Network Information Center, University of Chinese Academy of Sciences Dr. Zha Daren

Size: px
Start display at page:

Download "Network Information Center, University of Chinese Academy of Sciences Dr. Zha Daren"

Transcription

1 Network Information Center, University of Chinese Academy of Sciences Dr. Zha Daren

2 The first graduate school in China with the ratification of the State Council Backed by 117 institutes of the Chinese Academy of Sciences (CAS) Headquartered in Beijing with 4 campuses Yuquanlu, Zhongguancun, Olympic Village and Yanqihu 109,882 graduate students earned a master s degree or/and doctoral degree from UCAS, almost half of them are Ph.D. awardees(from 1981 to 2013) In 2013, UCAS conferred doctoral degrees to 5188 students and master s degrees to 4,966 students

3 Course credit transfer LIFE Admission Campus life Campus culture Lifelong learning FINANCE Campus card Research Database Alumni supervisor Study analysis Job- Hunting Research Degree Registration Medical care ERP/OA Thesis Course Selection Resource STUDY Score crossdisciplinary supervisor

4 A user have multiple accounts for each of the applications or services (Local apps, organization cloud apps, external apps) Users must remember all the accounts and use them to log in each of the application Every applications must implement its own identity management and access management mechanism Users information may be inconsistent in different applications When a user leave the organization, some applications delete the user s account, some applications may be not

5 Every sub-organizations or the headquarter use its own integrated identity and access management approach Manage local users in a IAM system Support SSO across local applications Support federated SSO between applications from different sub-organizations defects Different IAM system may not interoperate very well Users information inconsistent problem still exist Some organizations may have not enough IT support person to maintain the IAM system

6 Build a identity and access management cloud for the UCAS(include suborganizations and the headquarter) Manage all users from the organization Support SSO across all applications inside the organization Support federated SSO with external applications and services The IAM cloud may extend to support multiple large organizations simultaneously

7

8 Manage organizations, applications, users, user groups in a single tree Use the same naming rule App.x.y.z User.a.c.d.e Support management delegation A admin manage orgs, users and groups in a subtree userinfo:id,name,f/m,account, login_time,organization code, department code,service list

9 Web app administrator Web app console Web app owner Organizational user, Managed by HR web app user Web app developer Web app portal Web app owner Including developer, temporary user Web app personal space Managed by managers Web app administrator App user outside of UCAS Web app user Web app store Web app user Managed by the application administrator Web app developer Web app owner SEP ROLES Web app user Users unified management Web app user Web app user Web app developer Web app owner Web app user Users unified management Web app user

10 User groups are used to Manage user s entitlement, which are passed to applications for authorization Manage policy. Users belongs to the same user group have the same policy on user management, password management, etc User group composition Some specific users Users from some other user groups Users match some attribute expression organization = xyz && type == employ && age > 30

11 Support SSO across applications inside the organization, include local applications of each sub-organization and cloud application of the organization Support federated SSO between application inside the organization and applications external, such as Goole App Using Shibboleth and SAML as the main SSO solutions

12 Administrators specify the attribute release to each application Release name, , entitlement information to internal applications Release none or few information to external applications User confirm the attribute release to each application He may deny to release some specific attribute to a application

13 IAM cloud provide application level authorization Determine which user can access which applications Applications handle their fine-grained access control, but IAM cloud provide various information to assist decision User attributes User entitlements Security policies

14 A security policy define how users are managed, how they login, etc in the IAM cloud Several level of security policies are defined Applications may use the policies to allow or deny user access

15

CAS s IDP system and resources in Education Cloud

CAS s IDP system and resources in Education Cloud CAS s IDP system and resources in Education Cloud DAREN ZHA CANS2015, Chengdu Outline CAS s IDP system and Education Cloud introduction Problems of interoperation A interoperation plan CAS s Education

More information

CAS TWAS President s Fellowship Programme for PhD Candidates. Call for Applications

