SERVICE DESCRIPTION Web Authentication
|
|
- Mae Newman
- 8 years ago
- Views:
Transcription
1 SERVICE DESCRIPTION Web Authentication Date: Document: Service : Web Authentication
2 TABLE OF CONTENTS Page 1 INTRODUCTION 3 2 SERVICE DESCRIPTION Basic service Options Captive Portal Federation Single Sign-On Strong Authentication Test Instance SMS Flat 11 3 ADDITIONAL DOCUMENTS 12 4 DISCLAIMER 12 Copyright United Security Providers AG page 2/12
3 1 INTRODUCTION This document describes the Web Authentication managed service with all the options available from USP. This document. together with the agreed Service Level Agreement, constitutes the binding basis for the provision of the managed service. Field of application The Web Authentication service offers flexible technologies and concepts for the authentication of users. The service allows complete single sign-on solutions for different applications, taking account of the need for transaction protection and a seamless integration into your IAM processes. The Web Authentication service offers your users a uniform interface for all web applications. Centralized holding of user data makes the work of your IT department easier, saving valuable time and resources. Should the data structure change, the modifications need only be made at one place for all your applications. This considerably reduces the risk of errors and, in addition, changes can be implemented much more quickly. Copyright United Security Providers AG page 3/12
4 2 SERVICE DESCRIPTION 2.1 Basic service USP's Web Authentication service offers a uniform and easy-to-use interface the authentication of your users. Name of service Service abbreviation Web Authentication MSS-WA Service version 2.0 Status Operating hours Operational OH1: Monday Friday, 08:00 18:00 CET OH2: Monday Saturday, 07:00 21:00 CET OH3: Monday Sunday, 0:00 23:59 CET Availability guarantee ACA: Best effort ACB: 99.5% availability during operating hours ACC: 99.7% availability during operating hours ACD: 99.9% availability during operating hours The service is assessed on the basis of the number of concurrent users. The Web Authentication service provides a standardized interface between upstream services, such as the Web Application Firewall service, and the user database. The service consolidates different authentication systems and makes these further services available in a single interface. Modern applications, particularly web-based applications, take their user data from a wide range of sources. Different interfaces lead to very high degrees of complexity in all applications. Thanks to the Web Authentication service, all your web applications access user data on a common interface. If changes are made to the data structure, only the Web Authentication service has to implement these changes. Development costs are saved while the risk is minimized because your applications do not have to be modified. Compliance with the SLA parameters is measured against the availability of the service infrastructure. The following service-specific values are collated in the monthly reports: - infrastructure workload - number of valid/invalid logins - number of sessions The following measuring points are some of those watched to monitor the service: - CPU / RAM / HDD workload Copyright United Security Providers AG page 4/12
5 - listener processes - connection to the backend - accessibility An availability guarantee in excess of "best effort", requires redundant design of the service infrastructure. Copyright United Security Providers AG page 5/12
6 2.2 Options Captive Portal A self-registration portal is provided for your guest users. Name of the service option Abbreviation Captive Portal MSS-WA The service option is measured on the basis of the size of the basic service. This option makes a Captive Portal available to your guest users for self registration. When a user connects to the network, the request is first redirected to a web portal in which he must enter his user information including his mobile number. The correctness of his input is verified by means of a SMS challenge code. Once he passes the verification, the guest can use the network resources. Where users are offered a public WLAN, the provider must make identification of the users possible according to the provisions of the Swiss Federal law on Surveillance of Post and Telecommunications Traffic (BÜPF). The identification required is made possible by this options, so that you can meet your legal obligations in this regard in full. Your guests are registered automatically without further intervention by your staff. This means that you can even make access to network resources, for example Internet access, available to a large number of users without further effort. Compliance with the SLA is determined using the KPIs for the basic service. The number of users is added to the reported data. User activity information is provided following a corresponding request to the USP Security Operations Center. Accessibility of the web interface is checked. The Captive Portal must ether provide the network addresses to users itself, or forward these to the guests. Costs generated by sending text messages are not included in the monthly costs of the service. Copyright United Security Providers AG page 6/12
7 2.2.2 Federation This option provides support for SAML. Name of the service option Abbreviation Federation MSS-WA-FED The service option is measured on the basis of the size of the basic service. Modern IT environments are increasingly active across businesses. The Federation option makes the relevant user data available across companies for authorisation so that customers, partners and also staff can use their own, existing identities. Federation offers full SAML (Security Assertion Markup Language) support, both as an Identity Provider and as a Service Provider. This option gives you a user-friendly capability of mapping trustworthy and cross-company IT environments. You can, for example, give your staff access to Office 365 or to applications hosted by partners, without additional user accounts having to be created and administered. In Federation, you have control over what information is forwarded to service providers. You gain considerably in security as the user data stays where it belongs. Compliance with the SLA is determined using the KPIs for the basic service. This option is not listed separately in the reports. This option is not monitored separately. The conditions of use for the basic service apply. Copyright United Security Providers AG page 7/12
