Authentication Integration
|
|
|
- Peregrine Chandler
- 10 years ago
- Views:
Transcription
1 Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication implementation methods and includes additional guidelines for each implementation type. The VoiceThread Integration Team is available to collaborate and work with your User and Identity Management department to set up and integrate with these services. The contact address for our team is: Please note that our Integration package is included for (K-12) District and (Higher-Ed) Department+ or Site-Wide deployments of VoiceThread and is available as an additional service for all other deployments. voicethread authentication at a glance: This document addresses the following topics: Users and Data Security VoiceThread External Authentication Microsoft Active Directory Lightweight Directory Access Protocol (LDAP) Shibboleth/inCommon Central Authorization Service (CAS) Pearson Learning Studio Authentication Moodle Authentication API Authentication (for in-house solutions) VoiceThread Basic Authentication Comma Separated Value (CSV) upload One-at-a-time user addition VoiceThread Information System Integration (VISI) Existing VoiceThread Accounts and Integration
2 Users And Data Security VoiceThread takes the security of our users and their data quite seriously. Therefore, we require that all authentication information be transmitted over encrypted protocols. We do not support the transport of user information over any communication channel that is not encrypted and require that any service that utilizes direct user authentication (Active Directory and LDAP) must use a security certificate signed by a trusted Certificate Authority (CA). If you need help setting up your system to use a properly signed CA, please contact the VoiceThread Integration Team. VoiceThread does not store any user-credential information and immediately discards direct user authentication credentials upon authentication requests to VoiceThread. VoiceThread External Authentication VoiceThread highly recommends that medium and large organizations utilize an External Authentication implementation. This method of authentication is scalable, managed using your existing authentication infrastructure, and provides granular control for end-user authorization. There are several authentication implementations, and VoiceThread works with most standards-based solutions. However, for custom in-house solutions, VoiceThread also provides a method to authenticate users with our application programmers interface (API). Since it is important to select the best authentication implementation for your organization s current system and goals for using VoiceThread, we encourage your implementation team to carefully review this documentation and to contact VoiceThread support regarding any issues not addressed. Please note: The use of external authentication requires a valid VoiceThread-Organizational license. Every authentication implementation presented within this documentation is currently in active use by one or more VoiceThread partners. Microsoft Windows Active Directory Microsoft Windows Active Directory provides a centralized user and group management system via the Active Directory User and Computer snap-in module. Administrators can add users, update details, and change passwords via this interface. The end-user will be able to use the same credentials on VoiceThread that they use to authenticate with services that are provided through your Microsoft network. This means that your users only have to remember one user name and password. The diagram below shows the workflow for using Microsoft Active Directory authentication within VoiceThread: Figure 1: Active Directory/ldap Authentication Workflow 1. A user enters in their credentials to authenticate with VoiceThread. These are the same credentials the user would use to access a service from within their local network. 2. VoiceThread securely transmits these credentials to your Active Directory server via an encrypted connection. As soon as the user credentials are transmitted, VoiceThread immediately discards any and all credential information and awaits a response from your Active Directory server. 3. If authentication is successful, VoiceThread performs a search of the organizational structure to obtain the requested user information (such as their name and address). 4. If group authorization is used, VoiceThread confirms that the user is a member of an allowed group/organizational unit or is not a member of a restricted group/organizational unit. For new users, VoiceThread creates a new account. For existing users, VoiceThread signs them into their existing account.
3 VoiceThread requires the following configuration to use Active Directory authentication: VoiceThread must have access to an Active Directory controller via port 636. If your organization uses a firewall, you must allow VoiceThread access to this machine on this port. Please speak with the VoiceThread Integration Team for additional information. VoiceThread requires that all communication from your Active Directory service be encrypted using either TLS or SSL. Your organization must use a security certificate signed by a trusted Certificate Authority (CA). Please see for additional information. VoiceThread must be able to establish an Active Directory bind as an authenticated user. The authenticated bind allows VoiceThread to determine if the user credentials are valid and if the user is authorized to use the service. VoiceThread requires a list of base DN (see Figure 2) for users such that VoiceThread can find the user in the system, discover the appropriate details, and collect the correct role information. In the figure below the location of base DN Test OU would be located at dc=server,dc=mydomain,dc=com. A valid test account for the VoiceThread Integration Team is required. Figure 2: Active Directory User and Computer Module Summary: For Microsoft environments VoiceThread strongly recommends using this authentication implementation. Using VoiceThread Active Directory Authentication ensures that all of your organizational policies are enforced including requiring the use of strong passwords, restricting usage to a certain time periods, assigning authorized group membership, and enabling password changes to immediately propagate to all services. End users will find this approach simple, familiar, and consistent. However, if your Active Directory server is inaccessible to the Internet or providing the appropriate bind credentials is not possible, then you should strongly consider using the VoiceThread Authentication API (refer to: API Authentication).
