LDAP Authentication Configuration Appendix

Size: px
Start display at page:

Download "LDAP Authentication Configuration Appendix"

Transcription

1 1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard Academic Suite is compatible with the most popular authentication protocols, such as LDAP ( Lightweight Directory Access Protocol ) and Kerberos, as well as some proprietary solutions including Web Server Delegation and Active Directory. Additionally, many institutions have implemented custom authentication schemas and Blackboard s authentication framework was designed to be flexible enough to meet such unique demands. Blackboard Consulting provides invaluable experience designing and documenting authentication schemas that integrate Blackboard into existing environments. Blackboard Consulting has developed a straightforward methodology that begins with technical requirements, identifies system workflow, and ultimately implements a dependable authentication solution. 2 Objectives Integrate current institutional authentication technologies with the Blackboard Academic Suite to position the institution for future growth and scalability. More specifically, LDAP Authentication Configuration Solutions are expected to provide the following: A secure method of authentication Blackboard users by utilizing the LDAP protocol Leverage existing investments in customers LDAP-compliant directories by including Blackboard in the list of applications using this service for authentication credentials Improve authentication process for end users, by reducing the number of usernames and passwords needed to access secure systems. Reduce support center call volume, by including LDAP s simple change password feature as part of the authentication process Enforce institutional security protocols by configuring Blackboard to either fallback to other LDAP systems or its own database, or not, for authentication purposes. 2.1 LDAP Authentication Configuration Approach Through years of experience in the software industry, Blackboard consultants have utilized industry-wide software development practices that ensure efficiency, clear deliverables, and greater client satisfaction. Our development methodology focuses on iterative development cycles that minimize costs due to less rework, installation packages to simplify deployments, and compliance with universally accepted coding standards. Throughout this development lifecycle, Blackboard Consulting maintains the high quality of project responsibility and client involvement. The approach can be distinguished by the following phases: Process Definition Solution Development Integration Certification Production Preparation Maintenance 2.2 Benefits Blackboard expects its approach to provide several critical benefits. LDAP Authentication Configuration Solutions create the opportunity for process improvement, removing the need for clients to invest in 2005 Page 1 of 8

2 additional hardware and/or software technologies, and simplifies the deployment process because of their familiarity with the existing security/authentication technology. Examples of our technological benefits include: Increased acceptance due to prior deployments of the existing authentication software. Reducing the likelihood of security breaches due to mitigating the need for data cleanup or migration from the existing authentication system to a new architecture. Develop an interest in product and process evolution. Create a paradigm of what if thinking, including: o o What if we were able to channel all users, local and distance, through this gateway into our community? What if we can implement this technology across all systems, possibly through a single gateway and evolve this into a Single Sign-On implementation? 2.3 Qualifications Blackboard Consulting is 120 people strong across the world. In fact, Blackboard Consulting has the ability to truly work around the clock to support your elearning rollout if time is of an essence. As Blackboard Consulting has been implementing and integrating clients around the world since 1998, several key trends have emerged: 1. Blackboard customers that utilized LDAP Authentication Configuration express gratitude in our ability to adapt to local or antiquated technologies. 2. Additional programs emerge as a result based upon What If? thinking due to the Authentication solution being a part of the initial Systems Integration solution offering. Many institutions then realize the potential for the Blackboard Academic Suite to revolutionize the elearning experience moving forward. 3. The Blackboard Academic Suite customers enjoy the ease of implementation and deployment by our ability to create and deliver Installation Packages, which also assists in future upgrades and version releases of the Blackboard solution Page 2 of 8

