Keywords integral IdM; impersonation; reputation services; trust; SSO

Size: px
Start display at page:

Download "Keywords integral IdM; impersonation; reputation services; trust; SSO"

Transcription

1 Volume 4, Issue 3, March 2014 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: User-Centric Single Sign on System for an Enterprise Network Anuja S * Samlinson E Dept. of CSE &Sona College of Technology India Abstract Cloud computing offers different levels of abstractions to its users. In this paper we provide an overview of cloud computing and its current status in enterprise adoption and a new architecture that offers integral identity management for the users within an organization to manage their identities and gain access from the Cloud Service Providers(CSP) based on the method of impersonation and also provides reputation services. We also present some implementation details. The proposed architecture offers certain advantages over the current offerings such as trust based services, audit services and reputation services that are incorporated and these help to determine which services are the most trustworthy. Keywords integral IdM; impersonation; reputation services; trust; SSO I. INTRODUCTION Cloud computing aims to deliver reliable, secure, fault-tolerant, sustainable and scalable infrastructure for hosting internet based application services. According to the NIST[1] Cloud Computing platform offers services in a pay-asyou-go model enabling on-demand network access to a shared pool of resources. The different services[2] offered by the cloud are Software or Application as a Service (SAAS), Platform as a Service (PAAS) and Infrastructure as a service (IAAS). SAAS delivers application services over the internet. PAAS delivers development environments and run time environments as services and IAAS delivers storage, network and computing infrastructure as services. The deployment models in the cloud are Public cloud, Private cloud and Hybrid cloud. Public cloud infrastructure is available to the general public, owned by org selling cloud. Private cloud and Hybrid cloud. Public cloud infrastructure is available to the general public owned by org selling cloud services. Private cloud infrastructure is for a single org only and may be managed by the org or a 3 rd party, on or off premise. Hybrid cloud is a combination of >= 2 clouds that bound by standard or proprietary technology. When an organization or a user submits their data to the websites and cloud service providers (CSP), they have to be ensured that the provider will act in accordance with its advertised policies and contract terms. This places burden on the CSP s to keep the data secure, and from any liability that the data could be lost, compromised or corrupted. Hence we come up with the concept of Identity and Access Management (IAM)[3] wherein a security discipline is followed that enables the right individuals to access the right things at the right time. The different components of IAM are Identity management, Credential management, Access management, Federation, Auditing and Reporting. Administrative IAM systems manage to login accounts, security entitlements, identity attributes and authentication factors that are assigned to the user. The services that are offered by IAM are: 1. Password Management: It s the ability of an IAM system to manage user passwords on one or more systems or applications. Functionally it includes password synchronization, self-service password reset or the management of other authentication factors. 2. User Provisioning: It s the ability of an IAM system to create, modify or delete login accounts for users on systems and applications. This includes auto-provisioning and deactivation of data from an authoritative system, delegated administration of users and entitlements by application owners etc. 3. Role Based Access Control (RBAC): It s a strategy for user provisioning where set of entitlements are collected into roles and roles are assigned to users. This reduces the need to assign individual entitlements to users, which is advantageous because individual entitlements are very technical and hard to manage. 4. Privileged Access Management: It s used to secure the access of users to accounts that have elevated security rights such as Administration on Windows, Root on UNIX, etc. This is typically done by periodically changing the password of these accounts to some random values, storing those password values in a secret vault, applying policy and workflow to control which user is allowed to connect to which account and injecting passwords from the vaults into the login sessions. The current cloud platforms support federated access, delegation of authority and fine grained access control that primarily uses a simple Access Control List (ACL) to provide access to the other users. These ACL based systems restricts to grant access only to the registered users. The fine grained role based access[4] was introduced in the IAAS by having a trusted domain that manages the users, roles and access permissions. But these users, roles and permissions are managed centrally do not provide federated access or allow roles and attributes to be assigned by external attribute authorities. Federated identity management, comprises a trusted Identity Provider (IdP), Service Provider (SP) and user 2014, IJARCSSE All Rights Reserved Page 315

