Two-factor authentication service for applications and desktops
|
|
|
- Beryl Wilson
- 10 years ago
- Views:
Transcription
1 AVC-IT & CIO FY BUDGET PLANNING INTERNAL USE Two-factor authentication service for applications and desktops ABBA Category Two: Information Technology 1. Amount of One-Time Funding Request (FY 1): $67, Control Unit/Department Funding Contribution: $ 3. Department(s) to receive funding: IST - CalNet 4. Project Manager: Dedra Chamberlin/CalNet PM 5. Describe the Activity: A number of IST and campus departments have expressed a need to deploy two-factor authentication to protect sensitive systems and information. IST has been working on a two-factor Proof of Concept based on the Yubico YubiKey. The PoC is due to complete near the end of this fiscal year. This is a request to expand the PoC to a campus-wide two-factor authentication service. The Yubico YubiKey is a USB-based, event-driven, one time password token that is synchronized with a server. As the token lacks a PIN or passphrase, it is only a single factor device. The Validation Server is an open-source, PHP-based server requiring no per-seat license costs. The tokens are relatively inexpensive, making this a significantly more affordable option. The YubiKey is proposed provided that: 1. It is used with the CalNet Passphrase at each authentication event. (This may be easier with certain authentication mechanisms such as CAS, Shibboleth, or PAM than for network devices or Windows.) 2. Login from mobile devices (generally lacking a USB port) is not required. 6. Describe the significance of the activity, indicating how the activity is in alignment with Chancellor s objectives (see : 1. In the world of electronic identity, authentication refers to the act of proving that a person requesting a transaction is who they claim to be. This can be accomplished by using one of the following: 1. Something the person knows that is known only to that person, such as a password or PIN. 2. Something the person has that nobody else does, such as a personal hardware token or ID card. 3. Something the person is, that is something intrinsic to the individual such as a fingerprint or retina scan. April 25,
2 AVC-IT & CIO FY BUDGET PLANNING INTERNAL USE No single factor is perfect. Passwords can be shared or obtained via social engineering techniques, hardware tokens can be stolen or borrowed, biometric signatures can be copied. The requirement of two factors to authenticate an individual (two-factor authentication or T-FA) reduces the risk that the individual s credentials have been compromised, therefore increasing the level of assurance that the individual is who they claim to be. 2. At UC Berkeley, the common central authenticator is the CalNet Passphrase, something the person knows. An additional authenticator, the CalNetKey, is also something the person knows (in this case a PIN instead of a passphrase), and is therefore insufficient for a second factor. For purposes of implementing T-FA, any new technology must be either something a person has or something a person is. 3. Reference: UC Berkeley Two-Factor Authentication: Analysis and Approach, July Prepared on behalf of the CalNet Identity and Access Management team with input from IST and campus collaborators. Please see UCB Two-Factor Authentication - Draft (.pdf). Having a second authentication credential in use reduces the potential security impact for individuals following any compromise of the primary (CalNetID) authentication credential. This in turn encourages the wider use of the primary authentication technology in otherwise marginal applications, or by applications that might otherwise have to apply for an exception to the stricture on proxy CalNet authentication, thus improving the general security posture of the campus. The existence of TF-A services will facilitate the creation and secure deployment of applications dealing with sensitive data for use by appropriate audiences. As noted above, a two-factor authentication service would provide a measure of security needed to implement other OE initiatives such as student/staff portals, the advising toolkit, online performance evaluation tools, and online financial planning tools. The impact on existing applications is to provide an option to enhance their security for a wider audience while potentially eliminating less secure mitigation to risk that may be in use as an alternative to TF-A. Some departments have stated that if a central two-factor solution is not implemented, they will need to implement one on their own. This would be inefficient and difficult to support over time. 7. Work Plan Provide a work plan for the proposed solution with high-level steps to complete the solution, including timeline. (Try to limit your plan to no more than seven steps.) Milestone 1. Complete and document the Proof of Concept (POC) project already in place 2. Develop policy outlines and assign ownership of policy and technology Timeline Summer 2011 Summer/Fall 2011 April 25,