CAS TWAS President s Fellowship Programme for PhD Candidates. Call for Applications CAS TWAS President s Fellowship Programme for PhD Candidates Call for Applications Introduction According to a new agreement between the Chinese Academy of Sciences (CAS) and The World Academy of Sciences

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014 Introduction to Identity and Access Management for the engineers Radovan Semančík April 2014 How it works now? Manager Admin Login Users Login Admin Login Login Login Theory Manager Admin Forgot password

More information

Configuring user provisioning for Amazon Web Services (Amazon Specific)

Configuring user provisioning for Amazon Web Services (Amazon Specific) Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re

More information

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

AVG Business Secure Sign On Active Directory Quick Start Guide

AVG Business Secure Sign On Active Directory Quick Start Guide AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and

More information

State of Michigan Single Sign-On Registration Instructions for First Time Users

State of Michigan Single Sign-On Registration Instructions for First Time Users Once you have created a user id/password combination you MUST remember it for future logins. DNR employees cannot help with user id/password assistance. You will need to call the Client Service Center

More information

HR Deans & Directors Meeting: IAM Update. July 14, 2015 Tuesday 2:00-2:30 p.m. Mass Hall, Perkins Room

HR Deans & Directors Meeting: IAM Update. July 14, 2015 Tuesday 2:00-2:30 p.m. Mass Hall, Perkins Room HR Deans & Directors Meeting: IAM Update July 14, 2015 Tuesday 2:00-2:30 p.m. Mass Hall, Perkins Room Agenda HarvardKey The Benefits Rollout Timeline A Sneak Peek POI Sponsored Affiliations Enhanced Functions

More information

Configuring Single Sign-on from the VMware Identity Manager Service to Amazon Web Services

Configuring Single Sign-on from the VMware Identity Manager Service to Amazon Web Services Configuring Single Sign-on from the VMware Identity Manager Service to Amazon Web Services VMware Identity Manager OCTOBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Amazon Web

More information

Employee Role (Web Clock)

Employee Role (Web Clock) Role (Web Clock) Time Sheet Log In with Access to Web Clock Time Entry using Web Clock View Personal Time Sheet View Personal Schedule Request Time Off Edit Favorites (Dashboard, Timesheets,, etc.) View

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources

More information

Federated Identity for Cloud Computing and Cross-organization Collaboration

Federated Identity for Cloud Computing and Cross-organization Collaboration Federated Identity for Cloud Computing and Cross-organization Collaboration Steve Moitozo Strategy and Architecture SIL International 20110616.2 (ICCM) Follow me @SteveMoitozo2 2 Huge Claims You want federated

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes

More information

Portal User Guide. Customers. Version 1.1. May 2013 http://www.sharedband.com 1 of 5

Portal User Guide. Customers. Version 1.1. May 2013 http://www.sharedband.com 1 of 5 Portal User Guide Customers Version 1.1 May 2013 http://www.sharedband.com 1 of 5 Table of Contents Introduction... 3 Using the Sharedband Portal... 4 Login... 4 Request password reset... 4 View accounts...

More information

User Management Tool 1.5

User Management Tool 1.5 User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management

More information

Call for 2015 International Graduate Students Programs

Call for 2015 International Graduate Students Programs Call for 2015 International Graduate Students Programs 1. Introduction The University of Chinese Academy of Sciences (UCAS) offers 143 Master s and 138 Doctoral programs to international students through

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Project Online: User Management

Project Online: User Management Project Online: User Management 1 P age Contents Project Online Licensing...3 How to check Project Online Licenses...3 Permission mode...5 How to change the Permission Mode...6 How to add users in SharePoint

More information

IGI Portal architecture and interaction with a CA- online

IGI Portal architecture and interaction with a CA- online IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Accelerate Without Fear: Extend Your Enterprise with Identity Federation. Kirk Brown CTO, Identity Management Sun Microsystems

