<Insert Picture Here> Single Sign-on a propagácia identít v heterogénnom prostredí
|
|
- Maximillian Jefferson
- 8 years ago
- Views:
Transcription
1
2 <Insert Picture Here> Single Sign-on a propagácia identít v heterogénnom prostredí Marian Kuna, Technology Sales Consultant
3 <Insert Picture Here> Single Sign-On Wikipédia Single sign-on (SSO) je jednou zo súčastí riadenia prístupu k viacerým súvisiacim, ale nezávislým softvérovým systémom. Vďaka tomuto komponentu sa používateľ prihlási raz a získa prístup ku všetkým systémom bez nutnosti prihlasovania do každého z nich. SSO je postavené na centralizovanom autentifikačnom serveri, ktorý aplikácie a systémy využívajú za účelom autentifikácie
4 Prínosy Single Sign-On Potrebujem sa znova prihlásiť do Windows Deti, bežte pomôcť ockovi stlačiť ctrl-alt-del
5 Prínosy Single Sign-On Používateľský komfort Nie je potrebné pamätať si množstvo rôzných mien/hesiel Rýchlejší prístup k aplikáciám bez nutnosti autentifikácie Bezpečnosť Heslá na papieri Silná autentifikácia Náklady Tech. podpora/reset hesiel Efektivita používateľov Zákony, normy, nariadenia Centralizovaný reporting
6 Typy single sign-on Password Synchronization <Insert Picture Here> Perimeter Single Sign-on Web Single Sign-on X.509 authentication Server-based SSO, Identity Propagation Standards, Weblogic Security Framework SAML Kerberos Enterprise Single Sign-on
7 Password Synchronization <Insert Picture Here>
8 Password Synchronization Identity Management
9 Perimeter Single Single Sign-on <Insert Picture Here>
10 Perimeter SSO Web Server (app Proxy) Gateway 8 2 Application Server Protected Resources 6 DMZ 9 Firewall Firewall Access Server Resource Protection User Validation Token Validation 5, 7 User & Policy Store
11 Oracle Access Manager
12 Supported Authentication Mechanisms Form based authentication Basic authentication X.509 authentication OAAM virtual pad based authentication Kerberos based authentication (windows native authentication)
13 X.509 Client Authentication Two-way SSL Client Hello Server The quick brown fox jumps over the lazy dog rkvegms private The quick brown fox jumps over the lazy dog public
14 X.509 Client Authentication WebLogic Server and Database Oracle Fusion Middleware Securing Oracle WebLogic Server > 12 Configuring SSL Oracle Database Advanced Security Administrator's Guide > 8 Configuring Secure Sockets Layer Authentication Requires Oracle Advanced Security option
15 <Insert Picture Here> Server based Single Sign-on SAML Kerberos Identity Propagation
16 End to End Security Web Server (app Proxy) Application Server Message Queue Mainframe Application Client DB DB Point to Point Interactions End-to-end security
17 Identity Propagation User authenticates at the perimeter with an id and password Identity is propagated in many forms throughout the compute path http Basic Auth Web tier SSO token Portal Application SOA Business Process End User Service Bus DB connection Business Service Data Service DB
18 Common Security Standards WS-Policy WS-SecurityPolicy WS-ReliableMessaging SOAP & SwA WS-Security SAML Token Profile UsernameToken Profile Kerberos Token Profile WS-Trust WS-SecureConversation WS-Federation X.509 Token Profile XML XML Encryption KEY: XML Signature A B Std. B is based on Std. A SAML XACML CARML AAPML Web Service standards XML-based standards IP-based standards SPML Algorithms & protocols Kerberos Java standards IP HTTP TLS & SSL X.500 HTTPS LDAP Included in WS-I Basic Security Profile Included in WS-I Reliable Secure Profile Symmetric Key Algorithms: AES-(128,192,256), DES, 3-DES Message Digests: MD5, SHA-(1,2,3) PKI: X.509; RSA key encryption; RSA, DSA signature algorithms; PKCS Java SE/EE Platform Security: JCA, JCE, JAAS, JSSE, JGSS, Java SASL
19 WebLogic Server Security Framework
20 WebLogic Server Authentication Validates user credentials against identity store Identity store LDAP directories: Embedded, OID, OVD, iplanet, Open LDAP, Novell, Active Directory RDBMS (SQL, read only SQL, Custom DBMS) Identity Assertion Maps identities to users Token types Username/Password Certificate CSI v2 SAML SPNEGO
21 <Insert Picture Here> Server based Single Sign-on SAML
22 Web Services SOAP messages SOAP message SOAP Header SOAP Body Portal Application SOA Business Process Service Bus Business Service Data Service DB connection DB
23 SAML token SOAP message SOAP Header <saml: Assertion>... <saml:subject> <saml:nameid...> CN=Marian Kuna, OU=Sales, O=Oracle Slovensko </saml:nameid> </saml:subject>... <Signature> SOAP Body
24 Oracle Identity Federation Identity provider (IDP) is a service that hosts and/or provides identity information to other services Service Provider is responsible for offering the services to the end users
25 Oracle Identity Federation Industry s most complete implementation of federation standards Standards: SAML 1.0 / 1.1 / 2.0 Liberty Alliance ID-FF 1.1 /1.2 WS-Federation Liberty Alliance certification for Liberty ID-FF and SAML 2.0.
