Implementation: Single European Market for eidentity
|
|
- Alicia Hodge
- 8 years ago
- Views:
Transcription
1 Implementation: Single European Market for eidentity January 16th 2014 Berlin Dr. Kim Nguyen, Chief Scientist Security (Bundesdruckerei GmbH) & Managing Director D-TRUST GmbH Intern/Vertraulich 1
2 eidentity means strong authentication/identification suitable for ecommerce/egovernment applications providing a strong link to an officially verified identity (HW) token based 2
3 Do we need this? 3
4 Do we need this? Yes, we do 4
5 Do we need this? Yes, we do 5
6 EINFÜHRUNG? Passwords i.e. identities are stolen on a most daily basis!! 6
7 EINFÜHRUNG? Security is typically not an accepted part of the features Security 7
8 These were the slides I used to present a year ago 8
9 EINFÜHRUNG? New topic: consider the country in which the service is provided 9
10 Single EU market for eidentity Technical Interoperability Legal Acceptance User acceptance & -experience 10
11 IAS: CURRENT SITUATION EU Signature directive 1999/93/EC dated No legal acceptance of QES within EU crossborder Mature standards (CEN and ETSI) No legal framework within EU for eid Different implementations of eid across Europe Large Investments of both EU member states and EU industry 11
12 Single EU market for eidentity Technical Interoperability Legal Acceptance User acceptance & -experience 12
13 13
14 Single EU market for eidentity Technical Interoperability Legal Acceptance User acceptance & -experience 14
15 SITUATION TODAY Many member states have already introduced eid technology supporting various use cases CENTRAL GOVERNMENT ONLINE SERVICES LOCAL GOVERNMENT ONLINE SERVICES Citizen BUSINESS ONLINE SERVICES NON PROFIT ORGANISATION ONLINE SERVICES 15
16 SITUATION TODAY: SEPARATED E-ID INFRASTRUCTURE Citizen Citizen Citizen Citizen Citizen 16
17 AIM: INTEROPERABILITY OF NATIONAL SOLUTIONS Citizen Citizen Opportunities for public and private sector Citizen Citizen Citizen 17
18 INTEROPERABILITY REQUIREMENTS There is no common single eid specification valid for the EU Several different implementations are already in place and operating We need central translation services We need to acknowledge that different trust levels exist in the implemented eid solutions 18
19 DIFFERENT TECHNOLOGIES, BUT ONE UNIFYING APPROACH Middleware approach Proxy approach (Server) S-PEPS V-IDP (Virtual- ID-Provider) MS B MS A (Citizen) C-PEPS MS spezifisch MS D MS C 19
20 SOLUTION APPROACH Middleware approach MS B MS A V-IDP (Virtual- ID-Provider) direct SP connector AT MOA ID V-IDP S-PEPS (V-SP) (MS B spezifisch) Modular Authentication Relay Service DE eid Service C-PEPS connector Proxy approach possible extensions possible extensions (Server) S-PEPS (Citizen) C-PEPS MS spezifisch MS D MS C 20
21 SOLUTION APPROACH IN DETAIL (MARS) direct SP connector V-IDP (V-SP) S-PEPS (MS B spezifisch) possible extensions DE eid Service Modular Authentication Relay Service AT MOA ID C-PEPS connector possible extensions national C-PEPS Configurable like LEGO... 21
22 Single EU market for eidentity Technical Interoperability Legal Acceptance User acceptance & -experience 22
23 OUR TECHNOLOGY YOUR PROBLEM?????? 23
24 OUR TECHNOLOGY YOUR PROBLEM Crossborder identification and authentication services and eservices are already existing, they are already functioning und are used daily by millions of people all over the world 24
25 OUR TECHNOLOGY YOUR PROBLEM What users experience today: 25
26 BRIDGING THE ID WORLDS Proprietary ID systems, e.g. username/ password, AppleID, propriatory token Governmental eid solutions Typically, NO interaction between these two worlds exist for the user 26
