How To Manage A Plethora Of Identities In A Cloud System (Saas)

Size: px
Start display at page:

Download "How To Manage A Plethora Of Identities In A Cloud System (Saas)"

Transcription

1 TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities that Cloud Computing brings to our industries. The concepts in this Intel white paper, follow and bring new detail to the recommended best practices being established by the Cloud Security Alliance. Abstract This paper is designed for evaluators and administrators of Intel Cloud SSO as a preread prior to trial of the solution. It provides background on the cloud Identity as a Service (IDaaS) usage model & benefits. The paper also describes solution architecture, deployment models, and configuration capabilities for SSO, strong authentication, and integration options with on-prem identity infrastructure. Jim Reavis Executive Director Cloud Security Alliance

2 Intel Cloud SSO Technical White Paper Table of Contents The Cloud Identity Challenge The SSO Solution How Do I Get Intel Cloud SSO? User Management Authentication into Intel Cloud SSO Setting Up Connections with Target Apps How Is SSO Performed With Target Apps? How Is Context-aware Strong Authentication Performed? How Is User Account Provisioning/de-provisioning Performed? How Does Intel Cloud SSO Integrate With Corporate Directories? How Does Intel Cloud SSO Store and Secure Customer Data? Summary Challenge: Increase end-user convenience & productivity. Eliminate the security & cost burdens of using passwords. Ensure that only authorized users have access to sensitive cloud apps. Solution: Cloud-based single sign-on provides users with rapid access without passwords. 2-factor strong authentication reliably verifies user identities. Automated provisioning/de-provisioning enables the enterprise to efficiently manage end-user identities. The Cloud Identity Challenge Today, large and midsize enterprises are using an average of 10 or more softwareas-a-service (SaaS) applications. This strategy of outsourcing formerly internal IT functions to the cloud brings the following challenges to the IT department and end-users. Too Many Credentials: The proliferation of SaaS solutions within the enterprise leads, inexorably, to a plethora of identities and creates a unique operational challenge: how to efficiently manage all the identities that users require one for each cloud application they access. Dormant and Orphan Accounts: As new users join the company, they need cloud accounts which are synchronized with their internal identities. Similarly, as their roles change or when they leave, their accounts need to be appropriately updated or automatically terminated. Leaving orphan accounts active risks potential security breaches and data leaks and creates extraneous costs for unused licenses. BYOD Devices in the Enterprise: The cloud is unique in that it allows an organization to provide its users with anytime, anywhere access, from any device. Users increasingly insist on using their own devices (mobile phones, ipad* tablets, etc.), compelling many organization to adopt a BYOD (bring-your-own-device) policy. BYOD has the advantage of reducing some costs, however, the organization must address how to control and monitor access from only certified, secure mobile devices. User Experience & Productivity: As more and more applications become part of the enterprise portfolio, users desire a single sign-on (SSO) entry point into all their applications eliminating the need to remember multiple user ID/password combinations. When people must remember different credentials for different apps, some will invariably resort to using the same password across all the apps, or use weak passwords that can be easily remembered and broken. Secure Multi-factor Authentication: Another consideration, which is particularly relevant to cloud-based applications, is the need to invoke strong, out-of-band authentication for certain use cases. In particular circumstances, users should be challenged to authenticate themselves with more than a user ID and password. For example, users who are located outside the firewall, who are contractors or other temporary hires, who belong to a particular group, or who use a particularly sensitive app, would all be candidates for multi-factor authentication (MFA). 2