26 Oracle OpenSSO Fedlet Oracle OpenSSO Fedlet is a lightweight SP-only implementation of SAML 2.0 SSO protocols Can be used to SSO enable: Internal apps Partner apps Oracle Identity Federation OpenSSO 3 rd party Identity Provider.NET Fedlet Java Fedlet
27 <Insert Picture Here> Server based Single Sign-on Kerberos
28 Kerberos Project Athena was initiated in years of research passed before Kerberos was officially complete widely used as default authentication methods in popular operating systems Windows Unix Mac OS X
29 Kerberos
30 Kerberos
31 Kerberos
32 Kerberos WebLogic Server and Kerberos Oracle Fusion Middleware Securing Oracle WebLogic Server > 6 Configuring Single Sign-On with Microsoft Clients Define a principal in Active Directory to represent the WebLogic Server. Any client must be set up to use Windows Integrated authentication, sending a Kerberos ticket when available. In the security realm of the WebLogic domain, configure a Negotiate Identity Assertion provider
33 Kerberos Oracle Database and Kerberos Oracle Database Advanced Security Administrator's Guide > 7 Configuring Kerberos Authentication Requires Oracle Advanced Security option
34 <Insert Picture Here> Server based Single Sign-on Identity Propagation
35 Identity Propagation Application Users Identity Management Aplikácia marian.kuna/pwd app/pwd Databáza marian.kuna/pwd
36 Identity Propagation Enterprise User Security Identity Management OID Aplikácia marian.kuna/pwd Databáza marian.kuna/pwd
37 Enterprise User Security Spôsoby Implementácie OID MSAD Používateľ Oracle databáza Používatelia Business Role DB user DB Role Používatelia Skupiny
38 Enterprise User Security Spôsoby Implementácie OVD MSAD Používateľ Oracle databáza Používatelia Business Role DB user DB Role
39 Enterprise Single Sign-on <Insert Picture Here>
40 Oracle esso Logon Manager Oracle esso Suite Management Console LDAP, Doména, Databáza Windows Web sídla Mainframes (OS390, AS400) meno/heslo Oracle esso Logon Manager Java Extranet & Portal Autentifikácia PC/Desktop Sign-On
41 Oracle esso Authentication Manager Oracle esso AM MS CAPI smart cards SAFLINK Entrust PKI LDAP Multi-Auth Interface & Graded Auth Policies Auth API Auth API Oracle esso SM Oracle esso KM User Auth
42 Oracle esso Password Reset Reset Windows Logon Oracle esso Password Reset Server Audit, Reporting Doména Admin Oracle esso Suite Management Console
43 Oracle esso Provisioning Gateway Provisioning Sources Oracle Identity Manager (OIM) Applications & Custom Programs Data file and Manual Entry Password Oracle esso Provisioning GW Connectors Server SPML Windows Web Sites PKI Directory, Domain, Database Mainframes (OS390, AS400) Biometrics Credentials Java Token/ Smart card User Auth Oracle esso Logon Manager User s Desktop Extranet & Portal Application Sign-On
44 Oracle esso Kiosk Manager Oracle esso KM Windows LDAP Logon Session Monitor Time out Application Shutdown Keystroke submit Closure request Sign-off Web Apps, Extranet, Portal User Auth Process terminate Session (Initiate, Suspend, Terminate) Java Mainframes (OS390, AS400) Audit, Reporting
45
Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008
Web Services Security: What s Required To Secure A Service-Oriented Architecture An Oracle White Paper January 2008 Web Services Security: What s Required To Secure A Service-Oriented Architecture. INTRODUCTION
More informationThis Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
More informationAgenda. How to configure
dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
More informationCore Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems
Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy jmacy@forumsys.com CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary
More informationSecurely Managing and Exposing Web Services & Applications
Securely Managing and Exposing Web Services & Applications Philip M Walston VP Product Management Layer 7 Technologies Layer 7 SecureSpan Products Suite of security and networking products to address the
More informationOracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
More informationFederated Identity and Trust Management
Redpaper Axel Buecker Paul Ashley Neil Readshaw Federated Identity and Trust Management Introduction The cost of managing the life cycle of user identities is very high. Most organizations have to manage
More information> Please fill your survey to be eligible for a prize draw. Only contact info is required for prize draw Survey portion is optional
Web Access Management May 2008 CA Canada Seminar > Please fill your survey to be eligible for a prize draw Only contact info is required for prize draw Survey portion is optional > How to Transform Tactical
More informationIBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
More information<Insert Picture Here> Oracle Web Services Manager (WSM)
Oracle Web Services Manager (WSM) Marc Chanliau Director, Product Management Outline Introduction Product Overview Typical Use-Case Scenarios Roadmap Q & A Introduction
More informationOracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
More informationOPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
More informationSAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.