Accelerate Without Fear: Extend Your Enterprise with Identity Federation. Kirk Brown CTO, Identity Management Sun Microsystems Accelerate Without Fear: Extend Your Enterprise with Identity Federation Kirk Brown CTO, Identity Management Sun Microsystems 1 Welcome to the Participation Age Enterprise Collaborative Industry Networks,

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and

More information

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL Identity & Access Management Gliding Flight Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL Agenda 1 General Concepts 2 Logical Components 3 Implementation Structure 4 5 Governance Web App Firewall

More information

AVG Business SSO Connecting to Active Directory

AVG Business SSO Connecting to Active Directory AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud

More information

Cloud Voice Quick Reference Guide

Cloud Voice Quick Reference Guide Cloud Voice Quick Reference Guide CLtel 107 N. 4th Street Clear Lake, Iowa 50428 Welcome! Welcome to Cloud Voice from CLtel! This guide is intended to get you up-and-running for the basic features associated

More information

Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements

Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements Encore Software Solutions (V3) provides a holistic Identity Lifecycle

More information

CoP Template, Version 1.4 20 Jun 2011 1

CoP Template, Version 1.4 20 Jun 2011 1 Use of IDM Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be read in conjunction with this document. http://www.ed.ac.uk/schools-departments/information-services/about/policiesandregulations/security-policies/security-policy

More information

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s I D C T E C H N O L O G Y S P O T L I G H T E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s M a nagement November 2013 Adapted from

More information

RSA Identity Management & Governance (Aveksa)

RSA Identity Management & Governance (Aveksa) RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity

More information

Online Systems at COTR. Learn about COTRs Online Systems, how to log into them, activate your accounts and set up your passwords.

Online Systems at COTR. Learn about COTRs Online Systems, how to log into them, activate your accounts and set up your passwords. 2015 Online Systems at COTR Learn about COTRs Online Systems, how to log into them, activate your accounts and set up your passwords. Table of Contents Online Systems at COTR... 2 Logging into Online Systems

More information

Getting Started with Clearlogin A Guide for Administrators V1.01

Getting Started with Clearlogin A Guide for Administrators V1.01 Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents

More information

Care Provider Background Screening Clearinghouse

Care Provider Background Screening Clearinghouse Agency for Health Care Administration Florida Medicaid Care Provider Background Screening Clearinghouse Florida Medicaid User Registration Guide: Access to Background Screening through the AHCA SSO Web

More information

STATE OF FLORIDA DEPARTMENT OF. NO. 15-13 TALLAHASSEE, April 8, 2011. Documentation Management DCFTRACKER MANAGEMENT SYSTEM

STATE OF FLORIDA DEPARTMENT OF. NO. 15-13 TALLAHASSEE, April 8, 2011. Documentation Management DCFTRACKER MANAGEMENT SYSTEM CFOP 15-13 STATE OF FLORIDA DEPARTMENT OF CF OPERATING PROCEDURE CHILDREN AND FAMILIES NO. 15-13 TALLAHASSEE, April 8, 2011 Documentation Management DCFTRACKER MANAGEMENT SYSTEM CONTENTS Paragraph Chapter

More information

Michigan Care Improvement Registry (MCIR) User Registration Four-Step Process

Michigan Care Improvement Registry (MCIR) User Registration Four-Step Process Michigan Care Improvement Registry (MCIR) User Registration Four-Step Process Step 1. User Receives PIN Number Email from mcir@michigan.gov Once a User is added to MCIR, they will receive an email message

More information

Briefing on New Student E-mail Service @Link. 7 Nov 2014 Information Technology Services Centre

Briefing on New Student E-mail Service @Link. 7 Nov 2014 Information Technology Services Centre Briefing on New Student E-mail Service @Link 7 Nov 2014 Information Technology Services Centre Like Our ITSC Facebook at www.facebook.com/itsc.cuhk To get the latest news of ITSC 1. What is CUHK Office

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Kittys School Management System

