LDAP Authentication Configuration Appendix
|
|
- Esmond Cunningham
- 8 years ago
- Views:
Transcription
1 1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard Academic Suite is compatible with the most popular authentication protocols, such as LDAP ( Lightweight Directory Access Protocol ) and Kerberos, as well as some proprietary solutions including Web Server Delegation and Active Directory. Additionally, many institutions have implemented custom authentication schemas and Blackboard s authentication framework was designed to be flexible enough to meet such unique demands. Blackboard Consulting provides invaluable experience designing and documenting authentication schemas that integrate Blackboard into existing environments. Blackboard Consulting has developed a straightforward methodology that begins with technical requirements, identifies system workflow, and ultimately implements a dependable authentication solution. 2 Objectives Integrate current institutional authentication technologies with the Blackboard Academic Suite to position the institution for future growth and scalability. More specifically, LDAP Authentication Configuration Solutions are expected to provide the following: A secure method of authentication Blackboard users by utilizing the LDAP protocol Leverage existing investments in customers LDAP-compliant directories by including Blackboard in the list of applications using this service for authentication credentials Improve authentication process for end users, by reducing the number of usernames and passwords needed to access secure systems. Reduce support center call volume, by including LDAP s simple change password feature as part of the authentication process Enforce institutional security protocols by configuring Blackboard to either fallback to other LDAP systems or its own database, or not, for authentication purposes. 2.1 LDAP Authentication Configuration Approach Through years of experience in the software industry, Blackboard consultants have utilized industry-wide software development practices that ensure efficiency, clear deliverables, and greater client satisfaction. Our development methodology focuses on iterative development cycles that minimize costs due to less rework, installation packages to simplify deployments, and compliance with universally accepted coding standards. Throughout this development lifecycle, Blackboard Consulting maintains the high quality of project responsibility and client involvement. The approach can be distinguished by the following phases: Process Definition Solution Development Integration Certification Production Preparation Maintenance 2.2 Benefits Blackboard expects its approach to provide several critical benefits. LDAP Authentication Configuration Solutions create the opportunity for process improvement, removing the need for clients to invest in 2005 Page 1 of 8
2 additional hardware and/or software technologies, and simplifies the deployment process because of their familiarity with the existing security/authentication technology. Examples of our technological benefits include: Increased acceptance due to prior deployments of the existing authentication software. Reducing the likelihood of security breaches due to mitigating the need for data cleanup or migration from the existing authentication system to a new architecture. Develop an interest in product and process evolution. Create a paradigm of what if thinking, including: o o What if we were able to channel all users, local and distance, through this gateway into our community? What if we can implement this technology across all systems, possibly through a single gateway and evolve this into a Single Sign-On implementation? 2.3 Qualifications Blackboard Consulting is 120 people strong across the world. In fact, Blackboard Consulting has the ability to truly work around the clock to support your elearning rollout if time is of an essence. As Blackboard Consulting has been implementing and integrating clients around the world since 1998, several key trends have emerged: 1. Blackboard customers that utilized LDAP Authentication Configuration express gratitude in our ability to adapt to local or antiquated technologies. 2. Additional programs emerge as a result based upon What If? thinking due to the Authentication solution being a part of the initial Systems Integration solution offering. Many institutions then realize the potential for the Blackboard Academic Suite to revolutionize the elearning experience moving forward. 3. The Blackboard Academic Suite customers enjoy the ease of implementation and deployment by our ability to create and deliver Installation Packages, which also assists in future upgrades and version releases of the Blackboard solution Page 2 of 8
3 3 Conceptual Custom Authentication Work Flow 2005 Page 3 of 8
4 The implementation plan below describes the activities that the Blackboard Consulting Team and Client project team will participate in to complete the proposed solution. Activities performed have a specific outcome that align with the project for production purposes while also providing knowledge transfer for client self sufficiency. 4 Implementation Plan The following activities describe the services engagement in which your organization and the assigned Blackboard team will participate. 