Advanced Authentication

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Advanced Authentication"

Transcription

1 Architecture Overview Authasas Advanced Authentication Strong Authenticating to Novell edirectory using Domain Services for Windows November, 2011 Authasas Advanced Authentication Asterweg 19D HL Amsterdam The Netherlands 2011 Authasas t: +31 (0) f: +31 (0)

2 Introduction Implementing strong authentication technologies has become an increasingly common requirement for organizations of all sizes. The dissatisfaction with passwords, based on usability issues, security issues, or both, has led to the adoption of many popular strong authentication methods, including smart card authentication, biometric authentication, contactless (physical access badge) authentication, and others. Authasas Advanced Authentication was designed to meet strong authentication project requirements leveraging multiple authentication methods and by supporting virtually all major hardware authentication devices. However, as Authasas Advanced Authentication is based on a Microsoft Active Directory environment, customers running edirectory were previously incompatible with the solution. Further, a significant portion of the Novell install base is migrating their Netware or Windows-based edirectory systems over to SUSE Linux OS and OES2 (Open Enterprise Server v2). This open platform provides security and performance enhancements, but limits the capabilities of AD-integrated authentication solutions...at least until now. Authasas recently introduced integration with Novell Domain Services for Windows (DSfW), leveraging the strength of strong, multi-factor authentication provided by Advanced Authentication, while utilizing edir on SUSE as the authoritative directory and data repository.

3 Solution Overview For the purpose of this document, the reader is assumed to possess a fundamental understanding of the Novell edirectory, DSfW, OES2, and SUSE software. This solution overview and architectural descriptions will focus on the implementation of strong authentication methods using Authasas Advanced Authentication in Novell edirectory and mixed environments. Novell OES2 and DSfW Novell Open Enterprise Server (OES) is the successor product to Novell, Inc. s NetWare operating system, based on SUSE Linux Enterprise Server (SLES). Originally released in March 2005, the current (2011) release is OES 2 SP3. Novell Open Enterprise Server (OES) is best thought of as a platform for delivery of shared network services (file, print, directory, clustering, backup, storage management, PKI, web applications, etc.) and common management tools. Domain Services for Windows streamlines user and group management and simplifies infrastructure complexity in mixed environments. This innovative technology allows Microsoft Windows users to access OES services using native Windows and Active Directory protocols. By allowing edirectory servers running on Open Enterprise Server to behave as if they were Active Directory servers, this technology enables companies with both directory services deployments to achieve better coexistence between the two platforms. Users can work in a pure Windows desktop environment and still take advantage of some Open Enterprise Server back-end services and technology, without the need for a Novell Client on the desktop.

4 Authasas Advanced Authentication Authasas Advanced Authentication Enterprise Edition is a multi-factor authentication solution for Microsoft networks. The authentication framework provides the secure matching of authenticators and the storage and retrieval of user credentials within Active Directory, AD Lightweight Directory Services, and edirectory. User credentials, or authenticators, may consist of one or more types such as biometric fingerprint, contactless smartcard, contact smartcard, USB Flash driver, or Security Questions (Q&A). Authenticators are more secure than passwords, because they do not complicate logon procedure, but remove the password burden on users and enhance secure access to their information. Authasas Advanced Authentication is comprised of a server component, a directory component and a client component. The Authenticore Server component serves as an authentication server and policy management server. Optionally, the Authenticore Server may also serve as a log server to centrally collect client and server event logs. The directory component serves as a repository for user credentials and policies. Supported directories include MS Active Directory, AD LDS, and Novell edirectory. The client component is the primary user interface for user authentication and consists of a GINA or Credential Provider depending on the operating system deployed to. This client component does not rely on NMAS or any other Novell client software. Authasas Advanced Authentication may be deployed to dedicated or existing hardware infrastructure. Authasas Advanced Authentication is simple to deploy and manage, and offers a low total cost of ownership, requiring less than one full time employee to administer.