3 3 Conceptual Custom Authentication Work Flow 2005 Page 3 of 8

4 The implementation plan below describes the activities that the Blackboard Consulting Team and Client project team will participate in to complete the proposed solution. Activities performed have a specific outcome that align with the project for production purposes while also providing knowledge transfer for client self sufficiency. 4 Implementation Plan The following activities describe the services engagement in which your organization and the assigned Blackboard team will participate. 4.1 Project Preparation and Initiation Blackboard Consulting team members assigned to your organization s engagement: o Familiarization with your technical and process-based requirements, including the final Statement of Work and knowledge transfer from the Blackboard Sales team o Setup of client centralized communication plan for tracking project activities, progress, issues, and risk o Preparation of materials for the project kick off conference call Conference call kick off with the client team conducted by Blackboard Consulting: o Introduction of Blackboard and your team members o Review scope of the engagement as defined in the Statement of Work o Review the project plan at a high level o Describe the various client participants required for each stage of the project engagement, including technical stakeholders and end-users o Determine the project schedule, including scheduling of the onsite sessions After the kick off call, the Blackboard Consulting team prepares and delivers to the client a detailed agenda and supporting documentation for the project s onsite activities. 4.2 Project Management Throughout the engagement, the Blackboard Project Manager will provide expert management of all Blackboard performed activities. He/she will: - Act as the primary point of contact between the client project manager and the Blackboard team for all project-related topics - Define, document and update comprehensive project plans and project schedules - Track and report on progress against the project schedule - Coordinate activities such as testing, deployment, follow-up, and documentation with the client-side project manager - Coordinate team meetings and provide regular updates via conference calls for both Blackboard and client constituents. - Provide regular status reports and bi-monthly budget tracking and project plan updates Page 4 of 8

5 - Track and report on any project issues - Summarize and coordinate project planning across all activities and Blackboard groups Consulting, Training, ASP, Quality Assurance, and Product Development. 4.3 Authentication Process Definition Workshops led by Blackboard Consulting at the client s site: o Identification, diagramming, and review of the conceptual solution, designed to isolate specific business processes, local technologies, and workflow rules. Diagram technical navigation patterns specific to LDAP based authentication Determine specifications necessary to comply with central authentication server Construct contingency plans to account for failed or redirected authentication paths and identify a fallback mechanism to the Blackboard default user database o Technical Training specific to the custom authentication developed by Blackboard Consulting 4.4 Development and Implementation Using the results of the requirements and process workshop, Blackboard consultants define, document and perform the necessary development and configuration activities. Develop the required LDAP based authentication utilities. o Identify existing technologies, capabilities, and project end results of the development lifecycle. What is the central authentication technology? What is the access point for the user to authenticate into Blackboard? What are the GUI and Market Branding specifications desired by the client? o Develop a compatible design with existing client systems Can we utilize an multiple directory trees? Which LDAP based platform will the central authentication be tailored towards? How do we account for scalability and future growth in user base? o Determine a logical path dependant on success/failure within the LDAP Authentication If the user cannot authenticate into the Central Authentication Server via the Blackboard LDAP Authentication, is there a contingency such as the Blackboard database? How do we recognize a valid authentication token following login? What Blackboard site is the user directed to following a successful or unsuccessful login? How is this implemented within the Learning System, Community System, Content System, a combination of systems, or the enterprise Academic Suite? How are session logouts managed and what is delivered to the Authentication Server? 2005 Page 5 of 8

6 o Deployment of our solution with an installation package including documented management processes for the solution Is there a support policy already existing at the institution? Who will be responsible for management of the module and what documentation is necessary to assist? Provisions for best practice hands-on training for future usage without Blackboard Consulting assistance Initialization of Integration and Customization Maintenance to support upgrades or version releases 4.5 QA and Functional Testing The Blackboard Consulting team will: Utilize proven test plans for the activities described in the Development and Implementation section above. Coordinate test scripts with the client team Leverage functional testing use cases and storyboards. Execute the steps in the test plan with client system administrators in the client test environment in accordance with the project plan. Provide consulting support for system tests conducted by the client team prior to launch, covering: Best practices for management of the solution pointing forward Prior experience developing the solution with similar systems and objectives Project Documentation Blackboard Consulting will: Develop and deliver technical documentation and update procedures for each item described in the Development and Implementation section above. Develop and deliver the Project Final Report at the conclusion of the project. This report documents the deployed system 4.6 Project Closure At the conclusion of the project, Blackboard will furnish final documentation to the customer in the form of a project control binder. The activities that Blackboard Consulting will perform to accomplish this are: Business process requirements as expressed during the scope and requirements definition System configuration documentation as affected by the Custom Authentication Solution Network and Security Administrator Certification results reference material Production launch schedule Detailed production launch steps Project Final Report The documentation will include all materials developed throughout the project as well as suggested next steps for your organization Page 6 of 8