27 BRIDGING THE ID WORLDS Proprietary ID systems, e.g. username/ password, AppleID, proprietory token Governmental eid solutions The future of eid lies within controlled connection between both worlds, e.g. for special use cases (unblocking of accounts, age verification etc) 27
28 BRIDGING THE ID WORLDS: PROVIDING VERIFIED IDENTITIES Service Provider 2. ID request: Confirmation of official ID requested 4. Authentification Using SAML/internationally accepted and standardized exchange protocol IDP (Identity Provider) 1. Service request: Using conventional authentification methods USER 3. Verify ID: Using various ID sources and verification methods 28
29 For the eid world we have to acknowlegde, that other authentication systems are already existing and are widely used We have to find the right / complementary use cases where BOTH systems need to interact This relates especially to administrative use cases like registration, account set up, account unblocking For the operation of governmental eid solutions we need to provide a seamless integration into other proprietory systems in order to gain acceptance 29
30 Do not forget the user! 30
31 THANK YOU FOR YOUR ATTENTION! 31
32 DISCLAIMER Dr. Kim Nguyen Bundesdruckerei GmbH / D-TRUST GmbH Oranienstr Berlin kim.nguyen@bdr.de Telefon: +49(0) Hinweis: Diese Präsentation ist Eigentum der Bundesdruckerei GmbH. Sämtliche Inhalte auch auszugsweise dürfen nicht ohne die Genehmigung der Bundesdruckerei GmbH vervielfältigt, weitergegeben oder veröffentlicht werden. Copyright 2013 by Bundesdruckerei GmbH. 32
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
More informationWhat is the Right Security Solution for Mobile Computing? #RSAC
SESSION ID: SPO1-T09 Trust in Mobile Enterprise Have We Lost the Game? MODERATOR: Prof. Dr. Norbert Pohlmann Professor Computer Science Department for Information Security, Director of the Institute for
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE
More informationE-Signatures and E-Procurement
E-Signatures and E-Procurement Dr. Annette Rosenkötter Rechtsanwältin Dr. Anja Hoffmann Rechtsanwältin FPS Rechtsanwälte und Notare Brüssel, 15.06.2011 Dieser Bericht ist nur für den Empfänger bestimmt.
More informationFAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
More informationHOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
More informationRich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association
Navigating the Identity Landscape Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association SAFE-BioPharma Association Overview An overview of US and EU government
More informationIntroduc)on to STORK2.0 project
Introduc)on to STORK2.0 project AAI Workshop Brussels, April 2014 EUROPEAN EID CONTEXT FOR EGOVERNMENT NaKonal online services today with eid CENTRAL GOVERNMENT ONLINE SERVICES LOCAL GOVERNMENT ONLINE
More informationFact sheet: sa Certipost nv. Certipost Panel Presentation European Commission. Company. Activities based on 2 pillars: Clients.
Certipost Panel Presentation European Commission Bart Callens Product and Sales Manager Document Protection Services 1 Fact sheet: sa Certipost nv Company Shareholders De Post/La Poste, 50% Belgacom, 50%
More informationServer based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
More informationGuide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
More informationStudy on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile
Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Brigitte
More informationFDT for Mobile Devices
FDT for Mobile Devices ABSTRACT Currently the established FDT2 technology is bound to PCs with Windows Operating System. However, there is an increasing trend for mobile applications in automation industry.