Exam : P_ADM_SEC_70 Title : SAP Certified Technology Professional - Security with SAP NetWeaver 7.0 Version : Demo 1 / 5 1.Which of the following statements regarding SSO and SAP Logon Tickets are true?
More information<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008
Oracle Security Developer Tools (OSDT) August 2008 Items Introduction OSDT 10g Architecture Business Benefits Oracle Products Currently Using OSDT 10g OSDT 10g APIs Description OSDT
More informationWeb Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
More informationBiometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems Ramesh.Nagappan@sun.com 1 Setting Expectations What you can take away! Understand
More informationApigee Gateway Specifications
Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption
More informationWindows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation
Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication
More informationEnabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationSecuring Web Services From Encryption to a Web Service Security Infrastructure
Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager
More informationHow To Make A Multi-Party Communication Secure On A Microsoft Cloud (Minware) System (Plm) (For Free) (Power) (Web) (Netware) (Cloud) (Monetar) (Free) (
Nicolai M. Josuttis IT-communication.com Stand: 12/09 2009 by IT-communication.com 1 Independent consultant continuously learning since 1962 Nicolai M. Josuttis Systems Architect, Technical Manager finance,
More informationINUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationSAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationOracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
More informationThe Role of Identity Enabled Web Services in Cloud Computing
The Role of Identity Enabled Web Services in Cloud Computing April 20, 2009 Patrick Harding CTO Agenda Web Services and the Cloud Identity Enabled Web Services Some Use Cases and Case Studies Questions
More informationOracle Fusion Middleware
Oracle Fusion Middleware Integration Overview for Oracle Identity Management Suite 11g Release 1 (11.1.1) E15477-02 June 2011 Oracle Fusion Middleware Integration Overview for Oracle Identity Management
More informationAPI-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
More informationInteroperable Provisioning in a Distributed World
Interoperable Provisioning in a Distributed World Mark Diodati, Burton Group Ramesh Nagappan, Sun Microsystems Sampo Kellomaki, SymLabs 02/08/07 IAM 302 Contacts Mark Diodati (mdiodati@burtongroup.com)
More informationCitrix Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information. Citrix Presentation Server 4.
Citrix Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information Citrix Presentation Server 4.5 Copyright and Trademark Notice Information in this document is
More informationPUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
More informationCS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
More informationWeb Services Security with SOAP Security Proxies
Web Services Security with Security Proxies Gerald Brose, PhD Technical Product Manager Xtradyne Technologies AG OMG Web Services Workshop USA 22 April 2003, Philadelphia Web Services Security Risks! Exposure
More informationNIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
More informationMobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems jmacy@forumsys.com
Mobile Identity and Edge Security Forum Sentry Security Gateway Jason Macy CTO, Forum Systems jmacy@forumsys.com Evolution Evolution of Enterprise Identities Cloud Computing Iaas Infrastructure as a Service
More informationAccess Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
More informationAn Oracle White Paper July 2010. Oracle Identity Management 11g
An Oracle White Paper July 2010 Oracle Identity Management 11g Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be
More informationSingle Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
More informationBiometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP Ramesh.Nagappan@sun.com 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
More informationContents at a Glance. 1 Introduction 17. 2 Basic Principles of IT Security 23. 3 Authentication and Authorization in
at a Glance 1 Introduction 17 2 Basic Principles of IT Security 23 3 Authentication and Authorization in SAP NetWeaver Application Server Java 53 4 Single Sign-On 151 5 Identity Provisioning 289 6 Secure
More informationSecurity solutions Executive brief. Understand the varieties and business value of single sign-on.
Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies
More informationSession Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple how-to whitepapers will
More informationSecuring ArcGIS Server Services: First Steps
Federal GIS Conference February 9 10, 2015 Washington, DC Securing ArcGIS Server Services: First Steps Michael Sarhan Esri msarhan@esri.com Agenda Review Basic Security Workflow ArcGIS Server Roles and
More informationAn Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
More informationSecure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
More informationOracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August
More informationRedpaper. IBM Tivoli Security Solutions for Microsoft Software Environments. Front cover. ibm.com/redbooks
Front cover IBM Tivoli Security Solutions for Microsoft Software Environments Explaining common architecture and standards Deploying on Microsoft operating systems Securing Microsoft software environments
More informationSingle Sign On In A CORBA-Based
Single Sign On In A CORBA-Based Based Distributed System Igor Balabine IONA Security Architect Outline A standards-based framework approach to the Enterprise application security Security framework example:
More informationOracle Access Manager. An Oracle White Paper
Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
More informationSession ID: B410 A Secure Future Today with SAP NetWeaver
Session ID: B410 A Secure Future Today with SAP NetWeaver Sarah Maidstone, SAP AG The Trouble with Security How Can SAP NetWeaver Help? From Here to ESA: Securely Summary The Trouble with Security How
More informationCitrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
More informationUsing SAP Logon Tickets for Single Sign on to Microsoft based web applications
Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,
More informationOracle Fusion Applications Security Leveraging Oracle Identity Management
An Oracle White Paper September 2010 Oracle Fusion Applications Security Leveraging Oracle Identity Management Disclaimer The following is intended to outline our general product direction. It is intended
More informationIntegrating Apex into Federated Environment using SAML 2.0. Jon Tupman Portalsoft Solutions Ltd
Integrating Apex into Federated Environment using SAML 2.0 Jon Tupman Portalsoft Solutions Ltd Introduction Migration challenge Federated vs Single sign-on SAML process flow Integrating Apex and Weblogic
More informationSecuring SOA and Web Services with Oracle Enterprise Gateway
An Oracle White Paper April 2011 Securing SOA and Web Services with Oracle Enterprise Gateway Disclaimer The following is intended to outline our general product direction. It is intended for information
More informationCloud Security/Access Control and Identity Management. Patrick McLaughlin, Oracle Fellow SAOUG: 14 November, 2011
Cloud Security/Access Control and Identity Management Patrick McLaughlin, Oracle Fellow SAOUG: 14 November, 2011 Agenda Evolution of IT and IdM Requirements Building and Securing Clouds Oracle Public Cloud
More informationSecurity Assertion Markup Language (SAML)
CS 595G 02/14/06 Security Assertion Markup Language (SAML) Vika Felmetsger 1 SAML as OASIS Standard OASIS Open Standard SAML V2.0 was approved in March, 2005 Blending of two earlier efforts on portable
More informationSAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate
More informationUSER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
More informationWebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationSAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT
SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT Foreword by Prof. Wolfgang Lassmann... 15 Foreword by Dr. Sachar Paulus... 17 1 Introduction...
More informationKenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience
Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a
More informationMetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information
MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information Citrix MetaFrame Presentation Server 4.0 for Windows Information in this document is subject
More informationIdentity Management and Single Sign-On
Delivering Oracle Success Identity Management and Single Sign-On Al Lopez RMOUG Training Days February 2012 About DBAK Oracle Solution Provider and License Reseller Core Technology and EBS Applications
More informationSeptember 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence
September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple
More informationImproving performance for security enabled web services. - Dr. Colm Ó héigeartaigh
Improving performance for security enabled web services - Dr. Colm Ó héigeartaigh Agenda Introduction to Apache CXF WS-Security in CXF 3.0.0 Securing Attachments in CXF 3.0.0 RS-Security in CXF 3.0.0 Some
More informationCA SOA Security Manager
CA SOA Security Manager Implementation Guide r12.1 Second Edition This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational
More informationABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
More informationSzolgáltatásorientált rendszerintegráció. WS-* standards
Szolgáltatásorientált rendszerintegráció WS-* standards Outline Requirements WS-* standards XML digital signature XML encryption 2 Integration requirements 3 Integration within a company SAP.NET? JEE SQL
More informationREST and SOAP Services with Apache CXF
REST and SOAP Services with Apache CXF Andrei Shakirin, Talend ashakirin@talend.com ashakirin.blogspot.com/ Agenda Introduction in Apache CXF New CXF features Project using Apache CXF How CXF community
More informationCommunication ports used by Citrix Technologies. July 2011 Version 1.5
Communication ports used by Citrix Technologies July 2011 Version 1.5 Overview Introduction This document provides an overview of ports that are used by Citrix components and must be considered as part
More informationOBIEE 11g Security it s as easy as 1-2-3!
