold Security is emerging as the next generation security solution. It utilizes a hierarchical method of managing encryption keys in hardware providing an alternative approach to security based on symmetrical keys and a federated identity system. Every GoldKey Security token provides legacy support with a built-in Smart Card and a fully GoldKey vs RSA Why it s Time to Make the Change 10

11 functional Gold Security capability. Gold Security has emerged with a patented new solution that is filling the holes left by traditional security techniques. The challenge for symmetric key technology has always been key management and secure distribution, especially for remote users. Gold Security combines a hardware-based hierarchical key management system for AES encryption with challenge-response authentication to provide the most secure solution that exists today for both data encryption and identity verification. This new hierarchical approach to AES key management has three tiers GrandMasters, Masters, and User tokens. All user tokens are managed by Master tokens, and Masters by GrandMasters, providing an access management architecture intrinsic to the enterprise authority model. Privileges are delegated out using Security Groups translated to encryption keys generated and securely distributed by the Master and GrandMaster tokens. This technology is called the Hierarchical Security Protocol, or HSP. Using the HSP, enterprises can implement security architectures that have previously been impossible. These include securely sharing data that is encrypted at rest or securely authenticating with web services without resorting to PKI or accepting the existence of the token seed lists or key derivation techniques essential to OTP operation. Since GoldKey security tokens provide built-in Smart Cards and fully functional Gold Security based on HSP, organizations that have deployed certificate-based security for Active Directory are taking advantage of the added features provided by the HSP technology integrated into all GoldKey products. Following a GoldKey PKI deployment, an enterprise immediately has access to the following advanced security solutions: Secure Storage in the Cloud, with enterprise-level sharing coupled with hardware managed access and privilege management. This includes the ability to block tokens that have been lost or stolen, set read-only or read/write privileges, and grant the ability to change access rules. Encrypted storage hosted on existing servers on the local network by utilizing a Secure Portal. This provides all of the sharing and management features of the cloud storage solution with the added features of sharing encrypted volumes and hardware management. Locally-encrypt storage using Secure Drives. Two-factor authentication for supporting websites. PIN recovery and management using Master and GrandMaster tokens or the GoldKey Identity Management website. Two-factor authentication to Microsoft Windows, allowing access to the account to be locked down to an individual or a hardware security group. Encrypted attachments for communication. GoldKey vs RSA Why it s Time to Make the Change 11

12 Until now, a major disadvantage of encryption has been accidental data loss caused by the encryption key becoming inaccessible due to a forgotten PIN or password. In an enterprise, this problem is exasperated by the fact that data encrypted by an employee must be accessible to (and recoverable by) those above that employee in the chain of command. This serious risk in traditional encryption systems is mitigated by HSP because all encrypted data, whether stored locally or in the cloud, is accessible using the registered Master or GrandMaster token, as well as any security group assigned to that data. This recovery path has also been applied to twofactor authentication for Microsoft Windows. Conclusion Many organizations are realizing the increased benefit of the two-pronged and reinvented approach to modern defense security. GoldKey's certificate-based solution is an elegant way to increase your security and ease deployment and administration while at the same time preparing yourself for the next generation of security technology. WideBand Corporation is the only token vendor that offers a complete turn-key solution that is distinguished not only for its level of security, but also for its convenience due to its complete integration with existing standards and infrastructure. A GoldKey deployment offers a smooth transition to the most robust security solution existing today. About WideBand Corporation WideBand Corporation is located in Independence, Missouri. It has been a pioneer in the development of high-tech networking and security products since WideBand is the developer and manufacturer of GoldKey Security Tokens. Deployed by customers in over 40 countries, GoldKey tokens offer shared access to secure storage in the cloud, state-of-the-art data encryption, PIV smart card capabilities, and two-factor authentication to online resources. The company also provides secure cloud storage solutions with their one-million-square-foot, underground data center. The company s Custom Solutions & Deployment Team provides hands-on support to customers with special security needs. GoldKey vs RSA Why it s Time to Make the Change 12