2 agent. When the user wants to avail certain services from the SP, the user accesses the SP and the SP redirects the user to the IdP to identify his credentials and if these credentials are authenticated then the SP provides access to its services to the user. Delegation of authority allows a user to delegate any of his privileges to another user or application. If the credentials of the delegated user is authenticated by the SP and theidp then the delegated user is allowed to access the service from the SP. In the traditional application centric IdM model each application keeps trace of identities of the entities that use it. Whereas in an user centric [5] approach users have to authenticate themselves to the service providers (SP) in order to use their services. Here we use another mechanism called Single Sign on (SSO) [6] which is the ability for a user to enter the same id and password to logon to multiple applications within an enterprise. The benefits of SSO are Ability to enforce uniform enterprise authentication and/or authorization policies across the enterprise End to end user audit sessions to improve security reporting and auditing Removes application developers from having to understand and implement identity security in their applications Usually results in significant password help desk cost savings. For the simulation in the cloud the simulator used is Cloudsim by the University Of Melbourne, Australia. Cloudsim simulator is designed in JAVA and is an open-source simulator and works on both Windows and UNIX\Linux. Its first version Cloudsim 1.0 was released in 2009 and the next version Cloudsim 2.1 was released in 2010 with some additional features. The newest version Cloudsim was released in 2012 with all advanced features in it. This paper is organized as follows: Section 2 discusses some related works and in Section 3 we describe the proposed system architecture. II. RELATED WORK 1. Integral Federated Identity Management[7]: Integral federated identity management offers an ability to delegate access to the different users within the organization and provides federated access to cloud services and user s data. It includes the different levels of assurance (LoA), a measure of trustworthiness to make access decisions based on the authentication. Given the attributes of a user the authorization system should decide which resources should be accessed by the user. Given the resources the authorization system should decide which user based on the attribute can access the resources. The major advantages of this system are the possibility for applying security policies for individual users, maintain auditing records, ability to deploy applications on multiple IAAS providers without losing identity unity. Open standard technologies and components are used for the implementation. The disadvantages of this process are technology related challenge; implementing a full scale IdM requires use of various technologies. Mixed use of different technologies poses a risk of component failure. No approved or certified processes in place for authentication. 2. Identity-Centric Internet (IDAAS)[8]: Here every entity, user or a network requesting a service from a SP needs to have a digital identity; this environment is called IC-Agent (Identity in the cloud Agent). IC-Agent monitors and logs personal data and information of the user. IC-Agent disassociates storage of data, metadata, history and relationships that are a part of user s identity from service provisions. IC-Agent provides identity as a service that includes personal data, authentication and authorization as a service. The advantages of this system are privacy, innovation, interoperability, massive meaningful anonymous interactions and data and people are findable. The disadvantages of this method are the SP could cheat by recording personal data, IT infrastructure such as directory, application and IAM system is costly to deploy and manage. 3. User-Centric Federated SSO System[9]: Here the user-centric IdM is adopted into the federated SSO system. The approaches used here are credential based PRIME and relationship based universal user-centric system. The components used here are Attribute Issuer (AI)- issues attributes to the user, UFed Adapter- handles UFed protocols that cause major changes in the existing FSSO system, negotiator- for the communication between the entities. The two processes involved here are set-up process that obtains user s personally identifiable information (PII) from the AI which is unique in AI s realm and SSO Process where SP finds users IdP and makes authentication to determine if the information should be certified or not. The advantages of this method are fewer passwords to remember, better security, resource savings and reduce phishing. The disadvantages of this method are single point failure, single high value target, lack of control over user list, complexity of maintaining another interface and information disclosure between trusting site and SSO authority. 4. Trust Concept: Trust if a fiduciary arrangement that allowsa third party, or trustee, to hold assets on behalf of a beneficiary or beneficiaries [11]. It can specify exactly how and when the assets pass to the beneficiaries. The two important forms of trust are a) third-party trust and b) direct trust. Jonesidentified the two kinds of beliefs a) rule belief and b) conformity belief. Sloman and Grandison [12] define that trust is belief to act dependable, reliably and securely in a given context. Marsh and Dibben [13] find the necessity for distinguishing the concepts of trust, mistrust and distrust and how they are related to each other. Michalakpoulos and Fasli [14] identify the effects and attributes of trust and the dispositions the trust has on individual agents. 5. Trust Management: Blazeet al.[15]identified trustmanagement problem as an important component of a security system. Here approaches are specified to to describe trust actions and trust relationships and a prototype implementation called PolicyMaker to facilitate the development of security features. Winslettet al[16-18] contributed for the automated trust establishment and proposed an architecture for trust negotiation. The above mentioned works represent a good approach for homogenous as well as distributed environment. The credential translations in the above are heavily based on Security Assertion Mark-Up Language (SAML). This is not easily applicable on all popular operating systems, thus restricting its usage mostly to web based resources and systems that are SAML compatible. 2014, IJARCSSE All Rights Reserved Page 316