3 AVC-IT & CIO FY BUDGET PLANNING INTERNAL USE 3. Scale the POC technolgies to meet initial target needs Fall 2011 Work with Cal 1 Card to design frontline support for campus-wide 4. service and train support staff Spring Scale POC to meet larger campus need Summer Begin user training and education Summer Evaluate implementation success and consider improvements or alternatives Ongoing 8. Describe any savings or increase in income that will result from this activity, and how it will be measured. Distinguish savings in time and/or money, and identify any resulting reduction of staffing levels. Improving the security for sensitive campus applications reduces the need for expensive and image-damaging notifications and costly related measures following security breaches. TF-A is often mandated by policy or law in certain circumstances which places campus units in the position of having to forgo some functionality or operate in a non-compliant fashion. There are several OE resource requests that would likely require the use of second-level or twofactor authentication given the sensitivity of the data being protected, such as staff payroll information in the case of the staff portal proposal, student grades and advising records in the case of the Academic Commons and Advising Toolkit proposals. 9. Funding: describe the overall funding plan for this activity. Describe any cost-sharing, matching, or external fund sources that might be used to support the activity. The above referenced analysis of two-factor authentication solutions for UC Berkeley outlined proposed implementation costs for such a service as follows: Task Setup Maintenance (Yr) Backend Infrastructure $3,840 $16,752 Client Infrastructure $33,600 $3,840 Token Management $10,880 $2,560 Policy $32,000 $1,920 Total $25,072 The two-factor Proof of Concept project funded through the IST-DCAT this year has covered the setup costs for backend and client infrastructure. This request is for funding to cover the token management and policy costs for setting up and initial service and for maintenance/operating costs for one year. The service could become self-sustaining within 1-2 years if it were deployed as a recharge service. April 25,
4 AVC-IT & CIO FY BUDGET PLANNING INTERNAL USE Total request for funding is: Year 1: Token management setup: $10,880 Policy: $32,000 Maintenance for year 1: $25,072 Grand total: $67,952 April 25,
5 UC Berkeley - FY Campus Budget Process Section V: Block Grant Funding Model and Budget Block Grant Name: Two Factor Authentification Projections Funding Model Sources Item # FY FY FY Cummulative Total 1 IST Other Sources Request for Block Grant 67, ,952 4 Grand Total 67, ,952 Expense Budget Projections Cummulative Total FY FY FY Salaries Benefits Consultants/Contractors 50, ,672 8 General S&E Hardware Maintenance Infrastructure Services - cost of recharge services 17, , Inventorial Equipment Software Maintenance/Licenses Software Purchase Travel/Training Other Costs Grand Total 67, , FUNDS LESS EXPENSE $0 $0 $0 $0 18 Carryforward $0 $0 $0 19 Cummulative Total $0 $0 $0 $0 FY Block Grant Request Application
6 UC Berkeley - FY11-12 Campus Budget Process Section V Part II: Line Item Description of Funding Model and Budget Block Grant: Two Factor Verification Title Item Funding Model Sources # 1 IST 2 Other Sources 3 Request from the Block Grant 68K 4 Total Funding Description Expense Budget 5 Salaries 6 Benefits 34% 7 Consultants/Contractors assist with proof of concept and policy 8 General S&E 9 Hardware Maintenance Infrastructure services (backup, storage, colocation, 10 network nodes, desktop support, etc.) 11 Inventorial Equipment 12 Software Maintenance/Licenses 13 Software Purchase 14 Travel/Training 15 Other Costs 16 Total Expenses backend infrastructure, client infrastructure, token management, policy 17 FUNDS LESS EXPENSES Funds Less Expenses 18 Carryforward 19 Cummulative Total FY Block Grant Request Application
7 Budget Area Dept Org Id Budget Category Line of Business Initiative Funded by Expense Category Expense Description FY11 Actuals FY12 Proj Amt FY13 Proj Amt FY14 Proj Amt Cummulative Base FY11 Amt Base FY12 Amt Base FY13 Amt FY11 Proj FY12 Proj FY13 Proj FY09 Base FY10 Base FY11 Base FY12 Base FY13 Base Funding Funding Type Funding Source Received Date Account Program Fund Notes Request for Block Infrastructure Services Major Project Grant Consultants/Contractors $ - $ 50, $ - $ - $ 50, General S&E $ - $ - $ - $ - $ - Hardware Maintenance $ - $ - $ - $ - $ - Request for Block Infrastructure Services - cost of Infrastructure Services Major Project Grant recharge services $ - $ 17,280 $ - $ - $ 17, Inventorial Equipment $ - $ - $ - $ - $ - Other Costs $ - $ - $ - $ - $ - Software Maintenance/Licenses $ - $ - $ - $ - $ - Software Purchase $ - $ - $ - $ - $ - Travel/Training $ - $ - $ - $ - $ - Other Costs $ - $ - $ - $ - $ - Other Costs $ - $ - $ - $ - $ - Salaries $ - $ - $ - $ - $ - Benefits $ - $ - $ - $ - $ - Salaries $ - $ - $ - $ - $ - Benefits $ - $ - $ - $ - $ - 0% 0% 0% 0% 0% Central Permanent 0% 0% 0% 0% 0% Central Permanent 0% 0% 0% 0% 0% Central Permanent 0% 0% 0% 0% 0% Central Permanent
