Secure the Web: OpenSSO
|
|
|
- Marlene Francis
- 10 years ago
- Views:
Transcription
1 Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1
2 Agenda Need for identity-based security What is OpenSSO? OpenSSO features > SSO and Access Control > Federated Single Sign On > Web Services Security > Identity Services OpenSSO Community Summary & Resources 2
3 Need for Identity Based Security 3
4 Enterprise SSO Challenges Within an organization - We need Single Sign- On (SSO) within an organization > Every application wants me to log in! > I have too many passwords my monitor is covered in Post-its! > We're implementing Sarbanes-Oxley we need to control access to applications! Outside of an organization - We need Federated SSO across organizations > We need to access outsourced functions! > Our partners need to access our applications! 4
5 Enterprise Security Challenges Single Sign-On Centralized policy management Provisioning and profiling Identity auditing Access certification Standards-based solution Easy to deploy and manage 5
6 What is OpenSSO? 6
7 What is OpenSSO? OpenSSO ( is a Sun Microsystems-sponsored open source project providing core identity functionality such as > Single sign-on (SSO) and Access Control > Federated SSO > Web services security > Identity Web services The project was based on the code base of Sun Java System Access Manager 7.x Sun OpenSSO Enterprise 8.0, the currently shipping commercial product, is built from OpenSSO 7
8 Sun s Identity Management Suite Identity Manager Automated Provisioning Password Management Identity Synchronization Identity Auditing OpenSSO Enterprise Single Sign-on/Log-out Federation services Authorization policies Authentication modules OpenSSO Open Sourced Product codebase for Sun OpenSSO Enterprise Role Manager Role Engineering Role Maintenance Role Certification Identity Compliance Directory Server Directory services Virtual directory services Security/failover services Data distribution services OpenDS Open Sourced Next Generation Product codebase for Sun OpenDS SE 3+ Billion Identities Under Management 8
9 OpenSSO Features 9
10 OpenSSO Features SSO & Access Control > Improved user experience. > Enhanced security > Reduced customer support costs. > Ensures that access to protected resources is restricted to authorized users. Federated SSO > Federates Identity and entitlements across security domains spanning multiple partners using Federation Standards. Web Services Security > Secures SOAP message exchanges between WSC and WSP. Identity Services > Available easy-to-use OpenSSO service offerings as web services. 10
11 OpenSSO Feature #1: SSO & Access Control Sun Confidential
12 SSO & Access Control Intercepts access to a resource Authenticates the user and, if the user is successfully authenticated, issues a token Evaluates the policies associated with the requested resource If the user is authorized, allows access to the resource, providing identity data Repeats the process > Intercepts access to resource > Uses token to authorize access depending on policy > Provides identity data to resource > Logs everything that happens until session expires 12
13 How SSO Works (Within a Enterprise) Policy agents are Web User installed to protect web resources (web sites or web-based applications) Policy agents interact with OpenSSO policy server to handle authentication, single sign-on, and authorization requests Web or Web Agent Application Server Agent or Application Server OpenSSO Policy Server Directory 13
14 Initial Login Process 1) Page request, but no SSOToken 2) Agent intercepts the request, and redirects it to OpenSSO server for Authentication 3) OpenSSO server performs authentication and then sends back SSO-Token 4) Agent validates SSO-token and allows access 1 Web User 2 Web Server Agent 3 4 Agent Web Server OpenSSO Server Directory 14
15 Single Sign-On Accessing subsequent Web User sites or applications: 1) Page request (with SSOToken) 2) Agent validates token 1 Web Server Agent Agent 2 Web Server OpenSSO Policy Server Directory 15
16 Authentication (by the SSO Server) `` Standard-based, extensible authentication framework (JAAS based) Supports multiple pluggable Authentication mechanisms > LDAP/AD, RADIUS, Certificate, SafeWord, RSA SecureID, Unix, Windows NT, JDBC, MSISDN, WindowsDesktopSSO (Kerberos), Anonymous, Membership (self-enrollment), Radius, Safeword, HTTP Basic > Custom authentication mechanisms using the SPI Multi-factor Authentication (Chained Authentication Mechanisms) Multi-Level and Multi-Scheme Authentication Resource-based Authentication 16
17 Authorization (by the SSO Sever) Policy = Rules + Subjects + Conditions + Response Provider > Rules The resource to be protected (e.g. URL) > Subjects Who is allowed to access (User/Role/Group etc.) > Condition Extra Constraints (IP Address mask, authn level/scheme, time/day etc.) > Response Provider Additional Response data to be sent back to resource. 17
18 OpenSSO Feature #2: Federated Single Sign On Sun Confidential