3 III. USER CENTRIC SSO FOR AN ENTERPRISE NETWORK First we define the entities belonging to the scenario considered in this work: Admin:responsible for running the organization, storing and controlling the user s data in the database. Privileged user: authorized entity who wants to access applications and services offered within the organization. Normal user: unauthorized entity who wants to access services offered within the organization. IdP: any entity that is responsible for managing the user s authentication data and providing identity credentials to the users. SP: offers applications and services to the end users based on their identity. When a user tries to access a service from the SP, the SP offers its services based on the authorization of the user. Initially when an access is made, Proxy IdP retrieves the credentials of the user and verifies if the corresponding user is authorized or not. The Proxy IdP does this by using the Credential Value Services (CVS) which keeps track of the credentials of the users and updates any new information of the user. The Proxy IdP then sends a message to the SP. Once the SP receives this message it offers services to the user based on the privileges the user has. Here we use three different types of three different types of users.they are admin, privileged user and the normal remote user. Admin has the control to insert the data of the new user or update the data of the existing user. Admin manages the entire applications that are offered by the organization and also manages the credentials of the user. Privileged user has the control to access the services provided by the organization and the normal remote user has the control to access only the limited set of services that are provided by the organization. The SP offers this kind of services using the Role Based Access Control (RBAC). This method is called impersonation. User-Centric Single Sign on system uses a service called Reputation service which defines and displays a set of trusts that are offered by each of its application in the IAAS based on which user can make his own choice of the application he needs access from. This method follows a purely usercentric approach wherein the user himself is responsible for all the actions. The figure given below represents the different roles of an user who tries to access certain resources that are given within the organization. Based upon the role of the user, the organization has defined certain policies which implements the Role based Access Control (RBAC) using which the resources are allocated. Each of the layers given in the diagram represents the disjoint roles that consist of the methods used for the authentication. The authentication methods that are used by different roles U, O, P and A are m1, m2, m3 and m4. These authentication methods use a set of policies (Po) that are predefined to identify the role of the user in order to provide access to the resources and how reliable the user is based on his previous transactions; these are termed as Policy Compilation (T p ). It also consists of certificates (C) that are used for credential encoding (T c ) and a set of authorization queries (Q) that helps us query the users logging in to identify the degree of trust the system can have on that corresponding user and is called the Query Compilation (T q ). This is how the trust is managed and maintained in a dynamic environment where there is a chance for an user to gain or lose trust at any random point of time. We establish a theory for trusting the system and vice-versa. The predicates used are USER CENTRIC SINGLE SIGN ON SYSTEM FOR AN ENTERPRISE NETWORK FIREWALL 1 PROXY IDP FIREWALL 2 CVS AS RS IAAS OPEN LDAP DMZ EDGE NODE ADMIN NORMAL REMOTE USER PRIVILEGED USER Fig.1 Architecture diagram for User-Centric Single Sign on System for an Enterprise Network 2014, IJARCSSE All Rights Reserved Page 317