4 Lightweight Directory Access Protocol (LDAP) LDAP is a standards based method used to store user information, credentials, roles, and group associations. There are many existing standard object class definitions for LDAP including RFC 2798 inetorgperson and posixaccount. Additionally, there are various vendor implementations of this standard including Oracle Internet Directory, Novell s edirectory, and Sun s iplanet. The VoiceThread LDAP Authentication process is similar to the Microsoft Windows Active Directory authentication process, so please read the implementation details above. VoiceThread LDAP Authentication is configurable to work with most of these implementations if they meet the following requirements: Summary: VoiceThread must have access to the LDAP server via a secure transport protocol (such as via port 636). If your organization uses a firewall, you must allow VoiceThread access to this machine on its secure LDAP port. Please speak with the VoiceThread Integration Team for additional information. VoiceThread requires that all communication from your LDAP service be encrypted using either TLS or SSL. Your organization must use a security certificate signed by a trusted Certificate Authority (CA). VoiceThread must be able to either bind as an authenticated user using an anonymous bind or have a bind DN and pass word to establish a connection for a search and bind to then authenticate on behalf of the user. The authenticated bind allows VoiceThread to determine if the user credentials are valid and if the user is authorized to use the service. VoiceThread requires a base DN (see Figure 2) for users so that VoiceThread can find the user in the system, discover the appropriate details, and collect the correct role information. A valid test account for the VoiceThread Integration Team is required. VoiceThread recommends using the LDAP Authentication integration for organizations that have a centralized login system based on the LDAP standard. Using VoiceThread LDAP Authentication ensures that all of your organizational policies are enforced including requiring the use of strong passwords, restricting usage to certain time periods, assigning authorized group membership, and enabling password changes to immediately propagate to all services. End users will find this approach simple, familiar, and consistent. However, if your LDAP server is inaccessible to the Internet or providing the appropriate bind credentials is not possible, then you should strongly consider using the VoiceThread Authentication API (refer to: API Authentication). Shibboleth/inCommon VoiceThread supports organizations that use Shibboleth for user authentication and authorization. VoiceThread has integration options for Shibboleth implementations version 1.3+ and 2.0 and higher (using version 2.0+ is highly recommended). Shibboleth allows large organizations to abstract their internal authentication and records management systems to use a common infrastructure and to provide the appropriate SAML attributes to external providers. VoiceThread works as a Shibboleth Service Provider (Shibboleth SP), requesting authorization information on behalf of the user upon access to VoiceThread. Figure 3 describes the VoiceThread Shibboleth integration process: Figure 3: Shibboleth Authentication Workflow 1.The end-user requests access to VoiceThread via your organization s VoiceThread domain (e.g. voicethread.com/) or is redirected from a similar page within the organization. 2.The VoiceThread Service Provider (SP) determines if the user is authorized to view the organization s VoiceThread instance. If the user is authorized, they are allowed to view VoiceThread without further interruption. If the user
5 has not been authorized, then they are redirected to the organization s Identity Provider (IdP) to request that the user authenticate before accessing VoiceThread. 3. Once the user is authenticated, they are once again redirected to the VoiceThread SP, and the appropriate SAML attributes are released to VoiceThread. If group authorization is used, VoiceThread confirms that the user is a member of an allowed group or is not a member of a restricted group. 4. For new users, VoiceThread creates a new account. For existing users, VoiceThread signs them into their existing account. If an existing account is not yet a member of your organization, VoiceThread will automatically request permission from the user to add their account to your organization (refer to: Existing VoiceThread Accounts and Integration). The Shibboleth Authentication process is completely transparent to the end-user and allows for a complete Single Sign On (SSO) experience, requiring the end-user to provide their credentials only once for access to all services that support Shibboleth. Many of VoiceThread s larger clients prefer this method of authentication because it reduces many of the complexities of the traditional sign-in experience and provides the end-user with a consistent interface to authenticate to all resources, whether internal or external. VoiceThread s Shibboleth Authentication is configurable to work with most of standard Shibboleth implementations as long as they meet the following requirements: If the Shibboleth IdP is not a member of incommon, VoiceThread must have information about the IdP (including the IdP URI or the URN) and a valid security certificate to establish a secure link between the SP and the IdP. The version of Shibboleth in use within the organization (e.g. version 1.3 or 2.0, etc). The organization s IdP must expose the following SAML attributes to the VoiceThread SP: A unique identifier (GUID, EPPN, Student ID, mail, or other unique method to identify users) First Name (optional, but highly recommended) Last Name (optional, but highly recommended) Mail (this attribute is used to merge existing account and is hidden from external users. This attribute is only avail able to administrators of the organization. Additionally, this attribute is only used for notification of activity within VoiceThreads of which the end- user is a member, contributor, or editor) If the organization s IdP uses a non-standard attribute mapping system, VoiceThread must have the appropriate attribute mapping (preferably in a valid XML document). A valid