3 Intel Cloud SSO Technical White Paper The SSO Solution Intel Cloud SSO is an on-demand hosted Identity as-a-service (IDaaS) offering from Intel that enables enterprise users to securely authenticate and enjoy seamless single sign-on (SSO) into hundreds of SaaS applications. The system is designed to make it easy for both the IT admin and the end-user to use. The IT admin logs into the Intel Cloud SSO management console, using a browser, to configure the system in three easy steps: Set up connections to business applications the company is using Assign users or groups of users to these applications Define when and where to apply context-aware access restrictions, such as MFA. Once a user profile is configured, the user logs into Intel Cloud SSO at www. intelcloudsso.com, and sees a personalized portal page listing all the SaaS applications the IT admin had assigned to that user. To access the application using SSO, the user simply clicks on the application icon, which is launched in a separate browser window. Once the user is initially authenticated to the SSO portal, they never see another user ID/password prompt again. Now, let s take a more detailed look into Intel Cloud SSO works. How Do I Get Intel Cloud SSO? To start, you can obtain a free 30-day trial account of Intel Cloud SSO. During this period, you can test the application with a limited number of user seats, using the SaaS application connectors in the Intel Cloud SSO catalog 1. You can convert your trial license to a full Intel Cloud SSO subscription at any time during the trial. There are two ways to sign up for your free trial account: Directly on the Intel Cloud SSO website ( Visit Salesforce AppExchange ( and search for Intel Cloud SSO. Intel Cloud SSO is available in two different modes: Standalone mode or Shared mode. (see Table 1 below) Regardless of which mode you choose, after completing the trial order form on the site you choose, you will receive an from Intel with your login credentials and a link to a Quick Start Guide. To purchase an Intel Cloud SSO license, click the Request Quote link on the Intel Cloud SSO home page and complete the request quote form. Table 1 MODE Standalone mode Shared mode DESCRIPTION Intel Cloud SSO runs independently and doesn t share the user database with any other Force.com-enabled application. You can receive Intel Cloud SSO standalone through EITHER the website or AppExchange. Intel Cloud SSO shares the user database with an existing Salesforce.com application (such as Salesforce CRM). In shared mode, Intel Cloud SSO is installed on the same Salesforce organization (Org ID) as your Salesforce application. This option is for existing Salesforce customers who would like to provide SSO to their Salesforce users. You can ONLY receive an Intel Cloud SSO shared mode account through AppExchange. Note: You must provide your Salesforce Org ID to take advantage of this option. 1 Intel Cloud SSO runs on Force.com and includes an embedded Force.com platform license. It does NOT include any Salesforce.com CRM or other target SaaS application licenses. If you do not have existing accounts on your target SaaS applications, you should contact the vendor directly to obtain the appropriate license. 3

4 Intel Cloud SSO Technical White Paper Intel s cloud access broker strategy as well as roadmap integration of McAfee security functionality, makes for a compelling vision. Steve Coplan, 451 Research User Management Intel Cloud SSO allows you, or an authorized administrator, to: Create/modify/delete user accounts Change/reset user passwords Assign users to Intel Cloud SSO groups Create/modify/delete User Accounts Intel Cloud SSO administrators can create accounts for new users by logging onto the service, and navigating to Name > Setup > Manage Users. This interface is powered by the Force.com platform, which is incorporated within the Intel Cloud SSO application. Ensure that you select the proper profile while creating users 2. Intel Cloud SSO works with users that belong to either of the following profiles only: (see Table 2 below) Change/reset Password Intel Cloud SSO leverages Force.com for password management of its users. End users can change their password from either: Login page by clicking on the Forgot Password link After login, navigate to Name > Setup > My Personal Information > Change My Password. The Administrator can reset a password for any end user by navigating to Name > Setup > Manage Users> Users Note: If you are integrating Intel Cloud SSO with a corporate directory (such as Active Directory), using the Identity Bridge, the password isn t stored in Table 2 INTEL CLOUD SSO PROFILE Super Admin SSO Admin SSO User DESCRIPTION Access to all Intel Cloud SSO features and Force.com platform settings. The initial user login account you receive with Intel Cloud SSO account has these privileges. Typically, you need only one user with this profile. Access to all Intel Cloud SSO features, but restricted access to Force.com settings. This may be useful when you want separate Intel Cloud SSO administrators for each business unit within a large enterprise. Access to only the end-user facing MyApps tab of Intel Cloud SSO. 2 If you want to integrate and synchronize Intel Cloud SSO accounts with a corporate directory (such as Active Directory or any LDAP directory), then don t use the above interface to create/modify/delete user identities. Instead, you can use the Intel Cloud SSO Identity Bridge to automatically manage and synchronize user accounts with AD. Refer to the section in this document on Integrating with corporate directories. 4