4 1) RequestAccess (x,resource): x is an user who wants to acces a particular resource r ranging over the set of users {U, O, P, A} that uses the methods m1, m2, m3 and m4 to authenticate and identify the user and allocate the corresponding resource based on his role. 2) GetThrough(x, rules): where x has to get through a set of rules to disclose how reliable the user is to the system where the rules are defined ranging over {Po, C, Q} Admin Privileged Normal Remote User User within org. Fig 2. Venn Diagram representing the User Roles 3) Authenticate (x, u, t): x is identified as u at time t, where x is an user ranging over the set of user role { U, O, P, A} and t represents a point in time ranging over the set of natural numbers. 4) AuthenticatedBy (x, m): the identity of x is authenticated by m, where m represents the authentication method ranging over (m1, m2, m3, m4}. 5) Invalid(x, t): the user x is identified to be an unauthorized user at the time t. 1V. CONCLUSION Here we have proposed an approach for managing IAM for different types of users by identifying their roles and providing access to them based on the hierarchy of the user using RBAC. The CVS and RS used here manages the credentials that are given by the user in a secure way without disclosing the user details to a third party without the consent of the user and RS provides an user-centric approach where the degree of security for each of the services provided by the SP are displayed to the user based on which the user can make a choice of his own to decide what service he wants to gain access to. The future work to be done is to develop a prototype, conduct experiments and evaluate the approach. REFERENCES [1] Peter Mell, Timothy Grance: The NIST Definition of Cloud Computing. [2] Christian A. Christiansen Charles J. Kolodgy, Identity and Access Management for Approaching Clouds. May 201l [3] Williams Drive, Suite 610, Fairfax, VA Advisory Council (p) (703) (f) (703) [4] IBM Software security, Managing user identities and access in the cloud December 2011 [5] PelinAngin, Bharat Bhargava, RohitRanchal, Noopur Singh, Lotfi Ben Othmane, LeszekLilien, Mark Linderman, An Entity-centric Approach for Privacy and Identity Management in Cloud Computing 2010 [6] David Nunez, Isaac Agudo, ProkopiosDrogkaris and StefanosGritzalis; Identity Management Challenges for Intercloud Applications. [7] MaiconStihler, Altair OlivoSantin, Arlindo L. Marcon Jr:Integral federated Identity Management for Cloud Computing [8] Mikael Ates, Serge Ravet, Akbar Ahmat, JacquesFayolle: An IdentityCentric Internet: Identity in the Cloud, Identity as a Service and other delights. In proceedings of 6th IEEE International Conference on Availability, Reliability and Security, 2011 [9] SuriadiSuriadi, Ernst Foo, AudunJosang: A user centric federated single sign-on system: Journal of Network and Computer Application [10] Xceedium, New Platforms, New Requirements. Next Generation Privileged Identity Management 2013 [11] Entrust White Paper. (2000, aug.). The concept of trust in Network Security, Version 1.2 [12] T.Grandison and M.Sloman. (2000). A survey of trust in internet applications, IEEE Commun. Surveys Tuts., Fourth Quarter. [13] S.Marsh and M.R.Dibben, Trust,untrust,distrust and mistrust: An exploration of the darker sid, in Proc. itrust, vol. 2477, Lecture notes incomputer Science. Berlin, Germany: Springer-Verlag, 2005, pp [14] M. Michalokopoulosamd M. Fasli, On deciding to trust, in Proc.iTrust, vol.2477, Lecture Notes in Computer Science. Berlin, Germany:Springer-Verlag, 2005,pp , IJARCSSE All Rights Reserved Page 318

5 [15] M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, The role of trust management in distributed systems security, in Chapter in SecureInternet Programming: Security Issues for Mobile and Distributed Objects, Vitek and Jensen, Eds. New York: Springer-Verlag,1999. [16] M. Winslett, An introduction to automated trust negotiation, in Proc.Int. Conf. Multimedia and Its Appl. (unpaginated), Agra, India, Jan.2003 [17] M.Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis,B.Smith, and L. Yu, The trustbuilder architecture for trust negotiation, IEEE Internet Comput.,vol 6, no.6,pp.30-37, Nov./Dec [18] T. Yu and M. Winslett, A unified scheme for resource protection in automated trust negotiation, in Proc. IEEE Symp. Security Privacy, Berkeley, CA, May 2003,pp , IJARCSSE All Rights Reserved Page 319

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth

Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth Marcos A. P. Leandro, Tiago J. Nascimento, Daniel R. dos Santos, Carla M. Westphall, Carlos B. Westphall

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

SAML SSO Configuration

SAML SSO Configuration SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Identity & Access Management

Identity & Access Management TY TI EN ID WHITE PAPER ON Identity & Access Management Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 IDENTITY AND ACCESS MANAGEMENT FRAMEWORK... 3 AUTHENTICATION... 3 AUTHORISATION...

More information

An Identity Management Survey. on Cloud Computing

An Identity Management Survey. on Cloud Computing Int. Journal of Computing and Optimization, Vol. 1, 2014, no. 2, 63-71 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijco.2014.458 An Identity Management Survey on Cloud Computing Ardi BENUSI

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

USING FEDERATED AUTHENTICATION WITH M-FILES

USING FEDERATED AUTHENTICATION WITH M-FILES M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Manisha R. Patil. Keywords Cloud service provider, Identity Provider, Enhanced Client Profile, Identity Management, Privacy, Trust Manager.