test account for the VoiceThread Integration Team is required. VoiceThread is a member of the InCommon Federation. This greatly simplifies Shibboleth authentication integration with colleges and universities that are already members of InCommon, which includes the majority of Research-I Universities in the United States. This should allow for faster deployments for Shibboleth authentication, with much less work on the University / Identity Provider s end. For additional information regarding our Participant Operational Practices, please refer the following document: voicethread.com/support/howto/system_integration/auth_integration/incommon_pop/ Summary: Shibboleth is a reliable, robust, single-sign-on solution for medium to large organizations. Shibboleth allows for extremely granular control of user attributes, combining multiple internal authentication systems to use one standard external format, and providing federated access to external resources. VoiceThread has been Shibboleth compliant since 2008 and has several organizations that use this as their preferred option for authentication. Organizations that currently use Shibboleth for their user authentication are encouraged to use this approach to also access VoiceThread. If your organization does not have a public-facing IdP authentication site or if it prefers to serve as both the IdP and SP, we recommend using VoiceThread API Authentication along with your Shibboleth configuration. If you have any question regarding implementing your Shibboleth IdP with VoiceThread, please contact the VoiceThread Integration Team. Central Authorization Service (CAS) VoiceThread supports user authorization using the Central Authorization Service (CAS) protocols. The CAS process is analogous to the Shibboleth authentication integration, except there are a few differences in implementing the two protocols (see Figure 3 for a diagram of the authentication workflow). VoiceThread only supports CAS implementations that also expose SAML attributes that can be used to authenticate a user, and thus choosing this option requires that your organization use a version of CAS that supports submitting SAML attributes.
6 The VoiceThread Integration Team can work with your User and Identity Management department to ensure that these attributes are being successfully captured during the user authentication process. To use CAS with VoiceThread, your organization s implementation must meet the following requirements: The organization s CAS instance must expose the following SAML attributes to VoiceThread: A unique identifier (GUID, EPPN, Student ID, mail, or other unique method to identify users) First Name (optional, but highly recommended) Last Name (optional, but highly recommended) Mail (this attribute is used to merge existing account and is hidden from external users. This attribute is only available to administrators of the organization. Additionally, this attribute is only used for notification of activity within VoiceThreads in which the end- user is a member, contributor, or editor) The version of CAS in use within the organization (e.g. 2.0, 2.1, etc). The location of the CAS authorization server and path to access the CAS service. A valid test account for the VoiceThread Integration Team is required. Pearson Learning Studio Authentication VoiceThread provides integration and authentication integration with Pearson s Learning Studio, a Learning Management System (LMS). If your organization uses Pearson Learning Studio, it is recommended that you use Learning Studio SSO integration and authentication with VoiceThread. As with all VoiceThread authentication options, user information is sent securely to VoiceThread for processing, using Pearson Learning Studio Authentication built-in encryption methods. This type of authentication will require personal communication with the VoiceThread Integration Team, as the Learning Studio authentication process is highly customizable. If you have any question regarding implementing your Learning Studio LMS with VoiceThread, please contact the VoiceThread Integration Team for additional details. Moodle Authentication For any organization that uses Moodle as their Learning Management System (LMS), Moodle Authentication is available for authenticating with VoiceThread. The Moodle Authentication module is a version of the API Authentication packaged exclusively for the Moodle LMS. This method of authentication requires installing a block (the name for modules within Moodle) on your organization s Moodle instance that will be accessible to those who should have access to VoiceThread. Users will be able to click this block and have their Moodle information encoded and sent to VoiceThread (see Figure 4 below for an overview of the process). To use VoiceThread Moodle Authentication, your organization s implementation must meet the following requirements: The organization must be using version 1.9+ or 2.0+ of Moodle. Users within your Moodle instance must have a first name, last name, , and username. A server with access to the Internet since the VoiceThread API requires a token be requested from VoiceThread before each authentication request. The organization must have an authentication key, organization ID, VoiceThread API key, and custom VoiceThread URL (provided by the VoiceThread Integration Team) to use this service. API Authentication VoiceThread recommends using API Authentication for organizations that use custom authentication solutions, are unable to provide VoiceThread with access to its internal authentication system, or wish to streamline their internal authentication process. VoiceThread API Authentication is a very flexible token-based authentication process that allows your organization to determine the validity of its users, package relevant authorization information, and send this information to VoiceThread to enable them to sign in. The API Authentication design is quite flexible, can be written in any programming language of your choice (provided it follows the design specifications), and is designed with security in mind. At no time are user credentials needed or sent, all requests are sent using SSL, and the VoiceThread API Authentication is designed to prevent reply-authentication attacks. The VoiceThread Integration Team can provide your organization with sample source code and documentation that can be used to create its own authentication system. To use VoiceThread API Authentication, your organization s implementation must meet the following requirements:
7 The organization must have a programmer who can read through documentation and source code to produce a working authentication solution. A unique identifier (GUID, EPPN, Student ID, mail, or other unique method to identify users) and address for users. A server with access to the Internet since the VoiceThread API requires a token be requested from VoiceThread before each authentication request. The organization must obtain a secret key (provided by the VoiceThread Integration Team). Figure 4: VoiceThread Authentication using the API 1. The end-user requests access to VoiceThread via your organization s internal authentication site. This could be a website, portal page, or any other method. 2. Your organization authenticates and authorizes the end-user to use the VoiceThread service. 3. Your organization s internal authentication code assigns the end-user parameters to submit (including unique identifier, , etc) and r quests an authentication session token from VoiceThread. 4. The end-user transmits these signed credentials securely to VoiceThread, and is either signed in with an existing account or given a new account. If an existing account is not yet a member of your organization, VoiceThread will automati cally request permission from the user to add their account to your organization. For more information, please refer to: Existing VoiceThread Accounts and Integration. VoiceThread Basic Authentication Voicethread provides a basic way for your organization to allow users to sign in without the use on any external authentication systems. There are two ways for your organization to allow users to sign in: creating a formatted Comma Separate Values (CSV) file with user information and by adding information for users, or one-at-a-time. VoiceThread recommends this system for small organizations with fewer than two hundred users, and for anything larger we strongly recommend using the external authentication methods detailed above. This system is not designed to handle a large number of users and can make managing hundreds of users difficult in the future. This method should not be used in conjunction with any of the other external authentication methods listed above. Comma Separated Values Upload The VoiceThread Manager allows your organization to upload a CSV file to populate users within VoiceThread. In the VoiceThread Manager (available at under the Add Users option is a location to upload a CSV file of users. The CSV file must follow the specifications outlined in the sample file format document. If your CSV is not compliant with the sample file, you will be notified of any issues during the upload process. The CSV file must contain the following information (please consult the sample document for additional requirements):
8 The first name of the user (will remain private to your administrators). The last name of the user (will remain private to your administrators). A valid address for the user (or a unique username if you have a K-12 school or classroom VoiceThread subscription). An identity name that will appear with VoiceThread creation or comments (optional). Password (six characters or longer). One-at-a-time user addition The one-at-a-time user addition system allows your organization to add users on demand. In the VoiceThread Manager (available at under the Add Users option you are presented with the ability to add a single user. The one-at-a-time user additions must contain the following information (please consult the VoiceThread Manager for additional requirements): The first name of the user (will remain private to your administrators). The last name of the user (will remain private to your administrators). A valid address of the user (or unique username if you have a school or classroom subscription). An identity name that will appear with VoiceThread creation or comments (optional). Password (six characters or longer). VoiceThread Information System Integration (VISI) The VoiceThread Information System Integration (VISI) enables the automatic synchronization of user, role, and group membership information from your Information Management System to VoiceThread. VISI automatically assigns members into VISI Groups based on their current membership in a course or department, and it assigns member roles within these VISI Groups as well as maintains consistency of your member information. VISI is designed to work with most Information Management and Enterprise Resource Planning systems, and is configurable to work with custom in-house solutions. Implementing VISI allows for a seamless experience for the end-user while allowing your organization to leverage the power and flexibility of your current Information Management System infrastructure. Additional information about VISI is available at For more information regarding systems integration, please consult with the VoiceThread Integration Team. Existing VoiceThread accounts and Integration If you have users of your organization who were members of VoiceThread before you implemented external authentication, VoiceThread provides a process to ensure that all of their content is migrated successfully. The VoiceThread Account Merger process will identify users based on their address or unique identifier and ask for their existing VoiceThread.com password before allowing them to continue with the authentication process. Upon successful authentication, VoiceThread will make all of the user s existing content available to your organization so that users can share and collaborate on content seamlessly. The VoiceThread Account Merger process requires that a valid address be specified for the user of an external authentication system and that the address matches the address they initially used to register for VoiceThread. If the user originally registered with a different address than that on record with your organization s information system and their content is not merged upon authentication, they should contact VoiceThread Support with both addresses to request that their accounts be merged manually.