OBIEE 11g Security it s as easy as 1-2-3! Antony Heljula BI Architect @aheljula Peak Indicators Limited Agenda Aim of Presentation 10g Security Model 11g Security Model What is Supported Identity Providers
More informationSAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
More informationSecure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
More informationBuilding Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
More informationSAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
More informationWeb Interface with Active Directory Federation Services Support Administrator s Guide
Web Interface with Active Directory Federation Services Support Administrator s Guide Web Interface with Active Directory Federation Services (ADFS) Support Citrix Presentation Server 4.0 for Windows Copyright
More informationIBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
More informationALF SSO: Security Framework for Tool Integration. Brian Carroll, Eclipse ALF Project Lead bcarroll@serena.com
ALF SSO: Security Framework for Tool Integration Brian Carroll, Eclipse ALF Project Lead bcarroll@serena.com 2008 by Brian Carroll, Serena; made available under the EPL v1.0 March 2008 ALF: Is About Process
More informationExternal Authentication with WebCT. What We ll Discuss
External Authentication with WebCT WebCT, Inc http://www.webct.com/ What We ll Discuss Introductions Terminology Authentication in WebCT External Authentication Custom Authentication Authorization in WebCT
More informationFederated Identity and Single Sign-On using CA API Gateway
WHITE PAPER DECEMBER 2014 Federated Identity and Single Sign-On using Federation for websites, Web services, APIs and the Cloud K. Scott Morrison VP Engineering and Chief Architect 2 WHITE PAPER: FEDERATED
More informationCommunication Ports Used by Citrix Technologies. April 2011 Version 1.5
Communication Ports Used by Citrix Technologies April 2011 Version 1.5 Overview Introduction This document provides an overview of ports that are used by Citrix components and must be considered as part
More informationIBM WebSphere DataPower Integration Appliance XI52
IBM WebSphere DataPower Integration Appliance XI52 Save time, reduce cost, and improve security with this purpose-built appliance for application integration Highlights Save time, reduce cost and improve
More informationOracle Fusion Middleware 11g Release 1 IDM Suite
Oracle Fusion Middleware 11g Release 1 IDM Suite Rodger King Senior Principal Support Engineer The following is intended to outline our general product direction. It is intended for information purposes
More informationOpenSSO Monitoring Euro User Groups Winter 2010
OpenSSO Monitoring Euro User Groups Winter 2010 Victor Ake Identity Architect ForgeRock.com Agenda What is new in OpenSSO Express 9 Monitoring OpenSSO Express 9 What is new in OpenSSO Expresss 9 Web container
More informationApproaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationDenodo Data Virtualization Security Architecture & Protocols
Denodo Data Virtualization Security Architecture & Protocols XLS Security Architecture & Protocols We include hereinafter a description of the security support in the Denodo Platform. The following diagram
More informationSecure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements
More informationPerceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
More informationDistributed Identity Management Model for Digital Ecosystems
International Conference on Emerging Security Information, Systems and Technologies Distributed Identity Management Model for Digital Ecosystems Hristo Koshutanski Computer Science Department University
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationINTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
More informationSAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features
SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features Dirk Olderdissen Solution Expert, Regional Presales EMEA SAP Brought to you by the Customer Experience Group 2014 SAP
More informationWeb Services. Web Service Security. Copyright 2010 Davide Cerri & Srdjan Komazec
Web Services Web Service Security Copyright 2010 Davide Cerri & Srdjan Komazec 1 Where Are We? # Title 1 Distributed Information Systems 2 Middleware 3 Web Technologies 4 Web Services 5 Basic Web Service
More informationHow To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
More information