19 Federated Single Sign On Federation is built-in to OpenSSO Enterprise. No additional software needed. Federation for cross-domain application integration. > software-infrastructure independent. Sites only agree on protocol version and binding type. Facilitates trusted relationships. > Creates tighter, more satisfying customer, partner and employee relationships. > Extended existing and new revenue opportunities. > Implement business models that generate efficiencies and productivity gains. 19
20 Federated SSO Concept Log in Web User Be recognized Identity Provider Service Provider 20
21 Federated SSO Example (1 of 2) 2 User is redirected to identity provider. User logs in. Identity Provider Service provider sends SAML authentication request to identity provider via HTTP redirect. Service Provider 3 User is authenticated. Web User 1 21
22 Federated SSO Example (2 of 2) 4 HTML page with a form containing a SAML Assertion and Javascript to post it to the service provider Identity Provider Web User 5 Form with SAML Assertion is posted to the service provider Service Provider 22
23 Federating identities Account Linking > Allows existing accounts at IdP and SP to be linked > Persistent opaque identifiers preserve privacy User linked accounts > Login at both IdP and SP to establish link Auto Federation > Matches some common unique attribute (e.g. address) and links accounts automatically without principal interaction. Bulk Federation > Exchange LDIF files or XML files. 23
24 Fedlets The Fedlet is a lightweight bundle of code and configuration designed to quickly federationenable a service provider Intended for small service providers with perhaps a single web application to enable Admin at identity provider can use the OpenSSO console to create a Fedlet zip file SAML 2.0 Metadata Fedlet library Example SP application 24
25 OpenSSO Feature #3: Web Services Security Sun Confidential
26 Requirements for Web Service Identity Identify the end user and web service participant Preserve identity > Across multiple 'hops' - end to end > Across domain boundaries - beyond company boundary > Across vendors' products - standards based Using existing standards and technologies Container plug-ins for runtime injection and validation of Identity Tokens > Glassfish, WebSphere, WebLogic; possibly Tomcat, JBOSS 26
27 Web Services Security Secure Token Services OpenSSO Enterprise OpenSSO Enterprise Validate, issue and translate standards-based tokens and proprietary tokens including Oracle Access Manager & CA Siteminder tokens 27
28 Security Token Service How does it work? 28
29 OpenSSO Feature #4: Identity Services Sun Confidential
30 Identity Services through OpenSSO 30
31 Identity Services Authentication, Authorization, Audit, and Provisioning (AAAP) exposed as Services Focused on enabling developers, simplifying security Reusable AAAP services as building blocks for Business Integration and Composite Applications Supported on developers IDEs of choice > NetBeans, Eclipse, Visual Studio 31
32 Why Identity Services? AAAP are core services in any identity- enabled application whether for security or personalization Injecting and consuming identity in applications must get easier > Runtime configuration for container as opposed to building into application Essential elements for building a Secure Service Oriented Architecture (SOA) 32
33 Why Identity Services? Developers: > Aren t focused on identity, not a core competency > Need Identity Services exposed as basic building blocks > Want to focus on business logic, not the identity implementation > Prefer writing secure applications over security code 33
34 Available Identity Services Authentication Verification of User Credentials authenticate (username, password, uri) => Token Attributes Collection of the profiles of authenticated users attributes(list attrnames, Token) => UserDetails Authorization Permission for authenticated users to access secured resources. authorize (Resource, Action, Token) => boolean Audit Log Ability to audit and record operations log (AppToken, Token, Logname, Message) 34
35 OpenSSO Community 35
36 OpenSSO Community In three years... > 950+ project members at opensso.org > ~20 external committers Production deployments > Audi UK 250,000 customer profiles > Telenet Foundation for fine-grained authorization > CPqD 3000 users, 75 apps, 4 months! 36
37 OpenSSO Enterprise Model Purchase an OpenSSO Enterprise perpetual license (formerly Access Manager), Sun Identity Management Suite subscription or Java Enterprise System subscription Receive Support and indemnification on OpenSSO commercial builds and Express builds. Customers choose whichever builds works best for them! 37
38 OpenSSO Enterprise Options OpenSSO Express Build > A community build that has undergone extensive automated testing and moderate manual testing by Sun Quality Assurance Engineering Team. > Delivered every 3 months OpenSSO Commercial Build > A community build that has undergone extensive manual and automated testing by Sun Quality Assurance Engineering Team. > Delivered every months 38
39 OpenSSO: Latest Innovation Presto-Change-O Install > Embedded Glassfish > JavaWebstart Installation > Pre-configured > One Click 39
40 Summary & Resources 40
41 OpenSSO Enterprise One solution to solve ALL of your SSO problems Web access management, Federation, and Secure Web services 41