4.1 Project Preparation and Initiation Blackboard Consulting team members assigned to your organization s engagement: o Familiarization with your technical and process-based requirements, including the final Statement of Work and knowledge transfer from the Blackboard Sales team o Setup of client centralized communication plan for tracking project activities, progress, issues, and risk o Preparation of materials for the project kick off conference call Conference call kick off with the client team conducted by Blackboard Consulting: o Introduction of Blackboard and your team members o Review scope of the engagement as defined in the Statement of Work o Review the project plan at a high level o Describe the various client participants required for each stage of the project engagement, including technical stakeholders and end-users o Determine the project schedule, including scheduling of the onsite sessions After the kick off call, the Blackboard Consulting team prepares and delivers to the client a detailed agenda and supporting documentation for the project s onsite activities. 4.2 Project Management Throughout the engagement, the Blackboard Project Manager will provide expert management of all Blackboard performed activities. He/she will: - Act as the primary point of contact between the client project manager and the Blackboard team for all project-related topics - Define, document and update comprehensive project plans and project schedules - Track and report on progress against the project schedule - Coordinate activities such as testing, deployment, follow-up, and documentation with the client-side project manager - Coordinate team meetings and provide regular updates via conference calls for both Blackboard and client constituents. - Provide regular status reports and bi-monthly budget tracking and project plan updates Page 4 of 8
5 - Track and report on any project issues - Summarize and coordinate project planning across all activities and Blackboard groups Consulting, Training, ASP, Quality Assurance, and Product Development. 4.3 Authentication Process Definition Workshops led by Blackboard Consulting at the client s site: o Identification, diagramming, and review of the conceptual solution, designed to isolate specific business processes, local technologies, and workflow rules. Diagram technical navigation patterns specific to LDAP based authentication Determine specifications necessary to comply with central authentication server Construct contingency plans to account for failed or redirected authentication paths and identify a fallback mechanism to the Blackboard default user database o Technical Training specific to the custom authentication developed by Blackboard Consulting 4.4 Development and Implementation Using the results of the requirements and process workshop, Blackboard consultants define, document and perform the necessary development and configuration activities. Develop the required LDAP based authentication utilities. o Identify existing technologies, capabilities, and project end results of the development lifecycle. What is the central authentication technology? What is the access point for the user to authenticate into Blackboard? What are the GUI and Market Branding specifications desired by the client? o Develop a compatible design with existing client systems Can we utilize an multiple directory trees? Which LDAP based platform will the central authentication be tailored towards? How do we account for scalability and future growth in user base? o Determine a logical path dependant on success/failure within the LDAP Authentication If the user cannot authenticate into the Central Authentication Server via the Blackboard LDAP Authentication, is there a contingency such as the Blackboard database? How do we recognize a valid authentication token following login? What Blackboard site is the user directed to following a successful or unsuccessful login? How is this implemented within the Learning System, Community System, Content System, a combination of systems, or the enterprise Academic Suite? How are session logouts managed and what is delivered to the Authentication Server? 2005 Page 5 of 8
6 o Deployment of our solution with an installation package including documented management processes for the solution Is there a support policy already existing at the institution? Who will be responsible for management of the module and what documentation is necessary to assist? Provisions for best practice hands-on training for future usage without Blackboard Consulting assistance Initialization of Integration and Customization Maintenance to support upgrades or version releases 4.5 QA and Functional Testing The Blackboard Consulting team will: Utilize proven test plans for the activities described in the Development and Implementation section above. Coordinate test scripts with the client team Leverage functional testing use cases and storyboards. Execute the steps in the test plan with client system administrators in the client test environment in accordance with the project plan. Provide consulting support for system tests conducted by the client team prior to launch, covering: Best practices for management of the solution pointing forward Prior experience developing the solution with similar systems and objectives Project Documentation Blackboard Consulting will: Develop and deliver technical documentation and update procedures for each item described in the Development and Implementation section above. Develop and deliver the Project Final Report at the conclusion of the project. This report documents the deployed system 4.6 Project Closure At the conclusion of the project, Blackboard will furnish final documentation to the customer in the form of a project control binder. The activities that Blackboard Consulting will perform to accomplish this are: Business process requirements as expressed during the scope and requirements definition System configuration documentation as affected by the Custom Authentication Solution Network and Security Administrator Certification results reference material Production launch schedule Detailed production launch steps Project Final Report The documentation will include all materials developed throughout the project as well as suggested next steps for your organization Page 6 of 8