7 The schedule below reflects the necessary timelines required to fulfill the appropriate project milestones. Key to staying on schedule is making sure we have the correct client participants. Our objective is to follow the project schedule as closely as possible providing there are no significant scheduling challenges or changes in project scope. 5 Schedule During the term of the project the Blackboard project team will guide the client team through a series of exercises focused on defining, designing and implementing a robust authentication solution specific to your institutions application. The engagement begins with a workshop that outlines the process and captures applicable business rules for LDAP based central authentication, including the stakeholders of affected systems. Next, the Blackboard consultants are available to design and develop the necessary authentication components. Finally, they prepare the client team for self sufficiency. 5.1 Project Timeline [Figure1. Solution Project Plan - rough timeline] The project is estimated upon assumption of scope. As with any development lifecycle, it is prudent to estimate a delivery upon measurement of several factors including the resource(s) assigned, complexity of the solution, number of systems affected, usage of the Blackboard Academic Suite, and comprehensiveness of the testing phases. A projected activity flow is diagrammed above. The lifecycle consists of two distinct phases including an initial kickoff call focused on gathering requirements and technical specifications by interviewing network and security administrators. The end product of this will be a technical design subject to review, revision, and acceptance by the client team. The second phase will be a longer period of time dedicated to the development of the approved solution, completed with a testing and deployment phase. As with any estimate, this is based upon clear, static specifications and an uninterrupted period of development with ready assistance from the client security team Page 7 of 8

8 5.2 Scheduling Requirements Blackboard Consulting s development methodology assumes a certain level of effort from the customer team. For example, those individuals with direct responsibility for the existing tools and processes must be committed during the development lifecycle. Blackboard has found that this participation is necessary to prepare customers for the ongoing demands of an integrated Blackboard system. Please note: Blackboard consulting resources are available on a first come first served basis and will be assigned immediately after agreement on proposed work and signature of a Statement of Work 5.3 Client Participants Project Task Roles Required Executive Sponsor System Administrator Process Definition Project Manager Network Administrator IT Representative Academic Computing Network Administrator Solution Implementation Project Manager Security Manager Bb Project Manager Blackboard AS Administrator Certification Workshop Bb Integration Manager System, Network, and/or Security Administrator Production Preparation Client Project Manager Network Administrator Bb Project Manager Security Manager System-level Administrator 6 Conclusion and Blackboard Consulting appreciate your interest in working with our skilled team of technology experts. We believe the aforementioned proposal and estimate will meet the needs of the client by providing the necessary insight and training towards developing systems integration between the Blackboard Academic Suite and your existing systems Page 8 of 8

How To Create A Single Sign On For Blackboard

How To Create A Single Sign On For Blackboard 1 Overview Single Sign-On Authentication Appendix Blackboard s authentication technology has been identified as a dynamic, adaptable factor to supporting elearning Systems Integration strategy and implementation.

More information

Custom Development Methodology Appendix

Custom Development Methodology Appendix 1 Overview Custom Development Methodology Appendix Blackboard s custom software development methodology incorporates standard software development lifecycles in a way that allows for rapid development

More information

Oracle RAC Services Appendix

Oracle RAC Services Appendix 1 Overview Oracle RAC Services Appendix As usage of the Blackboard Academic Suite grows and the system reaches a mission critical level, customers must evaluate the overall effectiveness, stability and

More information

SCT Event Driven Appendix (LDI Event Integrator)