8 2.2.3 Single Sign-On Users access various different applications but need only log in once to do this. Name of the service option Abbreviation Single Sign-On MSS-WA-SSO The service option is measured on the basis of the size of the basic service. Different web applications have different authentication methods and the user needs to enter different user data. With the Single Sign-On option, the login process is standardized for all applications: the users enter their user name and the associated password (and, if need be, a further factor, see section 2.2.4) to start. The Single Sign-On option forwards this information to the applications so that the users are automatically logged in to them. Where users have to remember a number of passwords they tend to use simple passwords, or even to write the passwords down. With the Single Sign-On option your users need learn only one password. In this way, you achieve greater user-friendliness which is reflected in your users' satisfaction and in greater security, as the simplest passwords and writing down of passwords are avoided. The service option is measured on the basis of the size of the basic service. This option is not listed separately in the reports. This option is not monitored separately. The conditions of use for the basic service apply. Copyright United Security Providers AG page 8/12
9 2.2.4 Strong Authentication A second factor is introduced alongside a password for user authentication. Name of the service option Abbreviation Strong Authentication MSS-WA-SA The service option is measured on the basis of the size of the basic service. This option introduces a second factor for user authentication. In addition to entering the password (something that he knows), the user has to enter a second attribute (something that he has or is) to confirm his identity. Various different adapters for linking different attributes are available for this. For example, interfaces are offered to SuisseID, to Mobile ID, to a variety of hard tokens, to text messaging and much more. Introducing a second factor for the authentication of your users considerably enhances your security. A potential attacker does not need to know just his victim's user name and password, but also has to possess a further factor, or purport to be something. Compliance with the SLA is determined using the KPIs for the basic service. This option is not generally listed separately in the reports. Individual factors can be listed separately if required, the status of certificates or the number of text messages sent, for example. This option is not generally monitored separately. Individual factors can, however, require special measuring points; the availability of the text messaging gateway is checked, for instance. Any costs for the two-factor authentication infrastructure are not included in the monthly service fees and must be covered separately by the customer. The customer is responsible for the rollout of infrastructure components for two-factor authentication, for example hard tokens or certificates. Copyright United Security Providers AG page 9/12
10 2.2.5 Test Instance Operation of an additional instance which is not used in production. Name of the service option Abbreviation Non-Prod Licence MSS-WA-TEST The service option is assessed on the basis of the number of instances. This option operates another instance of the Web Authentication infrastructure. The additional instance is not used operationally and can thus be used as a test or development environment for example. The additional instance will be equipped with the same options as the operational instances. Changes can be tested before implementation in an environment similar to the production environment by the use of a non-operational instance. The risk of an error in a subsequent live implementation of amendments on the production environment is considerably reduced by the option of first testing modifications on a non-operational environment. Test instances are operated on a best-effort level during office hours, whatever the SLA for the basic service. This option has no particular KPIs. No reports are prepared for test instances. The availability of the instance will be monitored. MSS-WA-TEST is not offered until at least two operational instances have been procured. Copyright United Security Providers AG page 10/12
11 2.2.6 SMS Flat The SMS messages required for the SMS token are made available through this option. Name of the service option Abbreviation SMS Flat MSS-WA-SMS The service option is included on the basis of the number SMS messages included. The following numbers are possible: SMS SMS SMS SMS A predefined number of SMS messages is procured in advance through this option. The procurement of the SMS messages is not restricted in time. This option makes the costs for sending the SMS messages required easy to calculate. This option has no influence on the compliance with the SLA. The number of text messages sent are reported in monthly reporting. No additional measuring points are introduced for this option. No additional conditions of use. Copyright United Security Providers AG page 11/12
12 3 ADDITIONAL DOCUMENTS The present document describes the functional scope of USP's Web Authentication service. General information on the Service Level Agreement and on operation may be found in the additional documents. Service management and SL catalogue Services catalogue Price list This document contains all the information relating to the Service Level Agreement parameters. It defines the support processes and collaboration obligations, for instance, along with operating hours and availability guarantees. The services catalogue defines the operation tasks and the standard changes. The document also describes the processes by which the corresponding changes can be triggered in a qualified fashion. The prices of all services and options are laid down in the price list. 4 DISCLAIMER This document is the intellectual property of USP AG and may not be copied, reproduced, handed on or used for execution without its permission. Unauthorized use is punishable in accordance with section 23 in conjunction with section 5 of the Swiss Federal Act against Unfair Competition. This work is protected under copyright. The rights consequently justified, particularly of translation, reproduction, the use of illustrations, distribution by photomechanical or other means and storage in data processing systems, even in extract, remain reserved. The functions, data and illustrations described in this documentation are applicable with the reservation that amendment is possible at any time. They are provided for better understanding of the material, without claiming completeness and correctness in detail. The programs described in this document are only provided on the basis of a valid licence agreement with USP AG and can only be used in compliance with the conditions laid down in the licence agreement. USP's General Terms and Conditions shall apply unless higher-ranking provisions apply. Copyright United Security Providers AG. All rights reserved. Copyright United Security Providers AG page 12/12