7 The schedule below reflects the necessary timelines required to fulfill the appropriate project milestones. Key to staying on schedule is making sure we have the correct client participants. Our objective is to follow the project schedule as closely as possible providing there are no significant scheduling challenges or changes in project scope. 5 Schedule During the term of the project the Blackboard project team will guide the client team through a series of exercises focused on defining, designing and implementing a robust authentication solution specific to your institutions application. The engagement begins with a workshop that outlines the process and captures applicable business rules for LDAP based central authentication, including the stakeholders of affected systems. Next, the Blackboard consultants are available to design and develop the necessary authentication components. Finally, they prepare the client team for self sufficiency. 5.1 Project Timeline [Figure1. Solution Project Plan - rough timeline] The project is estimated upon assumption of scope. As with any development lifecycle, it is prudent to estimate a delivery upon measurement of several factors including the resource(s) assigned, complexity of the solution, number of systems affected, usage of the Blackboard Academic Suite, and comprehensiveness of the testing phases. A projected activity flow is diagrammed above. The lifecycle consists of two distinct phases including an initial kickoff call focused on gathering requirements and technical specifications by interviewing network and security administrators. The end product of this will be a technical design subject to review, revision, and acceptance by the client team. The second phase will be a longer period of time dedicated to the development of the approved solution, completed with a testing and deployment phase. As with any estimate, this is based upon clear, static specifications and an uninterrupted period of development with ready assistance from the client security team Page 7 of 8
8 5.2 Scheduling Requirements Blackboard Consulting s development methodology assumes a certain level of effort from the customer team. For example, those individuals with direct responsibility for the existing tools and processes must be committed during the development lifecycle. Blackboard has found that this participation is necessary to prepare customers for the ongoing demands of an integrated Blackboard system. Please note: Blackboard consulting resources are available on a first come first served basis and will be assigned immediately after agreement on proposed work and signature of a Statement of Work 5.3 Client Participants Project Task Roles Required Executive Sponsor System Administrator Process Definition Project Manager Network Administrator IT Representative Academic Computing Network Administrator Solution Implementation Project Manager Security Manager Bb Project Manager Blackboard AS Administrator Certification Workshop Bb Integration Manager System, Network, and/or Security Administrator Production Preparation Client Project Manager Network Administrator Bb Project Manager Security Manager System-level Administrator 6 Conclusion and Blackboard Consulting appreciate your interest in working with our skilled team of technology experts. We believe the aforementioned proposal and estimate will meet the needs of the client by providing the necessary insight and training towards developing systems integration between the Blackboard Academic Suite and your existing systems Page 8 of 8
How To Create A Single Sign On For Blackboard
1 Overview Single Sign-On Authentication Appendix Blackboard s authentication technology has been identified as a dynamic, adaptable factor to supporting elearning Systems Integration strategy and implementation.
More informationCustom Development Methodology Appendix
1 Overview Custom Development Methodology Appendix Blackboard s custom software development methodology incorporates standard software development lifecycles in a way that allows for rapid development
More informationOracle RAC Services Appendix
1 Overview Oracle RAC Services Appendix As usage of the Blackboard Academic Suite grows and the system reaches a mission critical level, customers must evaluate the overall effectiveness, stability and
More informationSCT Event Driven Appendix (LDI Event Integrator)
SCT Event Driven Appendix (LDI Event Integrator) 1 Overview SCT event driven integration is provided as an on top of Blackboard s snapshot integration methodology. The event driven technology is part of
More informationThe School Board of Palm Beach
Project Change Request Customer Name: County, Florida Customer Number: 6873401 The School Board of Palm Beach Reference Agreement: Florida State Term Software contract: 252-008-05-ACS Contract #: CFTJQOP
More informationRemote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
More informationGuiding Principles that work Ruel L.A. Ellis
Guiding Principles that work Ruel L.A. Ellis Why E-Learning Rationale for E-Learning Why E-Learning Projects Fail Project Management Philosophy Stage 1: Defining the Project Stage 2: Planning the E-Learning
More informationDesigning a Windows Server 2008 Applications Infrastructure
Designing a Windows Server 2008 Applications Infrastructure Course 6437A : Three days; Instructor-Led Introduction This three day course will prepare IT professionals for the role of Enterprise Administrator.