42 Sun Identity: How We're Different? Simple Easiest identity Portfolio to deploy, configure and use in the market Highest Adoption Rate Open Only Supported Open Source Identity Suite in the world Implement all Identity Relevant Standards (SAML, XACML,..) Scalable Most Scalable Identity Platform Can manage billions of users, roles, partners Internal and External 42
43 More Information OpenSSO Wiki OpenSSO Project Sun Identity Management 43
44 Free Training Labs Five downloadable, self-paced labs > deploy two Apache Tomcat servers > SSL-enable them > install a software load balancer > install OpenSSO into the environment > configure for session failover Includes virtual image containing OpenSolaris, Glassfish, OpenSSO and OpenDS > Fast forward or rewind image using ZFS Go to OpenSSO.org and click on Training (left sidebar) 44
45 Thank You! Sang Shin javapassion.com Pat Patterson blogs.sun.com/superpat 45
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way
OpenAM Written and tested with OpenAM Snapshot 9 the Single Sign-On (SSO) tool for securing your web applications in a fast and easy way Indira Thangasamy [ PUBLISHING 1 open source 1 community experience
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
GlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications,
GlassFish Security Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures Masoud Kalali PUBLISHING
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO April 19, 2008 Pat Patterson Federation Architect [email protected] blogs.sun.com/superpat Agenda Web Access Management > The Problem > The Solution >
The Role of Federation in Identity Management
The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
PingFederate. SSO Integration Overview
PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
CA Adapter. Installation and Configuration Guide for Windows. r2.2.9
CA Adapter Installation and Configuration Guide for Windows r2.2.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
CA SiteMinder. Implementation Guide. r12.0 SP2
CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems [email protected]
Mobile Identity and Edge Security Forum Sentry Security Gateway Jason Macy CTO, Forum Systems [email protected] Evolution Evolution of Enterprise Identities Cloud Computing Iaas Infrastructure as a Service
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract
Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite Abstract This white paper outlines the deployment and configuration of a Single Sign-On solution for EMC Documentum
Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
IBM WebSphere Application Server Family
IBM IBM Family Providing the right application foundation to meet your business needs Highlights Build a strong foundation and reduce costs with the right application server for your business needs Increase
Software Requirement Specification Web Services Security
Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: [email protected] This document is subject to the following license:
G Cloud 6 CDG Service Definition for Forgerock Software Services
G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform
THE NEW DIGITAL EXPERIENCE
[email protected] SECURING THE NEW DIGITAL EXPERIENCE Dr Steffo Weber, Oracle BridgFilling the UX gap for mobile enterprise applications. May,-2014 Latest Entries Protecting IDPs from malformed SAML
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
NetworkingPS Federated Identity Solution Solutions Overview
NetworkingPS Federated Identity Solution Solutions Overview OVERVIEW As the global marketplace continues to expand, new and innovating ways of conducting business are becoming a necessity in order for
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen
ENTERPRISE SECURITY WITH KEYCLOAK From the Intranet to Mobile By Divya Mehra and Stian Thorgersen PROJECT TIMELINE AGENDA THE OLD WAY Securing monolithic web app relatively easy Username and password
PRODUCT BRIEF OpenAM. Delivering secure access for customers, applications, devices and things
PRODUCT BRIEF OpenAM Delivering secure access for customers, applications, devices and things Introduction Identity and access management is going through a new golden age. CEOs are pushing growth as their
OpenSSO Monitoring Euro User Groups Winter 2010
OpenSSO Monitoring Euro User Groups Winter 2010 Victor Ake Identity Architect ForgeRock.com Agenda What is new in OpenSSO Express 9 Monitoring OpenSSO Express 9 What is new in OpenSSO Expresss 9 Web container
UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS. Single Sign-On (SSO) Solution
UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS Single Sign-On (SSO) Solution For University Information Systems (UIS) May 9, 2013 2 University of Colorado
BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO)
BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO) An introduction Vincent Lasfargues Atrium Customer Engineering Contributors: John Stamps, Murali Balijepally, Karl Miller, Rahul Vedak, Volodymyr
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
An Oracle White Paper August 2010. Oracle OpenSSO Fedlet
An Oracle White Paper August 2010 Oracle OpenSSO Fedlet Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.