More informationVOIP-500 Series Phone CUCM 8.0.3a Integration Guide
I. Introduction This provides general instructions for integration of the VOIP-500 Series Phone with a Cisco Call Manager installation. It is recommended to read this instruction set completely before
More informationICG-9 Meeting, Prague, Session 3, 11 th Nov. 2014. Spectrum Monitoring applied to the Detection and Geolocation of GPS Jammers
ICG-9 Meeting, Prague, Session 3, 11 th Nov. 2014 Spectrum Monitoring applied to the Detection and Geolocation of GPS Jammers Portfolio Products & Services We have the knowledge, the experience, and the
More informationView from a European Trust Service Provider Server Signing: Return of experience and certification strategy
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy January 16, 2014 - Berlin Thibault de Valroger VP Strategy & Development OPENTRUST Thibault.devalroger@opentrust.com
More informationQuality Authenticator Scheme
COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) Towards pan-european recognition of electronic IDs (eids) ICT PSP call identifier: ICT-PSP/2007/1 ICT PSP Theme/objective
More informationIntroduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
More informationEU Cross-border e-id & Safety Services Antonio Skarmeta Gómez Universidad de Murcia. IPv6@GOV workshop Brussels, 23-24 January, 2013
EU Cross-border e-id & Safety Services Antonio Skarmeta Gómez Universidad de Murcia IPv6@GOV workshop Brussels, 23-24 January, 2013 Index Motivations General objectives Cross-border services Cross-border
More informationPosition Paper European Citizen Card: One Pillar of Interoperable eid Success
Position Paper European Citizen Card: One Pillar of Interoperable eid Success October 2008 Disclaimer Eurosmart takes reasonable measures to ensure the quality of the information contained in this document.
More informationDTMs in the Cloud. FDT Developer Forum on 5th of May 2015 at Schneider Electric in Marktheidenfeld
DTMs in the Cloud FDT Developer Forum on 5th of May 2015 at Schneider Electric in Marktheidenfeld ABSTRACT One of the basic FDT concepts is that Frame Applications and DTMs can be deployed independently
More informationOECD workshop on digital identity management BELGIAN approach
OECD workshop on digital identity management BELGIAN approach FEDICT Frank LEYMAN Trondheim - 08/05/2007 Information security in Belgium > Government disposes of data: Identification data, fiscal data,
More informationIBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
More informationDS-05-2015: Trust eservices. The policy context: eidas Regulation
DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task
More informationDIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
More informationCommission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market
Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market COM(2012)238 of 4.6.2012 ClubPSCo, Paris, 20.6.2012 Gérard GALLER
More informationSecuring Identities & Trust
Securing Identities & Trust Agenda About Safelayer Identities & Trust eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Q& A? WWW.SAFELAYER.COM 2 About
More informationDe-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de
De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook
More informationSPOCS - Second generation PSCs
SPOCS - Second generation PSCs Services are crucial to the European Internal Market n Main driver of growth and jobs, representing around 70% of GDP n Source of an impressive 95% of new jobs created in
More informationData Privacy in the Cloud E-Government Perspective
Data Privacy in the Cloud E-Government Perspective Herbert Leitold; EGIZ, A-SIT International Cloud Symposium 2011, Panel on Data Privacy and the Role Policy Plays in Defining Trust Requirements Ditton
More informationLEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION
LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION Aušra Kumetaitienė Head of Information Society Development Division Tomas Jakimavičius Telecommunications and
More informationSTANDARDISIERUNG FÜR EIDAS IM MANDATE/460
STANDARDISIERUNG FÜR EIDAS IM MANDATE/460 TeleTrusT Signaturtag 17.09.2015 ETSI 2014. All rights reserved STANDARDISIERUNG FÜR EIDAS IM MANDATE/460 TeleTrusT Signaturtag 17.09.2015 ETSI 2014. All rights
More informationROADMAP. A Pan-European framework for electronic identification, authentication and signature
TITLE OF THE INITIATIVE ROADMAP A Pan-European framework for electronic identification, authentication and signature TYPE OF INITIATIVE CWP Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT
More informationLandscape of eid in Europe in 2013
Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National
More informationISO/IEC 24727 for secure mobile web applications
ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com
More informationSSLPost Electronic Document Signing
SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that
More informationSpanish initiative to encourage the use of eid & esignature technologies in egovernment Services. Ministry of Public Administrations
Spanish initiative to encourage the use of eid & esignature technologies in egovernment Services Ministry of Public Administrations Miguel Álvarez Rodríguez IT Manager Contents 1. The new eid citizen s
More informationUsing Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationeid and ebanking: get your bank account in Minutes through an online portal!