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Skyward LDAP Launch Kit Table of Contents
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
ProxySG TechBrief LDAP Authentication with the ProxySG
ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.
Most clients utilize an external directory tool, such as Microsoft Active Directory, to provide authentication. CA Embedded Entitlements Manager (EEM) can be configured to integrate with the same external
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Active Directory Integration 855.426.7227. www.onelogin.com twitter.com/onelogin ONELOGIN WHITEPAPER
Active Directory Integration Even as enterprises continue to adopt more cloud applications, Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) still play a critical role in how information
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple how-to whitepapers will
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
From centralized to single sign on
The LemonLDAP::NG project Abstract LemonLDAP::NG is a modular WebSSO (Web Single Sign On) software based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Qualtrics Single Sign-On Specification
Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
Mediasite for the enterprise. Technical planner: TP-05
Mediasite for the enterprise Technical planner: TP-05 2011 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc.
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
CERN Single Sign On. http://cern.ch/login. Emmanuel Ormancey CERN IT/IS. CERN IT Department CH-1211 Genève 23 Switzerland www.cern.
CERN Single Sign On http://cern.ch/login Emmanuel Ormancey CERN IT/IS Agenda History CERN Authentication Main goals Authentication methods Demo overview Technical background Identity provider Service providers
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management
MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management A Technical Best Practices White Paper About This Document This whitepaper explores the challenges
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
Identity Management in Quercus. CampusIT_QUERCUS
Identity Management in Quercus Student Interaction. Simplified CampusIT_QUERCUS Document information Document version 1.0 Document title Identity Management in Quercus Copyright All rights reserved. No
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Synchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows
Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows SecureZIP for Windows interoperates with leading PKI vendors including Entrust, VeriSign, and RSA to enable the
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
NETASQ ACTIVE DIRECTORY INTEGRATION
NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos
Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015
Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)
Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF) Introduction SonicWALL Unified Threat Management (UTM) appliances running SonicOS Enhanced 3.0 support
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
Increase the Security of Your Box Account With Single Sign-On
A Box White Paper Increase the Security of Your Box Account With Single Sign-On Box s high level of security, 24x7 support and 99.9% uptime are critical for us. The biggest benefits are the reliability
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Disclaimer The following is intended to outline our general product
Configuring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] User Identification Overview User Identification allows you to create security policies based
Technical Brief ActiveSync Configuration for WatchGuard SSL 100
Introduction Technical Brief ActiveSync Configuration for WatchGuard SSL 100 October 2009 With ActiveSync, users get push functionality to keep email, calendar, tasks, and contacts up to date on a mobile
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
Okta White paper Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-dint-053013 Table of Contents
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER OVERVIEW OF OPEN VIRTUAL DESKTOP Mathieu SCHIRES Version: 1.0.2 Published April 9, 2015 http://www.inuvika.com Contents 1 Introduction 2 2 Terminology and
How To Take Advantage Of Active Directory Support In Groupwise 2014
White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
LDAP Synchronization Agent Configuration Guide
LDAP Synchronization Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights
Active Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator
Top 10 Questions to Ask when Choosing a Secure File Transfer Solution
Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Companies that have made an investment in a Secure File Transfer
An Oracle White Paper September 2013. Directory Services Integration with Database Enterprise User Security
An Oracle White Paper September 2013 Directory Services Integration with Database Enterprise User Security Disclaimer The following is intended to outline our general product direction. It is intended
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
ManageEngine ADSelfService Plus. Evaluator s Guide
ManageEngine ADSelfService Plus Evaluator s Guide Table of Contents Document Summary:...3 ADSelfService Plus Overview:...3 Core Features & Benefits:...4 ADSelfService Plus Architecture:...5 Admin Portal:...
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
AVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