13 References [1] Cryptanalysis of the Alleged (Functionally-Equivalent) SecurID Hash Function [ [2] The RSA Authentication Manager Administrator s Guide [3] Information for this reference may be found in US patent 5,168,520. [4] Security Tokens Take Hit - Wall Street Journal [ [5] RSA s Anatomy of an Attack [ [6] SecurID Company Suffers a Breach of Data Security New York Times [ [7] Smart Card Logon flow in Windows Vista and Windows 7 [ [8] How the Kerberos v5 Authentication Protocol Works [ [9] Chosen-prefix collisions for MD5 applications [ [10] On the possibility of constructing meaningful hash collisions for public keys [ Trademarks EMC, RSA, and SecurID are registered trademarks of EMC Corporation. GoldKey, Gold, and WideBand, are registered trademarks of WideBand Corporation. Lockheed, Lockheed Martin, and Lockheed Martin Corporation are registered trademarks of Lockheed Martin Corporation. Active Directory, Microsoft, Windows, and Windows Server are registered trademarks of Microsoft Corporation. Windows Vista is a trademark of Microsoft Corporation. Copyright 2014 WideBand Corporation All rights reserved. GoldKey vs RSA Why it s Time to Make the Change 13

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With

More information

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Enhancing Organizational Security Through the Use of Virtual Smart Cards Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Entrust Managed Services PKI

Entrust Managed Services PKI Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

YubiKey PIV Deployment Guide

YubiKey PIV Deployment Guide YubiKey PIV Deployment Guide Best Practices and Basic Setup YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n YubiKey PIV Deployment Guide 2016 Yubico. All rights reserved. Page 1 of 27 Copyright 2016

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

RSA Authentication Manager 8.1 Help Desk Administrator s Guide

RSA Authentication Manager 8.1 Help Desk Administrator s Guide RSA Authentication Manager 8.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

A brief on Two-Factor Authentication

A brief on Two-Factor Authentication Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The

More information

SECO Whitepaper. SuisseID Smart Card Logon Configuration Guide. Prepared for SECO. Publish Date 19.05.2010 Version V1.0

SECO Whitepaper. SuisseID Smart Card Logon Configuration Guide. Prepared for SECO. Publish Date 19.05.2010 Version V1.0 SECO Whitepaper SuisseID Smart Card Logon Configuration Guide Prepared for SECO Publish Date 19.05.2010 Version V1.0 Prepared by Martin Sieber (Microsoft) Contributors Kunal Kodkani (Microsoft) Template

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide

RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide Introduction The RSA SecurID Certified Administrator (CA) examination is based on the critical

More information

Deploying EFS: Part 1

Deploying EFS: Part 1 Security Watch Deploying EFS: Part 1 John Morello By now, everyone has heard reports about personal or sensitive data being lost because of laptop theft or misplacement. Laptops go missing on a regular

More information

Netop Remote Control Security Server

Netop Remote Control Security Server A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days

More information

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1 RSA Authentication Manager 8.1 Help Desk Administrator s Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

CA SiteMinder SSO Agents for ERP Systems

CA SiteMinder SSO Agents for ERP Systems PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

RSA Authentication Manager 8.1 Planning Guide. Revision 1

RSA Authentication Manager 8.1 Planning Guide. Revision 1 RSA Authentication Manager 8.1 Planning Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

RSA Authentication Manager 7.0 Planning Guide

RSA Authentication Manager 7.0 Planning Guide RSA Authentication Manager 7.0 Planning Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers. RSA Security Inc. www.rsa.com Trademarks RSA and

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale

More information

Multifactor authentication systems Jiří Sobotka, Radek Doležel

Multifactor authentication systems Jiří Sobotka, Radek Doležel Multifactor authentication systems Jiří Sobotka, Radek Doležel Fakulta elektrotechniky a komunikačních technologií VUT v Brně Email: sobotkaj@feec.vutbr.cz Fakulta elektrotechniky a komunikačních technologií

More information

Deploying Smart Cards in Your Enterprise

Deploying Smart Cards in Your Enterprise www.css-security.com 425.216.0720 WHITE PAPER The merging of physical access technology with public key-enabled smart card technology has been an emerging trend that has occurred in the security industry

More information

RSA Authentication Manager 8.1 Administrator s Guide

RSA Authentication Manager 8.1 Administrator s Guide RSA Authentication Manager 8.1 Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

MIGRATION GUIDE. Authentication Server

MIGRATION GUIDE. Authentication Server MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2 BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