More information6437A: Designing a Windows Server 2008 Applications Infrastructure (3 Days)
www.peaksolutions.com 6437A: Designing a Windows Server 2008 Applications Infrastructure (3 Days) Introduction This course will prepare IT professionals for the role of Enterprise Administrator. Students
More informationTwo-Factor Authentication
Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign
More informationWeb Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
More informationGuide Parchment to Implementation and User Automation: Guide PeopleSoft
Guide Parchment to Implementation Send K-12 and User Automation: Guide PeopleSoft 2 Contents OVERVIEW 3 PRODUCT OVERVIEW 4 Access 4 Transcript Ordering 4 Request Processing 4 Transcript Request Fulfillment
More informationHow to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully
How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully Table of Contents Introduction 1 The Methodology 1 Project Management 2 Project Phases 2 Certification Training
More informationPut the World s Premier Magento Experts to Work for You
Put the World s Premier Magento Experts to Work for You Expert Consulting Group Your Business Is Unique. So Is Your Path To Success. Contact Us We can help you choose the right services for your business
More informationProgram Lifecycle Methodology Version 1.7
Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated
More informationActive Directory LDAP
Whitepaper WPS Parking Solutions Hoevenweg 11 5652 AW EIndhoven T +31 (0)40 250 91 11, info@wps-nl.com, www.wpsparkingsolutions.com T +31(0)40 250 91 11, E info@wps-nl.com, W www.wpsparkingsolutions.com
More informationCourse 6437A: Designing a Windows Server 2008 Applications Infrastructure
Course 6437A: Designing a Windows Server 2008 Applications Infrastructure Length: 3 Days Audience(s): IT Professionals Level: 400 Technology: Windows Server 2008 Type: Course Delivery Method: Instructor-led
More informationSSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE
SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE Duration 5 Days Course Outline Module 1: Designing IIS Web Farms The students will learn the process of designing IIS Web Farms with
More informationSingle Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
More informationAn Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationDesigning a Windows Server 2008 Applications Infrastructure
Designing a Windows Server 2008 Applications Infrastructure MOC6437 About this Course This three-day course will prepare IT professionals for the role of Enterprise Administrator. Students will learn how
More informationAuthentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
More informationEllucian CRM: platform overview
Ellucian CRM: platform overview Enterprise-class, higher education-specific Built for higher education Ellucian CRM is designed for colleges and universities and provides higher education-specific business
More informationexchange.parchment.com
Automation Parchment Send Implementation K-12 Guide: User Guide Ellucian exchange.parchment.com Table of Contents Overview... 2 Product Overview... 3 Access... 3 Transcript Ordering... 3 Request Processing:...
More informationMicrosoft Premier Deployment. Office 365 Service Description
Microsoft Premier Deployment Office 365 Service The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication and
More informationMicrosoft Active Directory Project
Microsoft Active Directory Project Simcoe County District School Board Project Kick-off Meeting Rami Wehbe (Solution Architect) January 18, 2012 Agenda Introductions Project objectives and drivers Approach
More informationActive Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
More informationCompiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1
Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationDesigning a Windows Server 2008 Applications Infrastructure
Designing a Windows Server 2008 Applications Infrastructure Course Number: 6437A Course Length: 3 Days Course Overview This three day course will prepare IT professionals for the role of Enterprise Administrator.
More informationNEXT GENERATION ARCHIVE MIGRATION TOOLS
NEXT GENERATION ARCHIVE MIGRATION TOOLS Cloud Ready, Scalable, & Highly Customizable - Migrate 6.0 Ensures Faster & Smarter Migrations EXECUTIVE SUMMARY Data migrations and the products used to perform
More informationCisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
More informationDesigning IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop
Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Course 8036: Two days; Instructor-led Microsoft Certified Professional Exams No Microsoft Certified Professional
More informationGetting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
More informationExternal Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
More informationAuthentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
More informationLANDesk Professional Services
LANDesk Professional Services Service Description For G-Cloud Background Drawing upon 25 years of experience, LANDesk today is recognized as a leading provider of systems and endpoint security management,
More informationSymplified I: Windows User Identity. Matthew McNew and Lex Hubbard
Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2
More informationPOLAR IT SERVICES. Business Intelligence Project Methodology
POLAR IT SERVICES Business Intelligence Project Methodology Table of Contents 1. Overview... 2 2. Visualize... 3 3. Planning and Architecture... 4 3.1 Define Requirements... 4 3.1.1 Define Attributes...
More informationVidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
More informationCisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
More informationMedia Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
More informationProject, Program & Portfolio Management Help Leading Firms Deliver Value
in collaboration with Project, Program & Portfolio Help Leading Firms Deliver Value Managing Effectively & Efficiently Through an Enterprise PMO Program & Portfolio : Aligning IT Capabilities with Business
More informationSoftware Testing Lifecycle
STLC-Software Testing Life Cycle SDLC Software Testing Lifecycle Software Testing Life Cycle (STLC) defines the steps/ stages/ phases in testing of software. However, there is no fixed standard STLC in
More informationWhite Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
More informationKMS Implementation Roadmap
KMS Implementation Roadmap Sample Excerpt Prepared by: The Knowledge Compass, Inc. TABLE OF CONTENTS 1. EXECUTIVE SUMMARY 5 1.1 Overview 5 1.2 Project Goals & Objectives 5 1.3 Implementation Approach 5
More informationSharePoint 2013 Migration Readiness
SharePoint 2013 Migration Readiness Decision Points around Migrating to SharePoint 2013 MARK ECKERT Contents Purpose... 1 SharePoint 2013 Implementation Options... 1 On-premise installation... 1 Cloud...
More informationIntroduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
More informationGSA Services Catalog
INCLUDES CHANGES THROUGH MODIFICATION P00007 immixtechnology, Inc. N00104-08-A-ZF31 GS-35-F-0265X Attachment D GSA Services Catalog Training Services... 2 Introductory Training - WebEx... 4 Level 1 Help
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationINTERNAL SERVICES GROUP PMO
Ownership & Awareness Program 1 Program 3 Program 4 Program 5 Program 6 Program 7 Program 2 Cap ability Development Infra structure Program n INTERNAL SERVICES GROUP ESSENTIAL FUNCTIONS Act as an interface
More informationUSER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
More informationActive Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper
Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
More informationWhite Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems
White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service
More informationAPI Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
More informationAuthentication is not Authorization?! And what is a "digital signature" anyway?
Authentication is not Authorization?! And what is a "digital signature" anyway? Prepared by R. David Vernon Revised 12/01 Introduction REV 1A As part of the IT Architecture Initiative, the Office of Information
More informationThe Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
More informationBest Practices for Migrating from Lotus Notes to Microsoft Exchange and SharePoint
Best Practices for Migrating from Lotus Notes to Microsoft Exchange and SharePoint A White Paper Written by Technology Strategy Research, LLC and Sponsored by Quest Software - Best Practices for Migrating
More informationCritical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
More informationCloudessa AAA and Captive Portal Cloud Service
Cloudessa AAA and Captive Portal Cloud Service Key Advantages Cloudessa AAA and Captive Portal Cloud Service makes it easy for any merchant, venue, institution, or organization to provide on-site WiFi
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationEnterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask
Enterprise Single Sign-On SOS The Critical Questions Every Company Needs to Ask Enterprise Single Sign-On: The Critical Questions Every Company Needs to Ask 1 Table of Contents Introduction 2 Application
More informationHow To Use Netscaler As An Afs Proxy
Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment
More informationMigration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015
Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is intended
More informationA Symantec Connect Document. A Total Cost of Ownership Viewpoint
A Symantec Connect Document Two-Factor Authentication A Total Cost of Ownership Viewpoint White Paper: Two-Factor Authentication: A TCO Viewpoint Two-Factor Authentication Contents Introduction............................................................................................