Oracle WebLogic Foundation of Oracle Fusion Middleware Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.com/in/lawrence143 History of WebLogic WebLogic Inc started in 1995 was a company
Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific
Q: Is the challenge required or can pass through authentication be used with regard to automatic login after you login to your corporate domain? A: You can configure the system to pass on the challenge
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
Access Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace
INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University
UNI TY UNIfied identity management Krzysztof Benedyczak ICM, Warsaw University Outline The idea Local database Groups, Entities, Identities and Attributes UNITY Authorization Local authentication Credentials
An Oracle White Paper July 2012. Oracle Identity Federation
An Oracle White Paper July 2012 Oracle Identity Federation Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSO using OpenSSO Enterprise and BiObex TM Ramesh Nagappan Sun Microsystems, Burlington, MA [email protected] http://www.coresecuritypatterns.com/blogs Setting
Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
Spring Security SAML module
Spring Security SAML module Author: Vladimir Schäfer E-mail: [email protected] Copyright 2009 The package contains the implementation of SAML v2.0 support for Spring Security framework. Following
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
Okta White paper Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-dint-053013 Table of Contents
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
2012 LABVANTAGE Solutions, Inc. All Rights Reserved.
LABVANTAGE Architecture 2012 LABVANTAGE Solutions, Inc. All Rights Reserved. DOCUMENT PURPOSE AND SCOPE This document provides an overview of the LABVANTAGE hardware and software architecture. It is written
Identity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin Release notes J System Solutions Version 3.6 JSS SSO Plugin v3.6 Release notes What's new... 3 Improved Integrated Windows Authentication... 3 BMC ITSM self service... 3 Improved BMC ITSM Incident
Entitlements Access Management for Software Developers
Entitlements Access Management for Software Developers Market Environment The use of fine grained entitlements and obligations control for access to sensitive information and services in software applications
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence
September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple
Shibboleth N-Tier Support. Chad La Joie [email protected]
Shibboleth N-Tier Support Chad La Joie [email protected] Agenda Use Case Terminology Shibboleth Solution Future Effort Resources 2 Use Case Current use case comes from University of Chicago University
Active Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK
Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science
000-575. IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>
000-575 IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: Demo Page 1.What is the default file name of the IBM Tivoli Directory Integrator log? A. tdi.log B. ibmdi.log C. ibmdisrv.log
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple how-to whitepapers will
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Single Sign On In A CORBA-Based
Single Sign On In A CORBA-Based Based Distributed System Igor Balabine IONA Security Architect Outline A standards-based framework approach to the Enterprise application security Security framework example:
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
PingFederate. IWA Integration Kit. User Guide. Version 3.0
PingFederate IWA Integration Kit Version 3.0 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate IWA Integration Kit User Guide Version 3.0 April, 2012 Ping Identity Corporation
Extend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
THE NEW DIGITAL EXPERIENCE
[email protected] [email protected] SECURING THE NEW DIGITAL EXPERIENCE Steffo Weber, Oracle & Max Liesegang, esentri BridgFilling the UX gap for mobile enterprise applications. May,-2014
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : C2150-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version : Demo 1.What is the default file name of the
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
McAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Connecting Users with Identity as a Service
Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service
Novell Access Manager
J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta Configuration Guide Product Release Document Revisions Published Date 1.0 1.0 May 2016 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San