5 Intel Cloud SSO Technical White Paper Intel Cloud SSO. Instead, you change the password in the corporate directory using its interface. Assign User to Intel Cloud SSO Groups Intel Cloud SSO includes the ability to manage users within a group. Administrators can navigate to the Users/Groups tab, create a new group, and assign users to the group through either of the following mechanisms: Static group membership - select users individually, and assign them to the group Dynamic group membership - use an attribute of the user profile to dynamically assign all users having that attribute value to the group. If you use the Intel Cloud SSO Identity Bridge to provision users you can automatically assign them to a target Intel Cloud SSO group (such as Sales ), based on AD groups the user belongs to. Intel Cloud SSO can the automatically provision users in a specific group to one or more apps, depending on how you configure groups and apps. Authentication into Intel Cloud SSO Intel Cloud SSO leverages the Force.com login mechanism to authenticate users. Administrators can set up one of the following mechanisms for users to login into the SSO portal: (see Table 3 below) Note that administrators can optionally set up 2-factor authentication using the built-in Intel Cloud SSO One Time Password (OTP) feature for strong authentication. For example, require OTP when users log onto the Intel Cloud SSO portal from outside the firewall. Table 3 AUTHENTICATION METHOD Local Remote 3rd party Identity Provider DESCRIPTION Enter a username/password into a login form presented by Intel Cloud SSO and authenticate locally. Use the Intel Cloud SSO Identity Bridge to authenticate the user against a corporate directory. Remote authentication can take two forms: 1. Users log onto Intel Cloud SSO, enter their AD user ID/password and are authenticated by the Bridge. 2. Users log onto Windows and are authenticated by their local AD. They can then SSO directly into the Intel Cloud SSO portal without re-authenticating. Federate with an external Identity provider (IP), using the industry-standard SAML protocol to redirect the logon request to the IP for authentication. This is how authentication using Salesforce.com IDs is accomplished. 5

6 Intel Cloud SSO Technical White Paper Figure 1 Configure App to set up connectivity with application Figure 3 Configure any restrictions for accessing the application Figure 2 Assign users or group of users that can access the application Setting Up Connections with Target Apps Intel Cloud SSO customers get unlimited SaaS application and provisioning connectors at no additional cost. To configure connections to target apps the IT admin log onto Intel Cloud SSO, navigates to the Admin tab, and clicks the New Application link. From here the admin can search or browse the catalog of supported applications. After selecting an application, they go through a simple 3-step process to configure the application connector. 1. Configure the app to set up connectivity 2. Assign users or group of users that can access the application 3. Configure any restrictions for accessing the application There are two types of connectors available to be configured for an app. SSO connector - mandatory Provisioning connector optional, and only available for applications that support a provisioning interface. As we see in Figure 2, users can be assigned to an application either as an individual, or as a member of a particular group. In the third step (see Fig. 3) you configure context-aware strong authentication, such as 2-factor authentication or restricting access based on contextual attributes such as: type of client device used to access, IP address range or other factors. This can be used to selectively restrict access from mobile devices for BYOD scenarios. 6