Kittys School Management System Management Module: Login Module: In this module site admin can be able to login by using their unique username and password. Add Section and Standard: Subject: Syllabus: Inbox: i. Admin can add the Standard

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

PowerSchool. Parent Single Sign-On (SSO)

PowerSchool. Parent Single Sign-On (SSO) PowerSchool Parent Single Sign-On (SSO) K i n g s C a n y o n U n i f i e d 6 7 5 W M a n n i n g A v e, R e e d l e y, C A 9 3 6 5 4 559-3 0 5-7 0 1 0 w w w. k c u s d. c o m Starting with the 2015-2016

More information

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release

More information

Single Sign-On Instructions (SSO) Registration for the SSO

Single Sign-On Instructions (SSO) Registration for the SSO Single Sign-On Instructions (SSO) Registration for the SSO Step 1: Registration to Single Sign-On (SSO) Skip this section if you ve already registered for a SSO account. Open your web browser (Internet

More information

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Q # 1 RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Under Technical Requirements the following requirement is listed: 2. The solution is cloud-based softwareas-a-service, requiring

More information

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

LMS Integration with ALEKS

LMS Integration with ALEKS LMS Integration with ALEKS Integrating ALEKS with your Learning Management System (LMS) is a multi-step process. Your school has the option to integrate ALEKS with your LMS in order to provide Single Sign-On

More information

MARKETPLACE. Three business apps portal. Manual

MARKETPLACE. Three business apps portal. Manual MARKETPLACE Three business apps portal Manual 1 INDEX 1 WHAT IS THE MARKETPLACE?... 1 1.1 Why use Marketplace applications?... 1 2 PURCHASE CONDITIONS... 3 3 ACCESS... 4 4 ACCESS FOR CLIENTS WITH AN EXISTING

More information

Active Directory Integration 855.426.7227. www.onelogin.com twitter.com/onelogin ONELOGIN WHITEPAPER

Active Directory Integration 855.426.7227. www.onelogin.com twitter.com/onelogin ONELOGIN WHITEPAPER Active Directory Integration Even as enterprises continue to adopt more cloud applications, Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) still play a critical role in how information

More information

Manage all your Office365 users and licenses

Manage all your Office365 users and licenses Manage all your Office365 users and licenses Delegate 365 White Paper Authors: Toni Pohl, Martina Grom Version: 1.2 of December 2014 atwork information technology gmbh. All rights reserved. For information

More information

- Identity & Access Management

- Identity & Access Management IBM Software Group NSHE - Identity & Access Management 2006 IBM Corporation Identity & Access Management Access Management and The Monitoring, Auditing and Reporting for Compliance So What s The Problem

More information

Glinda Cummings World Wide Tivoli Security Product Manager

Glinda Cummings World Wide Tivoli Security Product Manager Featured Speaker IBM Security Solutions! Glinda Cummings World Wide Tivoli Security Product Manager 2010 IBM Corporation IBM Security Solutions! How IBM defines Cloud Computing IBM Security Solutions!

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: McGill University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

BONN GRADUATE SCHOOL OF ECONOMICS (BGSE) APPLICATION REQUIREMENTS (PAGES 1-2) GUIDE FOR THE ONLINE APPLICATION PORTAL (PAGES 3-6)

BONN GRADUATE SCHOOL OF ECONOMICS (BGSE) APPLICATION REQUIREMENTS (PAGES 1-2) GUIDE FOR THE ONLINE APPLICATION PORTAL (PAGES 3-6) DECEMBER 2014 BONN GRADUATE SCHOOL OF ECONOMICS (BGSE) APPLICATION REQUIREMENTS (PAGES 1-2) AND GUIDE FOR THE ONLINE APPLICATION PORTAL (PAGES 3-6) APPLICATION REQUIREMENTS PRELIMINARY REMARKS We encourage

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1 Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness

More information

Building Secure Applications. James Tedrick

Building Secure Applications. James Tedrick Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS

More information

An overview of configuring Intacct for single sign-on. To configure the Intacct application for single-sign on (an overview)