SCT Event Driven Appendix (LDI Event Integrator) SCT Event Driven Appendix (LDI Event Integrator) 1 Overview SCT event driven integration is provided as an on top of Blackboard s snapshot integration methodology. The event driven technology is part of

More information

The School Board of Palm Beach

The School Board of Palm Beach Project Change Request Customer Name: County, Florida Customer Number: 6873401 The School Board of Palm Beach Reference Agreement: Florida State Term Software contract: 252-008-05-ACS Contract #: CFTJQOP

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

Guiding Principles that work Ruel L.A. Ellis

Guiding Principles that work Ruel L.A. Ellis Guiding Principles that work Ruel L.A. Ellis Why E-Learning Rationale for E-Learning Why E-Learning Projects Fail Project Management Philosophy Stage 1: Defining the Project Stage 2: Planning the E-Learning

More information

Designing a Windows Server 2008 Applications Infrastructure

Designing a Windows Server 2008 Applications Infrastructure Designing a Windows Server 2008 Applications Infrastructure Course 6437A : Three days; Instructor-Led Introduction This three day course will prepare IT professionals for the role of Enterprise Administrator.

More information

6437A: Designing a Windows Server 2008 Applications Infrastructure (3 Days)

6437A: Designing a Windows Server 2008 Applications Infrastructure (3 Days) www.peaksolutions.com 6437A: Designing a Windows Server 2008 Applications Infrastructure (3 Days) Introduction This course will prepare IT professionals for the role of Enterprise Administrator. Students

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Guide Parchment to Implementation and User Automation: Guide PeopleSoft

Guide Parchment to Implementation and User Automation: Guide PeopleSoft Guide Parchment to Implementation Send K-12 and User Automation: Guide PeopleSoft 2 Contents OVERVIEW 3 PRODUCT OVERVIEW 4 Access 4 Transcript Ordering 4 Request Processing 4 Transcript Request Fulfillment

More information

How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully

How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully Table of Contents Introduction 1 The Methodology 1 Project Management 2 Project Phases 2 Certification Training

More information

Put the World s Premier Magento Experts to Work for You

Put the World s Premier Magento Experts to Work for You Put the World s Premier Magento Experts to Work for You Expert Consulting Group Your Business Is Unique. So Is Your Path To Success. Contact Us We can help you choose the right services for your business

More information

Program Lifecycle Methodology Version 1.7

Program Lifecycle Methodology Version 1.7 Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated

More information

Active Directory LDAP

Active Directory LDAP Whitepaper WPS Parking Solutions Hoevenweg 11 5652 AW EIndhoven T +31 (0)40 250 91 11, info@wps-nl.com, www.wpsparkingsolutions.com T +31(0)40 250 91 11, E info@wps-nl.com, W www.wpsparkingsolutions.com

More information

Course 6437A: Designing a Windows Server 2008 Applications Infrastructure

Course 6437A: Designing a Windows Server 2008 Applications Infrastructure Course 6437A: Designing a Windows Server 2008 Applications Infrastructure Length: 3 Days Audience(s): IT Professionals Level: 400 Technology: Windows Server 2008 Type: Course Delivery Method: Instructor-led

More information

SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE

SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE Duration 5 Days Course Outline Module 1: Designing IIS Web Farms The students will learn the process of designing IIS Web Farms with

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

An Overview of Samsung KNOX Active Directory-based Single Sign-On

An Overview of Samsung KNOX Active Directory-based Single Sign-On C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Designing a Windows Server 2008 Applications Infrastructure

Designing a Windows Server 2008 Applications Infrastructure Designing a Windows Server 2008 Applications Infrastructure MOC6437 About this Course This three-day course will prepare IT professionals for the role of Enterprise Administrator. Students will learn how

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

Ellucian CRM: platform overview

Ellucian CRM: platform overview Ellucian CRM: platform overview Enterprise-class, higher education-specific Built for higher education Ellucian CRM is designed for colleges and universities and provides higher education-specific business

More information

exchange.parchment.com

exchange.parchment.com Automation Parchment Send Implementation K-12 Guide: User Guide Ellucian exchange.parchment.com Table of Contents Overview... 2 Product Overview... 3 Access... 3 Transcript Ordering... 3 Request Processing:...