SERVICE DESCRIPTION Web Application Firewall
SERVICE DESCRIPTION Web Application Firewall Date: 14.12.2015 Document: Service description: Web Application Firewall TABLE OF CONTENTS Page 1 INTRODUCTION 3 2 SERVICE DESCRIPTION 4 2.1 Basic service 4
More informationSERVICE DESCRIPTION Firewall
SERVICE DESCRIPTION Firewall Date: 14.12.2015 Document: Service description: Firewall TABLE OF CONTENTS Page 1 INTRODUCTION 3 2 SERVICE DESCRIPTION 4 2.1 Basic service 4 2.2 Options 6 2.2.1 DHCP service
More informationSERVICE DESCRIPTION Web Proxy
SERVICE DESCRIPTION Web Proxy Date: 14.12.2015 Document: Service description: Web Proxy TABLE OF CONTENTS Page 1 INTRODUCTION 3 2 SERVICE DESCRIPTION 4 2.1 Basic service 4 2.2 Options 6 2.2.1 Web Filter
More informationSERVICE DESCRIPTION Wide Area Network
SERVICE DESCRIPTION Wide Area Network Date: 14.12.2015 Document: Service description: Wide Area Network TABLE OF CONTENTS Page 1 INTRODUCTION 3 2 SERVICE DESCRIPTION 4 2.1 Basic service 4 2.2 Options 6
More informationHP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
More informationIntroduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
More informationDualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
More informationStop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd
Stop Identity Theft with Transparent Two-Factor Authentication e-lock Corporation Sdn Bhd December 2009 Table Of Content Table Of Content... 2 Executive Summary... 3 1. Introduction... 4 1.1 The Issue
More informationBlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
More informationCybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
More informationIT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
More informationAuthentication. Authentication in FortiOS. Single Sign-On (SSO)
Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication
More informationConfiguring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications
More informationSAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
More informationTECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationFederation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority
Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority copyright of British Telecommunications plc 2006 Abstract As a large organisation with many partners BT has been
More informationTHE THEME AREA. This situation entails:
IDENTITY AND ACCESS MANAGEMENT: DEFINING A PROCEDURE AND ORGANIZATION MODEL WHICH, SUPPORTED BY THE INFRASTRUCTURE, IS ABLE TO CREATE, MANAGE AND USE DIGITAL IDENTITIES ACCORDING TO BUSINESS POLICIES AND
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationTRIPwire HSIN Federation:
TRIPwire HSIN Federation: Reference Guide TRIPwire, in coordination with the Homeland Security Information Network (HSIN), is pleased to announce a federated partnership and the introduction of a single
More informationProposal Document TitleDocument Version 1.0 TitleDocument
G-Cloud - Strong Authentication Service - Service Definition Proposal Document Author TitleDocument Version 1.0 TitleDocument Document publication date - 02/12/2014 Title Document Classification - Public
More informationRealMe. Technology Solution Overview. Version 1.0 Final September 2012. Authors: Mick Clarke & Steffen Sorensen
RealMe Technology Solution Overview Version 1.0 Final September 2012 Authors: Mick Clarke & Steffen Sorensen 1 What is RealMe? RealMe is a product that offers identity services for people to use and manage
More informationCopyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
More informationSecurity and Data Protection for Online Document Management Software
Security and Data Protection for Online Document Management Software Overview As organizations transition documents and company information to Software as a Service (SaaS) applications that are no longer
More informationexpanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
More informationWhite Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
More informationIDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationInstruction Guide. People First Dependent Certification Process
People First Dependent Certification Process Each time an employee logs into People First to make an enrollment selection during open enrollment or because of a qualified status change (QSC), he/she must
More informationSECUREAUTH IDP AND OFFICE 365
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
More informationTECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
More informationCLOUD SERVICE SCHEDULE
CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless
More informationHP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
More informationWhite Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
More informationsolution brief ID Manager Leverage the Cloud to Simplify and Automate Enterprise Guest Management
solution brief ID Manager Leverage the Cloud to Simplify and Automate Enterprise Guest Management Several trends have recently emerged to ignite the requirement for enterprise guest management. One is
More informationELM Manages Identities of 4 Million Government Program Users with. Identity Server
ELM Manages Identities of 4 Million Government Program Users with Identity Server ELM Implements Single Sign-on With WSO2 Identity Server to Streamline Administration, Improve Productivity, and Reduce
More informationTIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
More informationProcessing credit card payments over the internet. The business of getting paid.