5 Solution Architecture Authasas Advanced Authentication leverages a three-tier architecture composing of a client, a server, and a datastore. Client computers, including desktops, laptops, and virtual machines provide the platform where the Advanced Authentication Client and supported hardware, hardware device drivers, and device middeleware (when required) are deployed. As mentioned, there is no requirement for NMAS or other Novell client software, as Authasas provides the replacement GINA or Credential Provider to support the strong authentication methods deployed to each system. If the Novell GINA is required or desired for certain functionality (i.e. ZenWorks) then GINA chaining is fully supported on the client. The user interacts with the client to authenticate to their Windows using a card, fingerprint, or other method. Additional strong authentication integration is provided with Novell SecureLogin in environments where single sign-on is deployed. The Authenticore Server validates the users Authasas credentials and provides authentication to the DSfW domain. The Authenticore Servers deployed to Windows Server 2003 or 2008 are joined to the DSfW domain as member servers providing authentication, policy enforcement, and central logging of authentication and credential management events. The DSfW server supports the domain and directory requirements for the Authasas infrastructure by allowing computer policy enforcement via GPO, and providing a platform to support Active Directory emulation of edir user objects, and allowing for the use of Authasas administrative tools that are built on the Microsoft Management Console platform. The edirectory server remains the only LDAP repository required for user objects, and is further leveraged by Authasas as the primary repository for all strong authentication data (such as biometric templates, card identifiers, etc.) and user-based policies. The edirectory schema may be extended to support storage of this data within new attributes, or existing (unused) attributes may be leveraged without requiring extension of the edir schema.

6 Architecture Diagram

7 Case Study Overview Authasas Advanced Authentication has been successfully deployed in the Novell edirectory infrastructure described within this document as a part of a CJIS (Criminal Justice Information Services) compliance project within a US law enforcement agency. Law enforcement agencies pose unique IT requirements, as resources are divided between internal systems and external systems that must be secured at every endpoint. These endpoints are further distributed among mobile-based users in remote command centers, as well as in law enforcement vehicles. Authasas Advanced Authentication provides the endpoint security and fulfils the strong authentication requirements outlined by CJIS. CJIS compliance projects are increasing with a strong focus on multi-factor authentication to network resources within all US law enforcement agencies requiring access to FBI data resources. State and local government agencies, including law enforcement continue to represent a significant portion of the Novell install base; and with heterogeneous networks and federal mandates to secure those networks, Novell and Authasas have formed a strategic alliance to deliver a CJIS compliant authentication solution. Conclusions Authasas Advanced Authentication has delivered a strong authentication solution to heterogeneous Novell edirectory environments by leveraging Directory Services for Windows and OES2. Organizations are able to provide their users with simple, strong authentication methods that replace the standard Windows password. All user and credential data is maintained in Novell edirectory, without the need to migrate to Active Directory or other proprietary LDAP or database. Authasas Advanced Authentication provides a secure GINA or Credential Provider without the requirement for NMAS or Novell Client. This unique solution enables compliance with CJIS, HIPAA Hitech and other security initiatives while enhancing end user experience and eliminating the cost and inconvenience of managing passwords.

8 Trademarks Microsoft, Active Directory, and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Authasas, Authasas Advanced Authentication are either registered trademarks or trademarks of Authasas in the United States, The Netherlands, and/or other countries. Novell, Novell Open Enterprise Server, NetWare, Domain Services for Windows, NMAS, and SUSE are registered trademarks or trademarks of Novell, Inc. in the United States and/or other countries Authasas. All rights Reserved

Lecture No 01 Novell Products Open Enterprise Server 2 Preview By Haim Malool. Main features Preview

Lecture No 01 Novell Products Open Enterprise Server 2 Preview By Haim Malool. Main features Preview Lecture No 01 Novell Products Open Enterprise Server 2 Preview By Haim Malool About Haim Malool Haim Malool is a Networking engineer and IT Consultant for more Than 15 years experience. He is a Ceritified

More information

Domain Services for Windows Administration Guide

Domain Services for Windows Administration Guide www.novell.com/documentation Domain Services for Windows Administration Guide Open Enterprise Server 11 SP1 August 28, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect

More information

Overview. Altus Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms

Overview. Altus Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms DigitalPersona Altus Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond two-factor and multi-factor

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

IQS Identity and Access Management

IQS Identity and Access Management IQS Identity and Access Management Identity Management Authentication Authorization Administration www.-center.com The next generation security solution 2003 RSA Security Conference IAM is a combination

More information

The Encryption Anywhere Data Protection Platform

The Encryption Anywhere Data Protection Platform The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

Novell File Reporter 2.5 Who Has What?