More information

Microsoft Premier Deployment. Office 365 Service Description

Microsoft Premier Deployment. Office 365 Service Description Microsoft Premier Deployment Office 365 Service The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication and

More information

Microsoft Active Directory Project

Microsoft Active Directory Project Microsoft Active Directory Project Simcoe County District School Board Project Kick-off Meeting Rami Wehbe (Solution Architect) January 18, 2012 Agenda Introductions Project objectives and drivers Approach

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1

Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1 Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Designing a Windows Server 2008 Applications Infrastructure

Designing a Windows Server 2008 Applications Infrastructure Designing a Windows Server 2008 Applications Infrastructure Course Number: 6437A Course Length: 3 Days Course Overview This three day course will prepare IT professionals for the role of Enterprise Administrator.

More information

NEXT GENERATION ARCHIVE MIGRATION TOOLS

NEXT GENERATION ARCHIVE MIGRATION TOOLS NEXT GENERATION ARCHIVE MIGRATION TOOLS Cloud Ready, Scalable, & Highly Customizable - Migrate 6.0 Ensures Faster & Smarter Migrations EXECUTIVE SUMMARY Data migrations and the products used to perform

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Course 8036: Two days; Instructor-led Microsoft Certified Professional Exams No Microsoft Certified Professional

More information

Getting Started with AD/LDAP SSO

Getting Started with AD/LDAP SSO Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories

More information

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

LANDesk Professional Services

LANDesk Professional Services LANDesk Professional Services Service Description For G-Cloud Background Drawing upon 25 years of experience, LANDesk today is recognized as a leading provider of systems and endpoint security management,

More information

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2

More information

POLAR IT SERVICES. Business Intelligence Project Methodology

POLAR IT SERVICES. Business Intelligence Project Methodology POLAR IT SERVICES Business Intelligence Project Methodology Table of Contents 1. Overview... 2 2. Visualize... 3 3. Planning and Architecture... 4 3.1 Define Requirements... 4 3.1.1 Define Attributes...

More information

Vidder PrecisionAccess

Vidder PrecisionAccess Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Media Shuttle s Defense-in- Depth Security Strategy

Media Shuttle s Defense-in- Depth Security Strategy Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among

More information

Project, Program & Portfolio Management Help Leading Firms Deliver Value

Project, Program & Portfolio Management Help Leading Firms Deliver Value in collaboration with Project, Program & Portfolio Help Leading Firms Deliver Value Managing Effectively & Efficiently Through an Enterprise PMO Program & Portfolio : Aligning IT Capabilities with Business

More information

Software Testing Lifecycle

Software Testing Lifecycle STLC-Software Testing Life Cycle SDLC Software Testing Lifecycle Software Testing Life Cycle (STLC) defines the steps/ stages/ phases in testing of software. However, there is no fixed standard STLC in

More information

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations

More information

KMS Implementation Roadmap

KMS Implementation Roadmap KMS Implementation Roadmap Sample Excerpt Prepared by: The Knowledge Compass, Inc. TABLE OF CONTENTS 1. EXECUTIVE SUMMARY 5 1.1 Overview 5 1.2 Project Goals & Objectives 5 1.3 Implementation Approach 5

More information

SharePoint 2013 Migration Readiness

SharePoint 2013 Migration Readiness SharePoint 2013 Migration Readiness Decision Points around Migrating to SharePoint 2013 MARK ECKERT Contents Purpose... 1 SharePoint 2013 Implementation Options... 1 On-premise installation... 1 Cloud...