7 Intel Cloud SSO Technical White Paper How Is SSO Performed With Target Apps? Intel Cloud SSO supports 3 models of single sign-on (SSO) to target apps: Standards-based federated SSO Native federated SSO Form-based auto-login Where target applications (such as Salesforce.com, Google Apps, Box, etc.) support federated login using standards such as SAML, Intel Cloud SSO uses it for SSO into such applications. SAML tokens are used in place of passwords, which enhances security. However, not all SaaS applications support standards, such as SAML, today. There are a few SaaS applications which support proprietary mechanisms (such as using common shared secrets) to SSO into them. For these types of applications, Intel Cloud SSO has built native connectors. Finally, there are many other SaaS applications that do not support either of the above two mechanisms. For such SaaS applications, Intel Cloud SSO provides form-based authentication. In this scenario, Intel Cloud SSO asks the user for their credentials during the first access to the application. It stores the credentials in a secure credential database. Thereafter, Intel Cloud SSO automatically uses the credentials to log the user onto the application, using HTTP POST. Credentials are stored in the credential database in encrypted format using the AES-256 algorithm (which is the strongest encryption algorithm available). How Is Context-aware Strong Authentication Performed? Before a SSO login session to a target application is created by Intel Cloud SSO, it performs an additional check for contextual attributes, the result of which can: Block the login from accessing the target application Trigger step-up authentication using a one-time password (OTP) Contextual attributes that can be checked include (with more planned to be added in future versions) Type of mobile device such as ios, Android, Blackberry, Windows Mobile, etc. Client IP address range Day of week/time of day This feature can be useful for companies adopting BYOD or wanting to enforce 2-factor authentication using OTP for certain use cases. How Is User Account Provisioning/ de-provisioning Performed? Most major SaaS vendors, such as Salesforce.com, provide an API for provisioning and de-provisioning. Where target applications support APIs to create/ modify/delete user accounts, Intel Cloud SSO leverages those APIs to provision and de-provision the users automatically into the target application when users are assigned or de-assigned an application using the Intel Cloud SSO admin console. Figure 4 Intel Identity Bridge How Does Intel Cloud SSO Integrate With Corporate Directories? Intel Cloud SSO can use its own independent identity repository or leverage existing identity repositories an organization may have, such as Active Directory* or any LDAP-enabled directory. Customers can install a lightweight, optional component called the Intel Cloud SSO Identity Bridge on an on-premise domain server that communicates with the corporate directory on one end and Intel Cloud SSO on the other end. The Identity Bridge performs the following functions: Intel Cloud SSO user authentication using the corporate directory, with optional 2nd factor authentication using OTP. Automated user provisioning/de-provisioning from the corporate directory into SaaS apps through Intel Cloud SSO. For user authentication, the Identity Bridge can be configured to support either: Authentication of users logging into the Intel Cloud SSO portal in the cloud. User credentials can be validated by AD, without any requirement for the user to employ a VPN. Authentication from the Windows domain into Intel Cloud SSO using Integrated Windows Authentication (IWA). Once the user is authenticated by Windows, they can SSO directly into Intel Cloud SSO. For provisioning, the Bridge can automatically detect AD updates (add/change/ delete) that trigger the appropriate action (provision/update/de-provision) in Intel Cloud SSO. The Bridge supports AD Groups, which work in conjunction with the app configuration (see above) to automatically create accounts in SaaS target apps. For example, the system can detect that a new user profile in AD is in the Sales group, which will: a) create a new user profile in Intel Cloud SSO, and b) provision the user with a Salesforce.com account (or any other apps that are linked to Sales).

8 Intel Cloud SSO Technical White Paper Deployment of the Identity Bridge doesn t require any firewall changes, because it initiates a secure SSL connection from the enterprise to the Intel Cloud SSO server, rather than Intel Cloud SSO initiating a connection from outside the firewall into the enterprise. How Does Intel Cloud SSO Store and Secure Customer Data? Intel Cloud SSO stores the following types of data for each customer. User identities Connector configuration Audit logs Runtime metrics User credentials for form-based SSO connectors Intel Cloud SSO is a multi-tenant system and each customer s data is strictly isolated from other customer s data. User credentials are stored encrypted using AES-256 encryption algorithm. For additional details about the Intel Cloud SSO security architecture, refer to the white paper Intel Cloud SSO - Platform Security. Summary Intel Cloud SSO is an on-demand hosted identity as a service (IDaaS) solution from three trusted providers Intel, McAfee and Salesforce.com. It offers a complete identity and access management solution for enterprises that are outsourcing IT operations and applications to the cloud. Intel Cloud SSO enables application users to authenticate securely and conveniently access hundreds of SaaS applications through single sign-on (SSO). The built-in personalized portal provides users with a convenient launch pad with quick one-click access to all authorized SaaS business applications. SSO delivers three major benefits: It enhances end-user productivity and convenience, since it eliminates the need for them to remember and manage all their passwords. It reduces IT administrative effort by significantly reducing password reset calls. It improves security by controlling access to the target apps. Many organizations are understandably concerned about cloud security. Intel Cloud SSO addresses these concerns with context-aware strong authentication. Outof-band authentication using a one-time password (OTP) can be used to verify the user s identity via a mobile device, such as a cell phone or smart phone. Contextaware authentication also includes a mechanism for IT to enforce access restrictions based on IP address, type of mobile device, and other parameters. Customers can chose to store their user identities in the cloud or synchronize SaaS application identities with identities stored in on-premise directories (such as Active Directory), using a lightweight agent called an Identity Bridge. The Bridge is firewall-friendly, easy to set up, can be configured in minutes, and supports both authentication and automatic provisioning/de-provisioning, providing IT administrators with a single point of control for all user identities and attributes. For more information about Intel Cloud SSO. and to apply for you FREE 30 day trial, visit More Information and Partner Program Details Intel Cloud SSO: intelcloudsso.com Intel Application Security and Identity Products: cloudsecurity.intel.com Contact us by phone: Phone: asipcustomercare@intel.com Contact us by asipcustomercare@intel.com INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined. Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling , or by visiting Intel s Web site at Copyright 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, and Xeon are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. Printed in USA Please Recycle Intel Cloud SSO Technical Works White Paper 0512