More informationHow To Improve Your Business
IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends
More informationNetworkingPS Federated Identity Solution Solutions Overview
NetworkingPS Federated Identity Solution Solutions Overview OVERVIEW As the global marketplace continues to expand, new and innovating ways of conducting business are becoming a necessity in order for
More informationStatement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
More informationExternal Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationScope of Work Microsoft Infrastructure Upgrade
Introduction Scope of Work Microsoft Infrastructure Upgrade The University of Texas M. D. Anderson Cancer Center (M. D. Anderson) in Houston, Texas, celebrating six decades of Making Cancer History, is
More informationCA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
More informationSaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
More informationConfiguring Controller 8.2 to use Active Directory authentication
Proven Practice Configuring Controller 8.2 to use Active Directory authentication Product(s): Controller 8.2 Area of Interest: Infrastructure Configuring Controller 8.2 to use Active Directory authentication
More informationState of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW)
State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW) ServiceNow Implementation Project Objectives to be completed are: 1. Aide in optimizing processes and integration
More informationABSTRACT INTRODUCTION SOFTWARE DEPLOYMENT MODEL. Paper 341-2009
Paper 341-2009 The Platform for SAS Business Analytics as a Centrally Managed Service Joe Zilka, SAS Institute, Inc., Copley, OH Greg Henderson, SAS Institute Inc., Cary, NC ABSTRACT Organizations that
More informationRed Hat Enterprise ipa
Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users
More informationDRIVE OFFICE 365 ADOPTION
DRIVE OFFICE 365 ADOPTION How do you measure success when deploying Office 365 in your organization? At Cumulus, we believe the answer lies in using long term user adoption and satisfaction as primary
More informationThe Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
More informationNEPHAK GOOGLE APPS FOR BUSINESS & SUPPORT PROPOSAL. Executive Proposal
NEPHAK GOOGLE APPS FOR BUSINESS & SUPPORT PROPOSAL Executive Proposal Submitted by: emomentum Interactive Systems Ltd Created On: December, 2012 Table of Content 1. Executive Summary... 3 2. Project Summary...
More informationHow To Take Advantage Of Active Directory Support In Groupwise 2014
White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationStephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15
Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an
More informationIndustrial Rapid Implementation Methodology (InRIM)
Industrial Rapid Implementation Methodology (InRIM) Introduction The path to improving asset effectiveness and productivity must be based on a firm foundation created from the interaction of three essential
More informationHow to Implement MDM in 12 Weeks
White Paper Master Data Management How to Implement MDM in 12 Weeks Tuesday, June 30, 2015 How to Implement Provider MDM in 12 Weeks The Health Insurance industry is faced with regulatory, economic, social
More informationUsing DeployR to Solve the R Integration Problem
DEPLOYR WHITE PAPER Using DeployR to olve the R Integration Problem By the Revolution Analytics DeployR Team March 2015 Introduction Organizations use analytics to empower decision making, often in real
More informationMac OS X and Directory Services Integration
Mac OS X and Directory Services Integration Neha Setia 1 and Tarun Dalal 2 1 M.Tech Scholor, CBS Group of Institutions, CSE Department, MDU Rohtak, India setia_neha@yahoo.co.in 2 Assistant Professor, CBS
More informationCard Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
More informationConfiguring IBM Cognos Controller 8 to use Single Sign- On
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
More informationTIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
More informationFixed Scope Offering for Implementation of Taleo
Fixed Scope Offering for Implementation of Taleo Mindtree limited 2015 All third party identities used within this presentation are copyrighted properties of the respective companies. Viewers and users
More informationPROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME >
PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > Date of Issue: < date > Document Revision #: < version # > Project Manager: < name > Project Management Plan < Insert Project Name > Revision History Name
More informationVALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
More informationEntrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
More informationOpen Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationWhy Choose the Oracle Taleo Recruiting Cloud?
Agenda Executive Summary This presentation provides an overview of the fixed scope offering of Oracle s Fusion HCM Cloud solution from METSCON IT Systems METSCON is a key partner of Oracle in the HCM space
More informationWhat s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4
Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This
More informationBusiness Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:
Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication
More informationIdentity Management: The authentic & authoritative guide for the modern enterprise
Identity Management: The authentic & authoritative guide for the modern enterprise Ellen Newlands, Product Manager Dmitri Pal, Director, Engineering 06-26-15 Goals of the Presentation Introduce Identity
More informationCustom Software Development Approach
Custom Software Development Approach Our approach to custom software development combines benefits from several standard development process models. We tend to have a well-defined, predictable and highly
More information