An overview of configuring Intacct for single sign-on. To configure the Intacct application for single-sign on (an overview) Chapter 94 Intacct This section contains the following topics: "An overview of configuring Intacct for single sign-on" on page 94-710 "Configuring Intacct for SSO" on page 94-711 "Configuring Intacct in

More information

Create New MyWorkKeys Account Quick-Start Guide for the ACT National Career Readiness Certificate (ACT NCRC )

Create New MyWorkKeys Account Quick-Start Guide for the ACT National Career Readiness Certificate (ACT NCRC ) Creating a New Account Step 1. Log in to MyWorkKeys.com. Type MyWorkKeys.com into your Internet browser and press Enter. The URL changes, and now the ACT National Career Readiness Certificate page displays.

More information

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department jmikhael@masdar.ac.ae Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation

More information

P2 Asset Support System (PASS) New Registration Manual

P2 Asset Support System (PASS) New Registration Manual P2 Asset Support System (PASS) New Registration Manual Click on Register button on the portal site of P2 Asset Support System (PASS) to go into New Registration site. PASS Portal: http://panasonic.biz/sav/pass_e

More information

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Royal Roads University_ Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they

More information

PCI Home Quick-Start Guide www.pcihome.net

PCI Home Quick-Start Guide www.pcihome.net PCI Home Quick-Start Guide www.pcihome.net Page 1 of 9 Getting Started in PCI Home PCI Home is a website that is a resource for PCI employees to find Company forms, documents, procedures, phone numbers,

More information

Registering your Business

Registering your Business Registering your Business with the Publicly Available Database Consumer Product Safety Risk Management System (CPSRMS) Ming Zhu, CPSRMS Phase 1 Project Manager July 15, 2010 2 Information in this presentation

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

An Overview of Samsung KNOX Active Directory-based Single Sign-On

An Overview of Samsung KNOX Active Directory-based Single Sign-On C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Unified Monitoring Portal Online Help Account Admin

Unified Monitoring Portal Online Help Account Admin Unified Monitoring Portal Online Help Account Admin This PDF file contains content from the Unified Monitoring Portal (UMP) Online Help system. It is intended only to provide a printable version of the

More information

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Copyright Pivotal Software Inc, 2013-2015 1 of 10

Copyright Pivotal Software Inc, 2013-2015 1 of 10 Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES 1. Federation Participant Information 1.1 The InCommon Participant Operational Practices information below is for: InCommon Participant organization

More information

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

ESMO Online event registration instructions Register someone else or few participants (1-9 persons)

ESMO Online event registration instructions Register someone else or few participants (1-9 persons) ESMO Online event registration instructions Register someone else or few participants (1-9 persons) INDEX Registration requirements... Page 2 1. Account with ESMO... Page 3 2. Login into your personal

More information

Temporary/Contractor Accounts MICA Account Management Gateway

Temporary/Contractor Accounts MICA Account Management Gateway Temporary/Contractor Accounts MICA Account Management Gateway 1 Table of Contents Requesting Temporary/Contractor Accounts... 3 Notes... 6 Remove Access... 7 Change Access Period... 8 2 Requesting Temporary/Contractor

More information

PRODUCT BRIEF OpenAM. Delivering secure access for customers, applications, devices and things

PRODUCT BRIEF OpenAM. Delivering secure access for customers, applications, devices and things PRODUCT BRIEF OpenAM Delivering secure access for customers, applications, devices and things Introduction Identity and access management is going through a new golden age. CEOs are pushing growth as their

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

@ my fingertips FAST Leave Management System guide

@ my fingertips FAST Leave Management System guide @ my fingertips FAST Leave Management System guide Welcome to the FAST Leave Management System! The new leave management system is here The Human Resources Service is committed to providing support staff

More information

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

W H IT E P A P E R. Salesforce CRM Security Audit Guide

W H IT E P A P E R. Salesforce CRM Security Audit Guide W HITEPAPER Salesforce CRM Security Audit Guide Contents Introduction...1 Background...1 Security and Compliance Related Settings...1 Password Settings... 2 Audit and Recommendation... 2 Session Settings...