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

GSA Services Catalog

GSA Services Catalog INCLUDES CHANGES THROUGH MODIFICATION P00007 immixtechnology, Inc. N00104-08-A-ZF31 GS-35-F-0265X Attachment D GSA Services Catalog Training Services... 2 Introductory Training - WebEx... 4 Level 1 Help

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

INTERNAL SERVICES GROUP PMO

INTERNAL SERVICES GROUP PMO Ownership & Awareness Program 1 Program 3 Program 4 Program 5 Program 6 Program 7 Program 2 Cap ability Development Infra structure Program n INTERNAL SERVICES GROUP ESSENTIAL FUNCTIONS Act as an interface

More information

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of

More information

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service

More information

API Architecture. for the Data Interoperability at OSU initiative

API Architecture. for the Data Interoperability at OSU initiative API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models

More information

Authentication is not Authorization?! And what is a "digital signature" anyway?

Authentication is not Authorization?! And what is a digital signature anyway? Authentication is not Authorization?! And what is a "digital signature" anyway? Prepared by R. David Vernon Revised 12/01 Introduction REV 1A As part of the IT Architecture Initiative, the Office of Information

More information

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Benefits of an Industry Standard Platform for Enterprise Sign-On white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed

More information

Best Practices for Migrating from Lotus Notes to Microsoft Exchange and SharePoint

Best Practices for Migrating from Lotus Notes to Microsoft Exchange and SharePoint Best Practices for Migrating from Lotus Notes to Microsoft Exchange and SharePoint A White Paper Written by Technology Strategy Research, LLC and Sponsored by Quest Software - Best Practices for Migrating

More information

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309

More information

Cloudessa AAA and Captive Portal Cloud Service

Cloudessa AAA and Captive Portal Cloud Service Cloudessa AAA and Captive Portal Cloud Service Key Advantages Cloudessa AAA and Captive Portal Cloud Service makes it easy for any merchant, venue, institution, or organization to provide on-site WiFi

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Enterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask

Enterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask Enterprise Single Sign-On SOS The Critical Questions Every Company Needs to Ask Enterprise Single Sign-On: The Critical Questions Every Company Needs to Ask 1 Table of Contents Introduction 2 Application

More information

How To Use Netscaler As An Afs Proxy

How To Use Netscaler As An Afs Proxy Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment

More information

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is intended

More information

A Symantec Connect Document. A Total Cost of Ownership Viewpoint

A Symantec Connect Document. A Total Cost of Ownership Viewpoint A Symantec Connect Document Two-Factor Authentication A Total Cost of Ownership Viewpoint White Paper: Two-Factor Authentication: A TCO Viewpoint Two-Factor Authentication Contents Introduction............................................................................................

More information

How To Improve Your Business

How To Improve Your Business IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends

More information

NetworkingPS Federated Identity Solution Solutions Overview

NetworkingPS Federated Identity Solution Solutions Overview NetworkingPS Federated Identity Solution Solutions Overview OVERVIEW As the global marketplace continues to expand, new and innovating ways of conducting business are becoming a necessity in order for

More information

Statement of Direction

Statement of Direction Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...

More information

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Scope of Work Microsoft Infrastructure Upgrade

Scope of Work Microsoft Infrastructure Upgrade Introduction Scope of Work Microsoft Infrastructure Upgrade The University of Texas M. D. Anderson Cancer Center (M. D. Anderson) in Houston, Texas, celebrating six decades of Making Cancer History, is

More information

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as

More information

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning

More information

Configuring Controller 8.2 to use Active Directory authentication

Configuring Controller 8.2 to use Active Directory authentication Proven Practice Configuring Controller 8.2 to use Active Directory authentication Product(s): Controller 8.2 Area of Interest: Infrastructure Configuring Controller 8.2 to use Active Directory authentication

More information

State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW)

State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW) State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW) ServiceNow Implementation Project Objectives to be completed are: 1. Aide in optimizing processes and integration

More information

ABSTRACT INTRODUCTION SOFTWARE DEPLOYMENT MODEL. Paper 341-2009

ABSTRACT INTRODUCTION SOFTWARE DEPLOYMENT MODEL. Paper 341-2009 Paper 341-2009 The Platform for SAS Business Analytics as a Centrally Managed Service Joe Zilka, SAS Institute, Inc., Copley, OH Greg Henderson, SAS Institute Inc., Cary, NC ABSTRACT Organizations that