Identity in the Cloud

Identity in the Cloud White Paper Identity in the Cloud Use the cloud without compromising enterprise security Table of Contents The Cloud Conundrum 3 Managing Cloud Identity 3 The Identity Lifecycle 4 SaaS Single Sign-On 4

More information

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

White Paper. McAfee Cloud Single Sign On Reviewer s Guide White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

An Overview of Samsung KNOX Active Directory-based Single Sign-On

An Overview of Samsung KNOX Active Directory-based Single Sign-On C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Service Updates and Enhancements

Service Updates and Enhancements Service Updates and Enhancements May 8, 2013 McAfee understands that providing the tools for a trusted communication environment is our primary directive. Accomplishing this goal requires listening to

More information

Automating User Management and Single Sign-on for Salesforce.com OKTA WHITE PAPER. Okta Inc. 400 2nd Street Suite 350 San Francisco CA, 94107

Automating User Management and Single Sign-on for Salesforce.com OKTA WHITE PAPER. Okta Inc. 400 2nd Street Suite 350 San Francisco CA, 94107 OKTA WHITE PAPER Automating User Management and Single Sign-on for Salesforce.com Okta Inc. 400 2nd Street Suite 350 San Francisco CA, 94107 info@okta.com 1-888-722-7871 Table of Contents 1 The Growth

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 OKTA WHITE PAPER Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-3waysad-113012 Table

More information

Intel Identity Protection Technology (IPT)

Intel Identity Protection Technology (IPT) Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright

More information

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta. Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

with PKI Use Case Guide

with PKI Use Case Guide Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION

More information

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services 1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

How To Use Salesforce Identity Features

How To Use Salesforce Identity Features Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

Intel HTML5 Development Environment. Article - Native Application Facebook* Integration

Intel HTML5 Development Environment. Article - Native Application Facebook* Integration Intel HTML5 Development Environment Article - Native Application Facebook* Integration V3.06 : 07.16.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO

More information

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013 White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

White paper Contents

White paper Contents Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Management Challenges of Software

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

DIGIPASS as a Service. Google Apps Integration

DIGIPASS as a Service. Google Apps Integration DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

Intel Internet of Things (IoT) Developer Kit

Intel Internet of Things (IoT) Developer Kit Intel Internet of Things (IoT) Developer Kit IoT Cloud-Based Analytics User Guide September 2014 IoT Cloud-Based Analytics User Guide Introduction Table of Contents 1.0 Introduction... 4 1.1. Revision

More information

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1 PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity

More information

The Who, What, When, Where and Why of IAM Bob Bentley

The Who, What, When, Where and Why of IAM Bob Bentley The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Configuring Salesforce

Configuring Salesforce Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems WHITE PAPER Intel vpro Technology Embedded Host-based Configuration in Intelligent Systems Easy activation of Intel vpro technology remote manageability without trade-offs in security, functionality, and

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 Okta White paper Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-dint-053013 Table of Contents

More information

Identity Implementation Guide

Identity Implementation Guide Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com

More information

Cloud Identity Buyer s Guide

Cloud Identity Buyer s Guide WHITE PAPER Cloud Identity Buyer s Guide Identity & Access Management In the Cloud Paper Focus: Outsourcing identity and access management to the cloud IAM for SaaS apps tradeoffs and concerns Implementation,

More information

How To Reduce Pci Dss Scope

How To Reduce Pci Dss Scope WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS

More information

Cloud Authentication. Getting Started Guide. Version 2.1.0.06

Cloud Authentication. Getting Started Guide. Version 2.1.0.06 Cloud Authentication Getting Started Guide Version 2.1.0.06 ii Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning

More information

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce. Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

Pick Your Identity Bridge

Pick Your Identity Bridge Pick Your Identity Bridge Options for connecting users and resources across the hybrid cloud Executive Overview Enterprises are increasing their use of software as a service (SaaS) for two principal reasons:

More information

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment WHITEPAPER How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment www.onelogin.com 150 Spear Street, Suite 1400, San Francisco, CA 94105 855.426.7272 EXECUTIVE SUMMARY