eid and ebanking: get your bank account in Minutes through an online portal! An example of the cross-border use of eids in the private sector. London, 5 June 2015. Dr. Thomas ROESSLER, CEO PrimeSign GmbH
More informationA Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries
A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries Leonie Spoerer, Yashik Singh and Maurice Mars Dept of TeleHealth, University of KwaZulu-Natal
More informationIAS2. ets Market analysis
IAS2 Study to support the implementation of a pan-european framework on electronic identification and trust services for electronic transactions in the internal market SMART 2012/0001 ets Market analysis
More informationsign-me Bundesdruckerei's solution for online signatures using the new German ID card
Basic information: sign-me sign-me Bundesdruckerei's solution for online signatures using the new German ID card What is sign-me? sign-me is a web application from Bundesdruckerei that enables online signatures
More informationFolder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016
Version 2.0 April 2016 Folder Proxy + OWA + ECP/EAC Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationAAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle lukas.haemmerle@switch.ch
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle lukas.haemmerle@switch.ch Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
More informationIdentity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy
Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy November 18, 2008 Teresa Schwarzhoff Computer Security Division Information
More informationGuide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) Wherever Security relies on Identity,
More informationHP SAP. Where Development, Test and Operations meet. Application Lifecycle Management
HP SAP Where Development, Test and Operations meet Application Lifecycle Management 1 Introduction 1.1 ALM CONCEPTS Application Lifecycle Management (ALM) empowers IT to manage the core application life-cycle,
More informationPingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
More informationeid/authentication/digital signatures in Denmark
eid/authentication/digital signatures in Denmark 8. July 2008 Nikolas Triantafyllidis / Charlotte Jacoby Special Advisors Centre for Digital Signatures National IT- and Telecom Agency Authentication and
More informationEuropean Electronic Identity Practices
European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary
More informationNIST-Workshop 10 & 11 April 2013
NIST-Workshop 10 & 11 April 2013 EUROPEAN APPROACH TO OVERSIGHT OF "TRUST SERVICE PROVIDERS" Presented by Arno Fiedler, Member of European Telecommunications Standards Institute Electronic Signatures and
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationUbisecure. White Paper Series. e-service Maturity Model
Ubisecure White Paper Series e-service Maturity Model 2 e-service Maturity Model What we ve seen when we ve been dealing with the extranets and e-services, where companies can offer always available, easy-to-use
More informationFederation Proxy for Cross Domain Identity Federation
Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 m-hatake@ax.jp.nec.com
More informationPingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
More informationSecuring ArcGIS Server Services: First Steps
Federal GIS Conference February 9 10, 2015 Washington, DC Securing ArcGIS Server Services: First Steps Michael Sarhan Esri msarhan@esri.com Agenda Review Basic Security Workflow ArcGIS Server Roles and
More informationEMAIL CONFIGURATION AND SETUP USER GUIDE AND REFERENCE MANUAL
EMAIL CONFIGURATION AND SETUP USER GUIDE AND REFERENCE MANUAL The following manual will outline the configuration and setup for email access by any staff member. There are multiple ways to configure this
More informationThe role of authentication and eid interoperability in the access to scientific databases
The role of authentication and eid interoperability in the access to scientific databases Fernando M. Silva Instituto Superior Técnico Lisboa, Portugal 13-14 November 2013, UP Fernando M Silva Outline
More informationUnifying framework for Identity management
Unifying framework for Identity management Breakfast seminar Security-Assessment.com Stephan Overbeek 2006-03-28 Disclaimer + This is a slide pack that supports a narrative and needs to be accompanied