Processing credit card payments over the internet. The business of getting paid. X Tap into the vast potential of the Internet today with WIPS Plus. The internet is a huge opportunity for businesses large
More informationAllidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
More informationApplication Security Made in Switzerland
Application Security Made in Switzerland Overview The problem of internet security is almost as old as the internet itself. But there is a reliable solution: Airlock Suite from Ergon. Airlock Suite is
More informationiii. You will not be able to access their iocbc account without a valid OTP token from 1 Nov 2012 onward.
Login using One-Time Password (OTP) i. You can continue to login without the OTP from now till 31 October 2012 so long as you have not activated your token via the iocbc Online platform. ii. Once you have
More informationSecuring access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationDIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
More informationsolution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
More informationMulti-Factor Authentication Reference Guide
Multi-Factor Authentication Reference Guide March 2011 Support: (800) 350-3557 www.pacificwesternbank.com Table of Contents Multi-Factor Authentication (MFA) Required for All Customers...page 2 Challenge
More informationMulti-Factor Network Authentication
Multi-Factor Network Authentication Setup Guide Multi-Factor Network Authentication (also called GhostPorts) is a powerful security feature available with the Halo Workload Firewall Management security
More informationUser Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3
User Authentication FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook User Authentication v3 16 December 2011 01-433-122870-20111216 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and
More informationPortal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationSingle Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
More informationCentrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
More informationOnline (Internet) Banking Agreement and Disclosure
Online (Internet) Banking Agreement and Disclosure This Online (Internet) Banking Agreement and Disclosure ( the Agreement") explains the terms and conditions governing the basic Online Banking services
More informationUAG Series. Application Note. Unified Access Gateway. Version 4.00 Edition 1, 04/2014. Copyright 2014 ZyXEL Communications Corporation
UAG Series Unified Access Gateway Version 4.00 Edition 1, 04/2014 Application Note Copyright 2014 ZyXEL Communications Corporation Table of Contents Scenario 1 How to Activate a Paid Access Hotspot...
More informationCloud Computing. Chapter 5 Identity as a Service (IDaaS)
Cloud Computing Chapter 5 Identity as a Service (IDaaS) Learning Objectives Describe challenges related to ID management. Describe and discuss single sign-on (SSO) capabilities. List the advantages of
More informationAurora Hosted Services Hosted AD, Identity Management & ADFS
22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to
More informationCustomers interested in these services are advised to contact the Bank for further details or visit our website at www.sainthelenabank.
Online Banking Terms & Conditions These terms and conditions apply to all registered customers ( Registered Customers / you / your ) using Bank of St Helena Ltd ( the Bank / we / our ) banking services
More informationGenius SIS. Document number: 2009102001 Version: 3.0 Release Genius Date: 08/11/2011 SIS Overview
Genius SIS Overview Document number: 2009102001 Version: 3.0 Release Genius Date: 08/11/2011 SIS Overview DISCLAIMER This Overview document, as well as the software described in it, is furnished under
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More informationConfiguring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
More informationmanaging SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
More informationBlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
More informationOVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
More informationDocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
More informationPartner Portal User Procedures
Partner Portal User Procedures The help topics below are included in this document: Overview Self-Registration (First Time Users) Enrolling in an Application Accessing an Application (Once Enrolled) Signing
More informationIncrease the Security of Your Box Account With Single Sign-On
A Box White Paper Increase the Security of Your Box Account With Single Sign-On Box s high level of security, 24x7 support and 99.9% uptime are critical for us. The biggest benefits are the reliability
More informationSamsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
More informationSymantec VIP Integration with ISE
Symantec VIP Integration with ISE Table of Contents Overview... 3 Symantec VIP... 3 Cisco Identity Services Engine (ISE)... 3 Cisco Centralized Web Authentication... 4 VIP in Action... 4 ISE Configuration...