More information

Extend and Enhance AD FS

Extend and Enhance AD FS Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

Intel HTML5 Development Environment Article Using the App Dev Center

Intel HTML5 Development Environment Article Using the App Dev Center Intel HTML5 Development Environment Article Using the App Dev Center v1.06 : 06.04.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Connecting Users with Identity as a Service

Connecting Users with Identity as a Service Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Managing users. Account sources. Chapter 1

Managing users. Account sources. Chapter 1 Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

Stop Password Sprawl with SaaS Single Sign-On via Active Directory

Stop Password Sprawl with SaaS Single Sign-On via Active Directory CENTRIFY WHITE PAPER Stop Password Sprawl with SaaS Single Sign-On via Active Directory Abstract Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional

More information

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Red Hat* Cloud Foundations Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Red Hat* Cloud Foundations

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

Intel Media SDK Library Distribution and Dispatching Process

Intel Media SDK Library Distribution and Dispatching Process Intel Media SDK Library Distribution and Dispatching Process Overview Dispatching Procedure Software Libraries Platform-Specific Libraries Legal Information Overview This document describes the Intel Media

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History

More information

Increase the Security of Your Box Account With Single Sign-On

Increase the Security of Your Box Account With Single Sign-On A Box White Paper Increase the Security of Your Box Account With Single Sign-On Box s high level of security, 24x7 support and 99.9% uptime are critical for us. The biggest benefits are the reliability

More information

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents

More information

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...

More information

Adding Stronger Authentication to your Portal and Cloud Apps

Adding Stronger Authentication to your Portal and Cloud Apps SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

Deploying RSA ClearTrust with the FirePass controller

Deploying RSA ClearTrust with the FirePass controller Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you

More information

Enterprise Self Service Quick start Guide

Enterprise Self Service Quick start Guide Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.

More information

Okta/Dropbox Active Directory Integration Guide

Okta/Dropbox Active Directory Integration Guide Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for

More information

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

The Cloud, Mobile and BYOD Security Opportunity with SurePassID The Cloud, Mobile and BYOD Security Opportunity with SurePassID Presentation for MSPs and MSSPs January 2014 SurePassID At A Glance Founded 2009 Headquartered in Orlando, FL 6 sales offices in North America,

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Identity. Provide. ...to Office 365 & Beyond

Identity. Provide. ...to Office 365 & Beyond Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A

More information

SAML Authentication Quick Start Guide

SAML Authentication Quick Start Guide SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Security whitepaper. CloudAnywhere. http://www.cloudiway.com

Security whitepaper. CloudAnywhere. http://www.cloudiway.com Security whitepaper CloudAnywhere http://www.cloudiway.com @Copyright 2011 CLOUDIWAY. All right reserved. Use of any CLOUDIWAY solution is governed by the license agreement included in your original contract.

More information

Leveraging SAML for Federated Single Sign-on:

Leveraging SAML for Federated Single Sign-on: Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.

More information

Cloud based Holdfast Electronic Sports Game Platform

Cloud based Holdfast Electronic Sports Game Platform Case Study Cloud based Holdfast Electronic Sports Game Platform Intel and Holdfast work together to upgrade Holdfast Electronic Sports Game Platform with cloud technology Background Shanghai Holdfast Online

More information

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

CA Mobile Device Management 2014 Q1 Getting Started

CA Mobile Device Management 2014 Q1 Getting Started CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

PingFederate. SSO Integration Overview

PingFederate. SSO Integration Overview PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Leverage Your EMC Storage Investment with User Provisioning for Syncplicity:

Leverage Your EMC Storage Investment with User Provisioning for Syncplicity: Leverage Your EMC Storage Investment with User Provisioning for Syncplicity: Automate and simplify Syncplicity user/group management tasks EMC Global Solutions Abstract Make the most of your existing EMC

More information

expanding web single sign-on to cloud and mobile environments agility made possible

expanding web single sign-on to cloud and mobile environments agility made possible expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide Opal* Compatibility Guide 1.0 Order Number: 331049-001US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL

More information

What s New in Centrify Privilege Service Centrify Identity Platform 15.4

What s New in Centrify Privilege Service Centrify Identity Platform 15.4 CENTRIFY PRIVILEGE SERVICE WHAT S NEW What s New in Centrify Privilege Service Centrify Identity Platform 15.4 Centrify Privilege Service Centrify Privilege Service is a cloud-based password and access

More information