More informationSicherheitsaspekte des neuen deutschen Personalausweises
Sicherheitsaspekte des neuen deutschen Personalausweises Dennis Kügler Bundesamt für Sicherheit in der Informationstechnik egov Fokus 2/2013: Identity- und Access Management im E-Government Rethinking
More informationNetop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
More informationMIGRATION GUIDE. Authentication Server
MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
More informationImplementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID
Implementation Guide for Juniper SSL VPN SSO with OWA with BlackShield ID Copyright 2009 CRYPTOCard Inc. http:// www.cryptocard.com Copyright Copyright 2009, CRYPTOCard All Rights Reserved. No part of
More informationReducing fragmentation in a scattered eid marked
Reducing fragmentation in a scattered eid marked Norstella, eid workshop Oslo, 16 th September 2014 Arne Vidar Haug VP Business Development / Co-Founder, Signicat About Signicat Cloud eid / esignature
More informationMapping security services to authentication levels. Reflecting on STORK QAA levels
Mapping security services to authentication levels Reflecting on STORK QAA levels About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created as a response to security
More informationJOSSO 2.4. Ws-Federation Integration Tutorial
JOSSO 2.4 Ws-Federation Integration Tutorial JOSSO 2.4 : Ws-Federation Integration Tutorial 1. Introduction... 1 2. Prerequisites... 2 3. Defining Identity Appliance Elements... 3 3.1. SAML 2 Service Provider
More informationUNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University
UNI TY UNIfied identity management Krzysztof Benedyczak ICM, Warsaw University Outline The idea Local database Groups, Entities, Identities and Attributes UNITY Authorization Local authentication Credentials
More informationA brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
More informationWe do SAM with a smile.
We do SAM with a smile. TUI InfoTec Uwe Lehmann 01..06.2015 Agenda. TUI InfoTec IT Provider of the TUI Group Our Know-How Project License Management Initial Position General Conditions / Requirements Approach
More informationSERIES A : GUIDANCE DOCUMENTS. Document Nr 3
DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC
More informationPreparing your Domain to transfer from Go Daddy
Preparing your Domain to transfer from Go Daddy Before you can transfer a domain: Getting Started Disable domain privacy. If the privacy service forwards incoming email, check the ʻforward toʼ contact
More informationDigital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie
Digital signature and e-government: legal framework and opportunities Raúl Rubio Baker & McKenzie e-government concept Utilization of Information and Communication Technologies (ICTs) to improve and/or
More informationNew Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
More informationTitle: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: sascha.neinert@rus.uni-stuttgart.de
More informationSAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
More informationConfiguring Interactive Intelligence ININ IP PBX For tw telecom SIP Trunking service USER GUIDE
Configuring Interactive Intelligence ININ IP PBX For tw telecom SIP Trunking service USER GUIDE Version 1.0 August 23, 2012 Copyright 2012 by tw telecom inc. All Rights Reserved. This document is the property
More informationSTEPS TO REGISTER YOUR PROFILE AND BOOK THE COUPON
STEPS TO REGISTER YOUR PROFILE AND BOOK THE COUPON 1. Registering with Sabarimala Virtual Q Portal A user can register into the site after a few easy steps. A user needs to register with the site to be
More informationIntegrating Apex into Federated Environment using SAML 2.0. Jon Tupman Portalsoft Solutions Ltd
Integrating Apex into Federated Environment using SAML 2.0 Jon Tupman Portalsoft Solutions Ltd Introduction Migration challenge Federated vs Single sign-on SAML process flow Integrating Apex and Weblogic
More information! #$%%& " '$%%& ( )$%%&
!"! #$%%& " '$%%& ( )$%%& ,! " #$$ % $ % &" ' ( ) ) & " ' ( *!*! # $ -.!*! # / 0 & - & $ (1 23( 4 2,!( ) # 1+ ' * ' ( $!+, -. ( /!% & /(+ (53 $ &$, +6(53 4 & "!(!+! -+*!7 $% &# * "+/ $8 0 (1 2 $ )0 4 -.
More informationINTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass
INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security
More informationSMP Security & Identity Management An Introduction
SMP Security & Identity Management An Introduction SMP Enterprise Grade Mobility Webinar Series Brought to you by the SAP Mobile Rapid Innovation Group (RIG) SAP Mobile Platform: Enterprise Grade Mobility
More informationHP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
More informationPOP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
More informationEffective Contract Management
Effective Contract Management How can we do the right things at the right time if we do not know the contents of our contracts? ProcessWorld 2011 Berlin, June 1st 2011 Michael Neumann Agenda Background
More informationNF1Adv VOIP Setup Guide (for Generic VoIP Setup)
NF1Adv VOIP Setup Guide (for Generic VoIP Setup) Configuring your NF1Adv for VOIP Service The following steps will take you through the process of setting up your VOIP connection. Step 1: Checking Computer
More informationConfiguring PPP And SIP
Copyright Copyright 2005. All rights reserved. The content of this manual is subject to change without notice. The information and messages contained herein are proprietary to. No part of this manual may
More information2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
More informationEnterprise Identity Management Connie Dwyer, US EPA Steve Girt, Wyoming DEQ Luke Gentry, CGI Federal, Inc.
Enterprise Identity Management Connie Dwyer, US EPA Steve Girt, Wyoming DEQ Luke Gentry, CGI Federal, Inc. 2015 Exchange Network National Meeting Supporting the Business of Environmental Protection September
More informationSecure communications via IdentaDefense
Secure communications via IdentaDefense How vulnerable is sensitive data? Communication is the least secure area of digital information. The many benefits of sending information electronically in a digital
More informationCopyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
More informationGDP11 Student Registration Guide
GDP11 Student Registration Guide Getting Started with GDP11 What You Will Need URL/Web Site Address for GDP Online You will access GDP11 at a URL (Web address) that is specific to your school. This URL
More informationWireless Network Configuration Guide
CIT Table of Contents Introduction... 1 General Wireless Settings... 1 1. Windows XP Wireless Configuration... 2 2. Windows XP Intel Pro Wireless Tool... 7 3. Windows Vista Using the Windows Wireless Tools...
More informationCopyright 2014 http://itfreetraining.com
This video will look the different versions of Active Directory Federation Services. This includes which features are available in each one and which operating system you need in order to use these features.
More informationKIM. www.kim-forum.org
KIM www.kim-forum.org KIM Competence Center for Interoperable Metadata German Translation of DCMES 1.1 Dublin Core Conference 2007, Singapur Christine Frodl (German National Library) Stefanie Ruehle (State
More informationEXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
More informationTransforming and optimization of the supply chain to create value and secure growth and performance
Transforming and optimization of the supply chain to create value and secure growth and performance Niedersachsen Aviation, Jahresnetzwerktreffen Hannover, 10th December 2015 Today s storyboard Short introduction
More informationExchange of Documents in Europe
Exchange of Documents in Europe Per-Olav Gramstad Program Manager - Interoperability in egovernment IDABC Directorate-General for Informatics European Commission EUROPEAN COMMISSION Monday, October 20,
More informationDIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
More informationElectronic Citizen Identities and Strong Authentication
Electronic Citizen Identities and Strong Authentication Sanna Suoranta, Lari Haataja, Tuomas Aura Department of Computer Science Aalto University Finland Sanna Suoranta sanna.suoranta@aalto.fi Content
More informationAir Ambulance Technology Company Presentation
Air Ambulance Technology Company Presentation 1 AAT Air Ambulance Technology Company: Private Ltd. company established 1993 President: Mr. Egon Kuntner No. of employees: 50 Location: RANSHOFEN / AUSTRIA
More information