8 Budget Area Dept Org Id Budget Category Infrastructure Services Major Project Infrastructure Services Major Project
9 Line of Business Initiative Expense Category Consultants/Contractors Infrastructure Services - cost of recharge services
10 Expense Description FY11 Actuals FY12 Proj Amt FY13 Proj Amt $ 50,672 $ - rge services $ 17,280 $ - $ - $ - $ - $ -
11 FY14 Proj Amt Cummulative Funding Type $ - $ 50,672 $ - $ 17,280 $ - $ - $ - $ -
12 Request for Block Grant Request for Block Grant IST Other Sources Funding Source Program Fund
13 Notes
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
NetMotion + YubiRADIUS Quick Start Guide
NetMotion + YubiRADIUS Quick Start Guide March 22, 2013 NetMotion + YubiRADIUS Quick Start Guide 2012 Yubico. All rights reserved. Page 1 of 7 Introduction Disclaimer Yubico is the leading provider of
IT Governance Committee Review and Recommendation
IT Governance Committee Review and Recommendation Desired Change: Approval of this policy will establish Security Standards for the UCLA Logon Identity for anyone assigned a UCLA Logon ID/password and
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Departmental On-Site Computing Support (DOCS) Server Support SLA
1 General Overview This is a Service Level Agreement ( SLA ) between the customer and Departmental On-site Computing Support (DOCS) to document: The technology services DOCS provides to the campus. The
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
YubiRADIUS Deployment Guide for corporate remote access. How to Guide
YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
Modern two-factor authentication: Easy. Affordable. Secure.
Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks
Multi-Factor Authentication Core User Policy and Procedures
Multi-Factor Authentication Core User Policy and Procedures Core Users with access to other people s sensitive or restrictive information must use one-time passwords (OTP) generated from approved fobs
YubiKey Authentication Module Design Guideline
YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business
Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA
Vulnerability Management Policy
Vulnerability Management Policy Policy Statement Computing devices storing the University s Sensitive Information (as defined below) or Mission-Critical computing devices (as defined below) must be fully
Jim Bray, Cyber Security Adviser InfoSight, Inc.
Best Practices for protecting patient data Training and education is your best defense! Presented by Jim Bray, Cyber Security Adviser InfoSight, Inc. 2014 InfoSight Cyber Security starts with education
SECURING YOUR REMOTE DESKTOP CONNECTION
White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY
Facebook s Security Philosophy, and how Duo helps.
Facebook s Security Philosophy, and how Duo helps. How Duo Factors in to Facebook s Information Security Philosophy The Challenge: Facebook manages personal data for 1.19 billion active users 1 across
Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management
Multi-Factor Authentication for your Analytics Implementation Siamak Ziraknejad VP, Product Management 1 Agenda What is Multi-Factor Authentication & Why is it important The Usher Security Badge Badge
Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd
Stop Identity Theft with Transparent Two-Factor Authentication e-lock Corporation Sdn Bhd December 2009 Table Of Content Table Of Content... 2 Executive Summary... 3 1. Introduction... 4 1.1 The Issue
Multi- factor Authentication Initiative
Multi- factor Authentication Initiative "UCR s Multi- factor Authentication Initiative is an easy- to- use solution to our need to secure our campus community s credentials. The Duo Security system that
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix
Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide
Replacing legacy twofactor authentication with YubiRADIUS for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection.
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
1 Introduction... 3 2 Product overview... 4. 2.1 Product description... 4. 3 System requirements... 7. 3.1 Software support... 7
Product announcement ----------------------------------------------------------------------------- ASEBA SxS PAAS module ----------------------------------------------------------------------------------------------------------
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
Using GhostPorts Multi-Factor Authentication
Using GhostPorts Multi-Factor Authentication With CloudPassage Halo GhostPorts is a powerful multi-factor authentication feature available with the Halo NetSec and Halo Professional subscription plans.