Novell File Reporter 2.5 Who Has What? Novell File Reporter 2.5 Who Has What? Richard Cabana Senior Systems Engineer File Access & Mgmt Solution Principal Attachmate Novell North America rcabana@novell.com Joe Marton Senior Systems Engineer

More information

McAfee Tokens. Endpoint Encryption and PKI

McAfee Tokens. Endpoint Encryption and PKI McAfee Tokens Endpoint Encryption and PKI 1 Endpoint Encryption and PKI Integration Endpoint Encryption PKI Connector and PKI Token Architecture Overview Endpoint Encryption uniquely amongst full-disk

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

Simplified enterprise printing: iprint connects all your organization's workstations and mobile devices to your current printers.

Simplified enterprise printing: iprint connects all your organization's workstations and mobile devices to your current printers. Micro Focus iprint Appliance March 2016 1 About This Document This document provides the basic instructions to deploy the Micro Focus iprint Appliance and how to start printing. Refer to the Micro Focus

More information

Domain Services for Windows Administration Guide

Domain Services for Windows Administration Guide www.novell.com/documentation Domain Services for Windows Administration Guide Open Enterprise Server 2015 August 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the

More information

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged

More information

Improving Interoperability and Reducing Cost in the Data Centre

Improving Interoperability and Reducing Cost in the Data Centre Improving Interoperability and Reducing Cost in the Data Centre INFRASTRUCTURE FOR MIXED-SOURCE IT ENVIRONMENTS MICROSOFT NOVELL ALLIANCE Michael Croney, Director, Strategic Partnerships, Microsoft (mikecro@microsoft.com)

More information

Server-based Password Synchronization: Managing Multiple Passwords

Server-based Password Synchronization: Managing Multiple Passwords Server-based Password Synchronization: Managing Multiple Passwords Self-service Password Reset Layer v.3.2-004 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax:

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Domain Services for Windows Update and Best Practices

Domain Services for Windows Update and Best Practices Domain Services for Windows Update and Best Practices David Shepherd Senior Technical Specialist dshepherd@novell.com Ravi CR Engineering Manager rravi@novell.com Praveen Kumar Sahukar Architect psahukar@novell.com

More information

Xerox DocuShare Private Cloud Service. Security White Paper

Xerox DocuShare Private Cloud Service. Security White Paper Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features Windows Services Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features File and print services Integrated Samba 3 for native SMB/CIFS protocol support

More information

Smartcard Integration

Smartcard Integration TECHNICAL PAPER Smartcard Integration Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data between two or more computers over the

More information

Citrix XenDesktop Backups with Xen & Now by SEP

Citrix XenDesktop Backups with Xen & Now by SEP Citrix XenDesktop Backups with Xen & Now by SEP WWW.SEPUSA.COM Table of Contents INTRODUCTIONANDOVERVIEW...3 CITRIXXENDESKTOPENVIRONMENT...4 CITRIXDESKTOPDELIVERYCONTROLLERBACKUP...5 CITRIXLICENSESERVERBACKUP...5

More information

Endpoint Virtualization. Workspace Management: Simplify IT Organizations. Data Sheet Symantec TM Workspace Streaming 6.1

Endpoint Virtualization. Workspace Management: Simplify IT Organizations. Data Sheet Symantec TM Workspace Streaming 6.1 Data Sheet Symantec TM Workspace Streaming 6.1 Workspace Management: Simplify IT Organizations Overview As IT organizations today face the reality of managing an increasingly complex mix of desktops, laptops,

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER OVERVIEW OF OPEN VIRTUAL DESKTOP Mathieu SCHIRES Version: 1.0.2 Published April 9, 2015 http://www.inuvika.com Contents 1 Introduction 2 2 Terminology and