More information

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels

More information

Strong Authentication for Secure VPN Access

Strong Authentication for Secure VPN Access Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations

More information

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this

More information

Managed Portable Security Devices

Managed Portable Security Devices Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of

More information

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,

More information

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Authentication Types. Password-based Authentication. Off-Line Password Guessing Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007 Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes

More information

Yubico PIV Management Tools

Yubico PIV Management Tools Yubico PIV Management Tools Active Directory Smart Card Logon using the YubiKey NEO or NEO-n Document Version 1.0 April 15, 2015 Yubico PIV Management Tools 2015 Yubico. All rights reserved. Page 1 of

More information

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Implementing Federal Personal Identity Verification for VMware View. By Bryan Salek, Federal Desktop Systems Engineer, VMware

Implementing Federal Personal Identity Verification for VMware View. By Bryan Salek, Federal Desktop Systems Engineer, VMware Implementing Federal Personal Identity Verification for VMware View By Bryan Salek, Federal Desktop Systems Engineer, VMware Technical WHITE PAPER Introduction This guide explains how to implement authentication

More information

Virtual Private Networks (VPN) Connectivity and Management Policy

Virtual Private Networks (VPN) Connectivity and Management Policy Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections

More information

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016 National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION

More information

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA SecurID Software Token 1.0 for Android Administrator s Guide RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Genetec Omnicast Client Applications

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Genetec Omnicast Client Applications RSA SecurID Two-Factor Authentication with Genetec Omnicast Client Applications A Detailed Review EMC Information Infrastructure Solutions Abstract This white paper provides the reader with an overall

More information

ADAPTIVE USER AUTHENTICATION

ADAPTIVE USER AUTHENTICATION ADAPTIVE USER AUTHENTICATION SMS PASSCODE is the leading technology in adaptive multi-factor authentication, improving enterprise security and productivity through an easy to use and intelligent solution

More information

Red Hat Enterprise ipa

Red Hat Enterprise ipa Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

White Paper: Managing Security on Mobile Phones

White Paper: Managing Security on Mobile Phones White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile

More information

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845

More information

RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware

RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware Contact Information Go to the RSA corporate website for regional Customer Support telephone

More information

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application

More information

Executive Summary P 1. ActivIdentity

Executive Summary P 1. ActivIdentity WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they

More information

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited DualShield for Implementation Guide (Version 5.2) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks DualShield Unified Authentication, MobileID,

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Implementing and Administering Security in a Microsoft Windows Server 2003 Network Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course 2823: Five days; Instructor-led Introduction This five-day instructor-led course addresses the MCSA and MCSE skills

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

Implementing Microsoft Security Networks Course No. MS2823 h 5 Days

Implementing Microsoft Security Networks Course No. MS2823 h 5 Days COURSE OVERVIEW This five-day instructor-led course addresses the MCSA and MCSE skills path for IT Pro security practitioners, specifically addressing the training needs of those preparing for the 70-299

More information

That Point of Sale is a PoS

That Point of Sale is a PoS SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach

More information

AD CS. http://technet.microsoft.com/en-us/library/cc731564.aspx

AD CS. http://technet.microsoft.com/en-us/library/cc731564.aspx AD CS AD CS http://technet.microsoft.com/en-us/library/cc731564.aspx Active Directory Certificate Services (AD CS) is an Identity and Access Control security technology that provides customizable services

More information

Cybersecurity and Secure Authentication with SAP Single Sign-On

Cybersecurity and Secure Authentication with SAP Single Sign-On Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle

More information

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW

WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their

More information

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 11: Active Directory Certificate Services Objectives Describe the components of a PKI system Deploy the Active Directory

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security Secure your business DIGIPASS BY VASCO The world s leading software company specializing in Internet Security Secure Your Business A secure and flexible work environment Today s workforce needs to use

More information

Abridged. for Security Domain Administrators. IT Services Iowa State University. Jan 2015

Abridged. for Security Domain Administrators. IT Services Iowa State University. Jan 2015 Abridged RSA Authentication Manager 8.1 Administrator s Guide for Security Domain Administrators IT Services Iowa State University Jan 2015 Contact Information Go to the RSA corporate website for regional

More information