More information

Using Shibboleth for Single Sign- On

Using Shibboleth for Single Sign- On Using Shibboleth for Single Sign- On One Logon to Rule them all.. Kirk Yaros Director, Enterprise Services Mott Community College 1 Agenda Overview of Mott Overview of Shibboleth and Mott s Project Review

More information

Open Source Identity Management

Open Source Identity Management Open Source Management OpenAlt 2015 Radovan Semančík November 2015 Ing. Radovan Semančík, PhD. Software architect Co-owner of Evolveum (open source company) Architect of midpoint project Apache committer

More information

Student Email Accounts. Information Guide

Student Email Accounts. Information Guide Student Email Accounts Information Guide Table of Contents 0 What is College Email.3 0 How to Login 5 0 Changing Your Pin 8 0 Forwarding Your Student Email.11 0 Skydrive.15 Why A College Email? 0 The Los

More information

Managing policies. Chapter 7

Managing policies. Chapter 7 Chapter 7 Managing policies You use the Policies tab in Admin Portal to create policy sets for roles. A policy set lets you configure the following categories of policies: Mobile Device Policies Use to

More information

Identity as a Service Powered by NetIQ IdentityAccess Service Configuration and Administration Guide

Identity as a Service Powered by NetIQ IdentityAccess Service Configuration and Administration Guide Identity as a Service Powered by NetIQ IdentityAccess Service Configuration and Administration Guide December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers,

More information

The Customer page is only displayed in Admin Portal on Managed Service Provider accounts. It is not displayed in customer accounts.

The Customer page is only displayed in Admin Portal on Managed Service Provider accounts. It is not displayed in customer accounts. Chapter 9 Managing customer cloud services The Customers page lists the cloud services you have created for your customers and their status. You use this page to perform the following tasks: Create a new

More information

Introducing PAUL. Thursday, October, 15th 2015, Room F1.310 4:07 pm Rainer Feldmann PAUL Coordination. Alles online auf einer Plattform

Introducing PAUL. Thursday, October, 15th 2015, Room F1.310 4:07 pm Rainer Feldmann PAUL Coordination. Alles online auf einer Plattform Introducing PAUL Thursday, October, 15th 2015, Room F1.310 4:07 pm Rainer Feldmann PAUL Coordination Management of Campus Management Systems: Integrated Software Campus Management Systems: integrated Software

More information

Global UGRAD Program

Global UGRAD Program Application Instructions for Global UGRAD 2016-2017 Portal Step-by-Step I. REGISTERING FOR THE PROGRAM Google Chrome and Mozilla Firefox work best when completing the UGRAD application. We do NOT recommend

More information

SAML:The Cross-Domain SSO Use Case

SAML:The Cross-Domain SSO Use Case SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 ekaminski@oblix.com Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397

More information

Registration to Single Sign-On (SSO) & Subscription to Radiation Safety Section Online Registration System

Registration to Single Sign-On (SSO) & Subscription to Radiation Safety Section Online Registration System Registration to Single Sign-On (SSO) & Subscription to Radiation Safety Section Online Registration System The Michigan Department of Licensing and Regulatory Affairs requires all users of its online payment

More information

Automating User Management and Single Sign-on for Salesforce.com OKTA WHITE PAPER. Okta Inc. 400 2nd Street Suite 350 San Francisco CA, 94107

Automating User Management and Single Sign-on for Salesforce.com OKTA WHITE PAPER. Okta Inc. 400 2nd Street Suite 350 San Francisco CA, 94107 OKTA WHITE PAPER Automating User Management and Single Sign-on for Salesforce.com Okta Inc. 400 2nd Street Suite 350 San Francisco CA, 94107 info@okta.com 1-888-722-7871 Table of Contents 1 The Growth

More information

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust

More information