More informationLenovo Partner Access - Overview
Table of Contents: Lenovo Partner Access Overview How to Access the Lenovo Partner Access Portal Registration Process and Account Activation First time login Accepting the T s & C s and Selecting Challenge
More informationBUSINESS ONLINE BANKING QUICK GUIDE For Company System Administrators
BUSINESS ONLINE BANKING QUICK GUIDE For Company System Administrators Introduction At Mercantil Commercebank, we are committed to safeguarding your identity online with the best technology available. This
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
More informationSafewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
More informationCloud Authentication. Getting Started Guide. Version 2.1.0.06
Cloud Authentication Getting Started Guide Version 2.1.0.06 ii Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
More informationSecure and simple authentication via mobile phone
Mobile ID Secure and simple authentication via mobile phone Mobile ID provides your employees and customers with a convenient and secure way to login to applications and online portals. It also makes it
More informationIdentity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
More informationConfiguring Single Sign-on from the VMware Identity Manager Service to ServiceNow
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents
More informationEnhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
More informationBusiness Gateway vendor test guide
Business Gateway vendor test guide Version 1.1 Information Systems Seaton Court 2 William Prance Road Plymouth Devon PL6 5WS www.landregistry.gov.uk Contents 1. Background 3 2. Purpose 3 3. Overview 3
More informationWhite paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
More information2-Factor Verification Remote Access
2-Factor Verification: Remote Access User Guide For technical assistance please call the IT Help desk @ 37300 1 How to Login to New Remote Access Portal! is implementing a new Remote Access Portal to enhance
More informationAn Analysis of Propalms TSE and Microsoft Remote Desktop Services
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
More informationBusiness Banking Customer Login Experience for Enhanced Login Security
Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification
More informationCentrify Mobile Authentication Services for Samsung KNOX
Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under
More informationSingle Sign On for ShareFile with NetScaler. Deployment Guide
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
More informationCopyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
More informationSEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
More informationDIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
More informationReduce IBM i Help Desk Costs with Self Service Password Reset
Reduce IBM i Help Desk Costs with Self Service Password Reset Increased productivity, repaired relationships, reduced security & audit risks, & lower IT costs Contents Executive Summary 2 Introduction
More informationLets get a federated identity. Intro to Federated Identity. Feide OpenIdP. Enter your email address. Do you have access to your email?
Lets get a feated identity Intro to Feated Identity EuroCAMP Training for APAN32 This work is licensed un a Creative Commons Attribution ShareAlike 3.0 Unported License. Do you have access to your email?
More informationInformation Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
More informationADVANCED TWO-FACTOR AUTHENTICATION VIA YOUR MOBILE PHONE
ADVANCED TWO-FACTOR AUTHENTICATION VIA YOUR MOBILE PHONE SMS PASSCODE is the technology leader in a new generation of two-factor authentication systems protecting against the modern Internet threats. The
More informationFortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide
FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide February 5, 2015 Revision 1 Copyright 2015 Fortinet, Inc. All rights reserved.
More informationCloud Portal Guest Invitations 4.0
Release Notes Cloud Portal Guest Invitations 4.0 January 2014 Cloud Portal Guest Invitations 4.0 Release Notes Copyright sentence ( 2014, CTERA Networks. All rights reserved) 1 Release Contents Copyright
More informationImprove Security, Lower Risk, and Increase Compliance Using Single Sign-On
SAP Brief SAP NetWeaver SAP NetWeaver Single Sign-On Objectives Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On Single sign-on in the SAP software architecture Single sign-on
More informationUPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2)
Additional Financing of Food and Nutrition Social Welfare Project (RRP MON 42322) UPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2) 1. This document
More informationUsing YSU Password Self-Service
Using YSU Password Self-Service Using YSU Password Self-Service Password Self-Service Web Interface Required Items: YSU (MyYSU) Directory account, Web browser This guide will assist you with using the
More informationTerms and Conditions of Use - Connectivity to MAGNET
I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information
More informationExtending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
More informationCloud-based Managed Services for SAP. Service Catalogue
Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...
More informationScalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
More informationAn Oracle White Paper August 2010. Oracle OpenSSO Fedlet
An Oracle White Paper August 2010 Oracle OpenSSO Fedlet Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationIBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
More information