Manisha R. Patil. Keywords Cloud service provider, Identity Provider, Enhanced Client Profile, Identity Management, Privacy, Trust Manager. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy and Dynamic

More information

A Survey on Cloud Security Issues and Techniques

A Survey on Cloud Security Issues and Techniques A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com

More information

How To Manage Identity On A Cloud (Cloud) With A User Id And A Password (Saas)

How To Manage Identity On A Cloud (Cloud) With A User Id And A Password (Saas) Integral Federated Identity Management for Cloud Computing Maicon Stihler, Altair Olivo Santin, Arlindo L. Marcon Jr. Graduate Program in Computer Science Pontifical Catholic University of Paraná Curitiba,

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Extend and Enhance AD FS

Extend and Enhance AD FS Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy

More information

Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics

Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics B.Prasanalakshmi Assistant Professor Department of CSE Thirumalai Engineering College

More information

Domain 12: Guidance for Identity & Access Management V2.1

Domain 12: Guidance for Identity & Access Management V2.1 Domain 12: Guidance for Identity & Access Management V2.1 Prepared by the Cloud Security Alliance April 2010 Introduction The permanent and official location for this Cloud Security Alliance Domain 12

More information

Access Control Framework of Personal Cloud based on XACML

Access Control Framework of Personal Cloud based on XACML Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

Federation Proxy for Cross Domain Identity Federation

Federation Proxy for Cross Domain Identity Federation Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 m-hatake@ax.jp.nec.com

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Different Patterns of Identity Management Implemented in Cloud Computing

Different Patterns of Identity Management Implemented in Cloud Computing 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore Different Patterns of Identity Management Implemented

More information

Network-based Access Control

Network-based Access Control Chapter 4 Network-based Access Control 4.1 Rationale and Motivation Over the past couple of years, a multitude of authentication and access control technologies have been designed and implemented. Although

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

CLAIMS-BASED IDENTITY FOR WINDOWS

CLAIMS-BASED IDENTITY FOR WINDOWS CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management

More information

An Efficient Windows Cardspace identity Management Technique in Cloud Computing

An Efficient Windows Cardspace identity Management Technique in Cloud Computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 61-66 An Efficient Windows Cardspace identity Management Technique

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0 sm Open Data Center Alliance Usage: Identity Interoperability Guide rev. 1.0 Open Data Center Alliance Usage: Identity Interoperability Guide Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary...

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

OpenHRE Security Architecture. (DRAFT v0.5)

OpenHRE Security Architecture. (DRAFT v0.5) OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

Privacy in Cloud Computing Through Identity Management

Privacy in Cloud Computing Through Identity Management Privacy in Cloud Computing Through Identity Management Bharat Bhargava 1, Noopur Singh 2, Asher Sinclair 3 1 Computer Science, Purdue University 2 Electrical and Computer Engineering, Purdue University

More information

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2013 AWS Worldwide Public Sector Summit Washington, D.C. Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company

More information

IT@Intel. Improving Security and Productivity through Federation and Single Sign-on

IT@Intel. Improving Security and Productivity through Federation and Single Sign-on White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing

More information

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1 Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness

More information

CliQr CloudCenter. Multi-Tenancy

CliQr CloudCenter. Multi-Tenancy CliQr CloudCenter Multi-Tenancy CliQr CloudCenter Multi-Tenancy and Multi-User Model Page 2 Table of Contents 1 Executive Summary...2 2 Introduction...3 3 Use Case: Application Onboarding...4 4 Use Case:

More information

IGI Portal architecture and interaction with a CA- online

IGI Portal architecture and interaction with a CA- online IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following

More information

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner

More information

Speeding Office 365 Implementation Using Identity-as-a-Service

Speeding Office 365 Implementation Using Identity-as-a-Service August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Delegation for On-boarding Federation Across Storage Clouds

Delegation for On-boarding Federation Across Storage Clouds Delegation for On-boarding Federation Across Storage Clouds Elliot K. Kolodner 1, Alexandra Shulman-Peleg 1, Gil Vernik 1, Ciro Formisano 2, and Massimo Villari 3 1 IBM Haifa Research Lab, Israel 2 Engineering

More information

A Broker Based Trust Model for Cloud Computing Environment

A Broker Based Trust Model for Cloud Computing Environment A Broker Based Trust Model for Cloud Computing Environment Chaitali Uikey 1, Dr. D. S. Bhilare 2 1 School of Computer Science & IT, DAVV, Indore, MP. India 2 Computer Center, DAVV, Indore, MP. India Abstract

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management

More information

IBM Security Systems Division

IBM Security Systems Division IBM Security Systems Division Identitetshanterings id access management i ett Enterprise Network November 2012 Sven-Erik Vestergaard Nordic Security Architect Certified IT Specialist IBM software group

More information

Application Based Access Control on Cloud Networks for Data Security

Application Based Access Control on Cloud Networks for Data Security Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,