More information

Citrix XenServer Backups with Xen & Now by SEP

Citrix XenServer Backups with Xen & Now by SEP Citrix Backups with Xen & Now by SEP info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW... 3 CITRIX XENDESKTOP ENVIRONMENT... 4 CITRIX DESKTOP DELIVERY CONTROLLER BACKUP... 5 CITRIX

More information

Directory-enabled Lights-Out Management

Directory-enabled Lights-Out Management Directory-enabled Lights-Out Management white paper Abstract... 2 Remote management products... 2 Business needs... 3 Customer environment... 3 Benefits... 3 Directory architecture... 4 Overview... 4 Objects...

More information

Technical Specification Data 1

Technical Specification Data 1 Equitrac Office 5.1 Software Suite Equitrac Office Software Suite Equitrac Office Suite Equitrac Office Small Business Edition (SBE) Applications Any size network with single or multiple accounting and/or

More information

NetIQ Advanced Authentication Framework. Maintenance Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. Maintenance Guide. Version 5.1.0 NetIQ Advanced Authentication Framework Maintenance Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Purposes of Maintenance 3 Difficulties of Maintenance

More information

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on

More information

Citrix and Terminal Services Guide SecureLogin 8.1

Citrix and Terminal Services Guide SecureLogin 8.1 Citrix and Terminal Services Guide SecureLogin 8.1 September, 2015 www.netiq.com/documentation Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn.

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and

More information

etoken TMS (Token Management System) Frequently Asked Questions

etoken TMS (Token Management System) Frequently Asked Questions etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution

More information

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified.

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified. Advanced Authentication Methods Determining the Best Fit for Your Agency Strong Authentication. Simplified. Agenda About 2FA CJIS Security Policy 5.1 Advanced Authentication Encryption, Secure Connectivity

More information

Introducing ZENworks 11 SP4. Experience Added Value and Improved Capabilities. Article. Article Reprint. www.novell.com. Endpoint Management

Introducing ZENworks 11 SP4. Experience Added Value and Improved Capabilities. Article. Article Reprint. www.novell.com. Endpoint Management Introducing ZENworks 11 SP4 Experience Added Value and Improved Capabilities Article Article Reprint Endpoint Management Endpoint Management Article Introducing ZENworks 11 SP4 Addressing Key Usability

More information

How the Quest One Identity Solution Products Enhance Each Other

How the Quest One Identity Solution Products Enhance Each Other Better Together How the Quest One Identity Solution Products Enhance Each Other Written by Quest Software, Inc. Business Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary

More information

NetIQ Advanced Authentication Framework. System Requirements. Version 5.1.0

NetIQ Advanced Authentication Framework. System Requirements. Version 5.1.0 NetIQ Advanced Authentication Framework System Requirements Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Infrastructure 4 Communication Channel Throughput

More information

Citrix XenServer & XenDesktop Backups with Xen & Now by SEP

Citrix XenServer & XenDesktop Backups with Xen & Now by SEP Citrix & XenDesktop Backups with Xen & Now by SEP info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW... 3 CITRIX XENSERVER BACKUP METHODS... 4 OFFLINE BACKUP... 4 ONLINE LIVE MEMORY

More information

Provide access control with innovative solutions from IBM.

Provide access control with innovative solutions from IBM. Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business

More information

Directory Integration in LANDesk Management Suite

Directory Integration in LANDesk Management Suite Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer

More information

Domain Services for Windows Administration Guide

Domain Services for Windows Administration Guide www.novell.com/documentation Domain Services for Windows Administration Guide Open Enterprise Server 11 SP2 January 2014 Legal Notices Novell, Inc. makes no representations or warranties with respect to

More information

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Updating Your Windows Server 2003 Technology Skills to MS6416: 5 Days Course Overview This five-day instructor-led course teaches the features and technologies of and R2 to IT professionals who have specialist

More information

NetIQ Advanced Authentication Framework. Security and Encryption Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. Security and Encryption Guide. Version 5.1.0 NetIQ Advanced Authentication Framework Security and Encryption Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Architecture 4 Components 5 Authentication

More information

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper THE COMPLETE VIEWER FOR MS PROJECT Seavus DOOEL 2010 2 TABLE OF CONTENTS 1 DEPLOYMENT OPTIONS... 3 1.1 SINGLE USER INSTALLATION... 3 1.2 CONCURRENT USER INSTALLATION... 4 1.3 SINGLE COMPANY KEY INSTALLATION...