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY. Axel Hoffmann
2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY Axel Hoffmann Biography Axel Hoffmann Linux System Administrator 1&1 Mail & Media Dev. & Tech. GmbH [email protected] 2 Introduction Requirements
YubiKey & OATH- TOTP Verification
YubiKey & OATH- TOTP Verification February 7, 2014 YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 1 of 11 Introduction Disclaimer Yubico is the leading provider of simple, open
Evolving Strong Authentication at The University of Arizona
Evolving Strong Authentication at The University of Arizona Gary Windham Senior Enterprise Systems Architect The University of Arizona, UITS [email protected] Where are we today? credential strength
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA
2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
Procedure for How to Enroll for Digital Signature
Procedure for How to Enroll for Digital Signature In Online Processing System getting to implement Digital Signature and Electronic Token for security and Authentication Purpose. For that bidder must have
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
Two-Factor Solutions Choosing the Right One"
Copyright (c) 2013 RCDevs S.A. (http://www.rcdevs.com) - Page 1/ Two-Factor Solutions Choosing the Right One By RCDevs (http://www.rcdevs.com/) The need to secure access to online applications and resources
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology
Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Step-by-Step Integration Guide. Tesline-Service S.R.L. 10 Calea Iesilor str., Chisinau, MD-2069, Moldova. Tel: +373-22-740-242 www.rohos.com
September 25, 2015. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication
Programming YubiKeys for Okta Adaptive Multi-Factor Authentication September 25, 2015 Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 1 of 14 Copyright 2015 Yubico Inc. All rights
Secure Testing Options for the University
Secure Testing Options for the University Jason Smith Innovation in Learning Center April 12, 2011 Introduction The University of South Alabama currently offers 350 fully online courses annually. In fall
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Who s There? A Methodology for Selecting Authentication Credentials. VA-SCAN October 5, 2009 Mary Dunker [email protected]
Who s There? A Methodology for Selecting Authentication Credentials VA-SCAN October 5, 2009 Mary Dunker [email protected] Who s There? Driving by your house Do you care? Probably not -- anyone can look 2 Who
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Service Description. 3SKey. Connectivity
Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey
Frequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
OVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
INUVIKA OVD SUPPORT SUPPORT SYSTEM GUIDE. Mathieu Schires Version 1.1 Published 28/04/2015
INUVIKA OVD SUPPORT SUPPORT SYSTEM GUIDE Mathieu Schires Version 1.1 Published 28/04/2015 This document describes how to use the Inuvika Support System for reporting support incidents related to Inuvika
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
IST Drupal Cloud Hosting SLA
Table of Contents 1 General Overview 3 2 Service Description 3 2.1 Service Scope 3 2.2 Assumptions 4 3 Roles and Responsibilities 5 3.1 Parties 5 3.2 Research & Content Technologies Responsibilities 5
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Configuring a YubiKey for the YubiCloud
Configuring a YubiKey for the YubiCloud With the YubiKey Cross-Platform Personalization Tool April 9, 2013 Configuring a YubiKey for the YubiCloud 2012 Yubico. All rights reserved. Page 1 of 8 Introduction
University of California, Berkeley
University of California, Berkeley Performance Management Executive Briefing As part of UC Berkeley s commitment to excellence, we must support the excellence of our staff. The process of Performance Management
Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support
Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version
YubiCloud Validation Service. Version 1.1
YubiCloud Service Version 1.1 5/29/2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship product, the YubiKey, uniquely combines
2 FACTOR + 2. Authentication WAY
2 FACTOR + 2 WAY Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5
Defender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
DIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
A Guide to Managing Microsoft BitLocker in the Enterprise
20140410 A Guide to Managing Microsoft BitLocker in the Enterprise TABLE OF CONTENTS Introduction 2 Why You Can t Ignore Effective FDE 3 BitLocker by Default 4 BitLocker s Total Cost of Ownership 5 SecureDoc
Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1
Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called
Using GhostPorts Two-Factor Authentication
Using GhostPorts Two-Factor Authentication With CloudPassage Halo GhostPorts is a powerful two-factor authentication feature available with the Halo NetSec and Halo Professional subscription plans. GhostPorts
Virtual Private Networks (VPN) Connectivity and Management Policy
Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
How do I Configure my Apple iphone 3G for Haas Exchange Email?
How do I Configure my Apple iphone 3G for Haas Exchange Email? This documentation assumes that you are configuring your iphone for the first time to connect with Haas exchange email server. Please be advised
Remote Access Policy
BASINGSTOKE AND NORTH HAMPSHIRE NHS FOUNDATION TRUST Remote Access Policy Summary This is a new document which sets out the policy for remote access to the Trust s network and systems. Remote access is
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
VIP YubiKey Unlock Guide
VIP YubiKey Unlock Guide Unlocking the VIP YubiKey for YubiCloud OTP February 22, 2013 VIP YubiKey Unlock Guide 2012 Yubico. All rights reserved. Page 1 of 9 Introduction Yubico is the leading provider