More information

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015 Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud

More information

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia ei09095@fe.up.pt. Pedro Borges ei09063@fe.up.pt

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia ei09095@fe.up.pt. Pedro Borges ei09063@fe.up.pt Computer Systems Security 2013/2014 Single Sign-On Bruno Maia ei09095@fe.up.pt Pedro Borges ei09063@fe.up.pt December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

Data management using Virtualization in Cloud Computing

Data management using Virtualization in Cloud Computing Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

Proof of Retrivability: A Third Party Auditor Using Cloud Computing Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry

More information

My Private Cloud. Project Objectives

My Private Cloud. Project Objectives My Private Cloud David W Chadwick University of Kent 1 Dec 2011 IEEE CloudCom 2011 1 Project Objectives Migrate (as much as possible in 6 months of) the trust, security and privacy preserving infrastructure

More information

NetIQ Identity Manager Setup Guide

NetIQ Identity Manager Setup Guide NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS

CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,

More information

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment WHITEPAPER How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment www.onelogin.com 150 Spear Street, Suite 1400, San Francisco, CA 94105 855.426.7272 EXECUTIVE SUMMARY

More information

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING Mrs. J. Pavithra 1 Mr. A. Naveen 2 1 (MRIT, Hyderabad, India, jpav23@gmail.com) 2 (Asst. Professor, MRIT, Hyderabad, India, a.naveen21@gmail.com)

More information

COMBINE DIFFERENT TRUST MANAGEMENT TECHNIQUE: RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE. B.Brithi #1, K. Kiruthikadevi *2

COMBINE DIFFERENT TRUST MANAGEMENT TECHNIQUE: RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE. B.Brithi #1, K. Kiruthikadevi *2 COMBINE DIFFERENT TRUST : RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE B.Brithi #1, K. Kiruthikadevi *2 1 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode.

More information

Copyright: WhosOnLocation Limited

Copyright: WhosOnLocation Limited How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and

More information

Access Control of Cloud Service Based on UCON

Access Control of Cloud Service Based on UCON Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China chendw@njupt.edu.cn,

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditing for Secured Data Storage in Cloud Computing IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski March 2015 is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University

UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University UNI TY UNIfied identity management Krzysztof Benedyczak ICM, Warsaw University Outline The idea Local database Groups, Entities, Identities and Attributes UNITY Authorization Local authentication Credentials

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Integrated Identity and Access Management Architectural Patterns

Integrated Identity and Access Management Architectural Patterns Redpaper Axel Buecker Dwijen Bhatt Daniel Craun Dr. Jayashree Ramanathan Neil Readshaw Govindaraj Sampathkumar Integrated Identity and Access Management Architectural Patterns Customers implement an integrated

More information

A Secure Authenticate Framework for Cloud Computing Environment

A Secure Authenticate Framework for Cloud Computing Environment A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure

More information

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service

More information

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted

More information

Cloud Computing. Chapter 5 Identity as a Service (IDaaS)

Cloud Computing. Chapter 5 Identity as a Service (IDaaS) Cloud Computing Chapter 5 Identity as a Service (IDaaS) Learning Objectives Describe challenges related to ID management. Describe and discuss single sign-on (SSO) capabilities. List the advantages of

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

Identity Governance Evolution

Identity Governance Evolution Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle

More information

Single Sign-on. Overview. Using SSO with the Cisco WebEx and Cisco WebEx Meeting. Overview, page 1

Single Sign-on. Overview. Using SSO with the Cisco WebEx and Cisco WebEx Meeting. Overview, page 1 Overview, page 1 Using SSO with the Cisco WebEx and Cisco WebEx Meeting Applications, page 1 Requirements, page 2 Configuration of in Cisco WebEx Messenger Administration Tool, page 3 Sample Installation

More information

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014 Introduction to Identity and Access Management for the engineers Radovan Semančík April 2014 How it works now? Manager Admin Login Users Login Admin Login Login Login Theory Manager Admin Forgot password

More information

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and

More information

An Approach to Achieve Delegation of Sensitive RESTful Resources on Storage Cloud

An Approach to Achieve Delegation of Sensitive RESTful Resources on Storage Cloud An Approach to Achieve Delegation of Sensitive RESTful Resources on Storage Cloud Kanchanna Ramasamy Balraj Engineering Ingegneria Informatica Spa, Rome, Italy Abstract. The paper explains a simple approach

More information