More information

Red Hat Enterprise ipa

Red Hat Enterprise ipa Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users

More information

DRIVE OFFICE 365 ADOPTION

DRIVE OFFICE 365 ADOPTION DRIVE OFFICE 365 ADOPTION How do you measure success when deploying Office 365 in your organization? At Cumulus, we believe the answer lies in using long term user adoption and satisfaction as primary

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

NEPHAK GOOGLE APPS FOR BUSINESS & SUPPORT PROPOSAL. Executive Proposal

NEPHAK GOOGLE APPS FOR BUSINESS & SUPPORT PROPOSAL. Executive Proposal NEPHAK GOOGLE APPS FOR BUSINESS & SUPPORT PROPOSAL Executive Proposal Submitted by: emomentum Interactive Systems Ltd Created On: December, 2012 Table of Content 1. Executive Summary... 3 2. Project Summary...

More information

How To Take Advantage Of Active Directory Support In Groupwise 2014

How To Take Advantage Of Active Directory Support In Groupwise 2014 White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15 Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an

More information

Industrial Rapid Implementation Methodology (InRIM)

Industrial Rapid Implementation Methodology (InRIM) Industrial Rapid Implementation Methodology (InRIM) Introduction The path to improving asset effectiveness and productivity must be based on a firm foundation created from the interaction of three essential

More information

How to Implement MDM in 12 Weeks

How to Implement MDM in 12 Weeks White Paper Master Data Management How to Implement MDM in 12 Weeks Tuesday, June 30, 2015 How to Implement Provider MDM in 12 Weeks The Health Insurance industry is faced with regulatory, economic, social

More information

Using DeployR to Solve the R Integration Problem

Using DeployR to Solve the R Integration Problem DEPLOYR WHITE PAPER Using DeployR to olve the R Integration Problem By the Revolution Analytics DeployR Team March 2015 Introduction Organizations use analytics to empower decision making, often in real

More information

Mac OS X and Directory Services Integration

Mac OS X and Directory Services Integration Mac OS X and Directory Services Integration Neha Setia 1 and Tarun Dalal 2 1 M.Tech Scholor, CBS Group of Institutions, CSE Department, MDU Rohtak, India setia_neha@yahoo.co.in 2 Assistant Professor, CBS

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

Configuring IBM Cognos Controller 8 to use Single Sign- On

Configuring IBM Cognos Controller 8 to use Single Sign- On Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright

More information

TIBCO Spotfire Platform IT Brief

TIBCO Spotfire Platform IT Brief Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily

More information

Fixed Scope Offering for Implementation of Taleo

Fixed Scope Offering for Implementation of Taleo Fixed Scope Offering for Implementation of Taleo Mindtree limited 2015 All third party identities used within this presentation are copyrighted properties of the respective companies. Viewers and users

More information

PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME >

PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > Date of Issue: < date > Document Revision #: < version # > Project Manager: < name > Project Management Plan < Insert Project Name > Revision History Name

More information

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge

More information

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

Why Choose the Oracle Taleo Recruiting Cloud?

Why Choose the Oracle Taleo Recruiting Cloud? Agenda Executive Summary This presentation provides an overview of the fixed scope offering of Oracle s Fusion HCM Cloud solution from METSCON IT Systems METSCON is a key partner of Oracle in the HCM space

More information

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This

More information

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication

More information

Identity Management: The authentic & authoritative guide for the modern enterprise

Identity Management: The authentic & authoritative guide for the modern enterprise Identity Management: The authentic & authoritative guide for the modern enterprise Ellen Newlands, Product Manager Dmitri Pal, Director, Engineering 06-26-15 Goals of the Presentation Introduce Identity

More information

Custom Software Development Approach

Custom Software Development Approach Custom Software Development Approach Our approach to custom software development combines benefits from several standard development process models. We tend to have a well-defined, predictable and highly

More information