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Skills to 2008 About this Course This five-day instructor-led course teaches the features and technologies of 2008 and 2008 R2 to IT professionals who have specialist skills in working with 2003 technologies.

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Introduction to Endpoint Security

Introduction to Endpoint Security Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user

More information

NOVELL ZENWORKS 10 CONFIGURATION MANAGEMENT SP3

NOVELL ZENWORKS 10 CONFIGURATION MANAGEMENT SP3 You can read the recommendations in the user, the technical or the installation for NOVELL ZENWORKS 10 CONFIGURATION MANAGEMENT SP3. You'll find the answers to all your questions on the NOVELL ZENWORKS

More information

OPEN-XCHANGE. Open-Xchange and SUSE Linux Enterprise 10 Whitepaper

OPEN-XCHANGE. Open-Xchange and SUSE Linux Enterprise 10 Whitepaper OPEN-XCHANGE Open-Xchange and SUSE Linux Enterprise 10 Whitepaper OPEN-XCHANGE: Open-Xchange and SUSE Linux Enterprise 10 Whitepaper Published 16th January Author: Stephan Dühr, dass IT GmbH 1. Introduction

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Symantec Workspace Streaming 6.1

Symantec Workspace Streaming 6.1 Workspace Management: Simplify IT Organizations Data Sheet: Endpoint Virtualization Overview As IT organizations today face the reality of managing an increasingly complex mix of desktops, laptops, and

More information

T21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates

T21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates T21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates Microsoft Windows Server and Client Security Windows 7, Vista and Server 2008 R2 Donald E. Hester CISSP, CISA, CAP, MCT,

More information

Technical Specification Data 1

Technical Specification Data 1 Equitrac Express 5.1 Software Suite Equitrac Express Software Suite Equitrac Express Suite Equitrac Express Small Campus Edition (SCE) Applications Any size network with single or multiple accounting and/or

More information

An Oracle White Paper Sep 2009. Buyer s Guide for Enterprise Single Sign On

An Oracle White Paper Sep 2009. Buyer s Guide for Enterprise Single Sign On An Oracle White Paper Sep 2009 Buyer s Guide for Enterprise Single Sign On Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

Visualization Software Company Extends Windows-based Security Model and Management Tools to Linux Systems

Visualization Software Company Extends Windows-based Security Model and Management Tools to Linux Systems Microsoft Windows Server 2003 Customer Solution Case Study Visualization Software Company Extends Windows-based Security Model and Management Tools to Linux Systems Overview Country or Region: United States

More information

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006 Single Sign-On Security and comfort can be friend. Arnd Langguth alangguth@novell.com September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?

More information

What s New on the NetWare Kernel of Novell Open Enterprise Server

What s New on the NetWare Kernel of Novell Open Enterprise Server What s New on the NetWare Kernel of Novell Open Enterprise Server www.novell.com DECEMBER 2004 2 For more than 20 years, Novell has provided reliable, enterprise-class networking services through the awardwinning

More information

Citrix Password Manager 4.1

Citrix Password Manager 4.1 F E A T U R E S O V E R V I E W Password Manager 4.1 The access platform provides on-demand access to information, and Password Manager makes that information available with a single logon. Password Manager

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016

Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016 Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016 The World s Changed What is my account balance? The World s Changed Internal Security Standards

More information

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE

More information

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide Note Before using this

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Building Your Complete Remote Access Infrastructure on Windows Server 2012

Building Your Complete Remote Access Infrastructure on Windows Server 2012 Building Your Complete Remote Access nappliance White Paper August 2012 Introduction Remote access is a complex challenge for IT administrators. Providing system access to remote users involves a broad

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust

More information

Mod 2: User Management

Mod 2: User Management Office 365 for SMB Jump Start Mod 2: User Management Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall CEO & SMB Technologist District Computers 1 Jump Start Schedule

More information

Extending Identity and Access Management

Extending Identity and Access Management Extending Identity and Access Management Michael Quirin Sales Engineer Citrix Systems 1 2006 Citrix Systems, Inc. All rights reserved. Company Overview Leader in Access Infrastructure NASDAQ 100 and S&P

More information

solutions Biometrics integration

solutions Biometrics integration Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability

More information

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology 20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business

More information

MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Description This five-day instructor-led course teaches the features and technologies of Windows Server 2008 and Windows

More information

For Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery.

For Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery. Investment and Governance Division 614.995.9928 tel Ted Strickland, Governor 30 East Broad Street, 39 th Floor 614.644.9152 fax R. Steve Edmonson, Director / State Chief Information Officer Columbus, Ohio

More information

and the software then detects and automates all password-related events for the employee, including:

and the software then detects and automates all password-related events for the employee, including: Reduce costs, simplify access and audit access to applications with single sign-on IBM Single Sign-On Highlights Reduce password-related helpdesk Facilitate compliance with pri- costs by lowering the vacy

More information

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

PROTECT YOUR WORLD. Identity Management Solutions and Services

PROTECT YOUR WORLD. Identity Management Solutions and Services PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and

More information

Novell Access Manager SSL Virtual Private Network

Novell Access Manager SSL Virtual Private Network White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

Unified Device Management Allows Centralized Governance of Corporate Network Devices

Unified Device Management Allows Centralized Governance of Corporate Network Devices Unified Device Management Allows Centralized Governance of Corporate Network Devices Published July 2013 The recent bring your own device trend that allows employees to use devices they own for business

More information

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on

More information

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

Introducing ZENworks 11 SP4

Introducing ZENworks 11 SP4 Introducing ZENworks 11 SP4 Experience Added Value and Improved Capabilities Article Reprint ZENworks Article Reprint Introducing ZENworks 11 SP4 Addressing Key Usability and Supportability Issues Micro

More information

Oracle Identity Manager, Oracle Internet Directory

Oracle Identity Manager, Oracle Internet Directory Oracle Identity Manager (OIM) is a user provisioning system. It defines properties for how users and groups get authorized to access compute and content resources across the enterprise. Identity Management

More information

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware. VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.com) Copyright 2008 EMC Corporation. All rights reserved. Agenda

More information

Simplifying Desktop Mgmt With Novell ZENworks

Simplifying Desktop Mgmt With Novell ZENworks Simplifying Desktop Mgmt With Novell ZENworks Joe Marton Senior Systems Engineer Collaboration Solution Principal Novell North America jmarton@novell.com Ryan Radschlag Network Manager Hartford Joint #1

More information

MS 20533B - Implementing Microsoft Azure Infrastructure Solutions

MS 20533B - Implementing Microsoft Azure Infrastructure Solutions MS 20533B - Implementing Microsoft Azure Infrastructure Solutions COURSE OVERVIEW: This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure. The course

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Exam : VCAW510 Title : VMware Certified Associate - Workforce Mobility (VCA-WM) Version : V8.02 1.How are fully provisioned desktops created

More information

Course 6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Course 6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Course 6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course

More information

Authentication: Password Madness

Authentication: Password Madness Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the

More information

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features Windows Services Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features File and print services Integrated Samba 3 for native SMB/CIFS protocol support

More information

Navigating Endpoint Encryption Technologies

Navigating Endpoint Encryption Technologies Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS

More information

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Enhancing Organizational Security Through the Use of Virtual Smart Cards Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company

More information

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information

More information

Copyright Giritech A/S. Secure Mobile Access

Copyright Giritech A/S. Secure Mobile Access Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary

More information

Red Hat Enterprise ipa

Red Hat Enterprise ipa Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users

More information

MS-6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

MS-6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 MS-6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 This five-day instructor-led course teaches the features and technologies of Windows Server 2008

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

Administration Guide. SecureLogin 8.0. October, 2013

Administration Guide. SecureLogin 8.0. October, 2013 Administration Guide SecureLogin 8.0 October, 2013 Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN

More information