Safewhere*Identify 3.4. Release Notes

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Safewhere*Identify 3.4. Release Notes"

Transcription

1 Safewhere*Identify 3.4 Release Notes

2 Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations. Safewhere*identify allows an organization to handle user identification and administration centrally and external to all web applications and web services. Safewhere*identify allows the support of basically any kind of authentication. Apart from built-in mechanism of authenticating like username and password, it also supports popular social authentication methods like Facebook, Google, Twitter, or LinkedIn, as well as all modern federation solutions via the SAML 2.0, and WS-Federation protocols. This new version enhances the system s ability in supporting complex user scenarios, guarantees full flexibility in regards to localization and message customization, ads additional authentication options, and ensures support for different browsers and browser versions. This release note gives an introduction to all the new features of version 3.4. Localization Identify*runtime has been rewritten to provide full control over look and feel of all pages as well as provide a robust framework for localization to any language and support of different browsers and browser versions. This includes default support for Danish and English, option to introduce new languages, override existing text resources, and even add new text resources. This feature allows users to localize pages, since we know from experience that such customized pages can help provide an even better user experience. Important features of the new localization system are: Fallback support; if a text is not found in a specific language, it will instead use the text resource of a configurable default language. Administrators can override existing default text resources with their own custom texts. Text resources can be edited by administrators during runtime. Adding support for a new language is as simple as copying a file. The system supports standard.net resource files, making it possible to reuse existing tooling support. Supports localized custom text resources, i.e. an administrator can add new pages not included in the standard product, as well as customize existing pages and have all text be localized in the user s chosen language.

3 Authentication and Protocol Connections Version 3.4 greatly improves the existing support for social network authentication connections. With version 3.3 we already added support for Facebook, Google, Twitter, LinkedIn, and OpenId. We now add login via LiveId to this list. On top of this we have ensured that 2-factor authentication and Single Logout (SLO) are fully supported with all of these connection methods. During this version we have also tested and ensured that Identify works with SharePoint In this way companies and organizations can now support Single Sign-On to SharePoint 2013 via Identify. Another type of second factor, similar to the existing SMS and One Time Password (OTP) support, was also added in the latest version. This new type is called a Mobile Login connection, since it utilizes a mobile device for delivering the second factor without the user needing to take any additional action, which is a very attractive solution both in regards to usability as well as financially. The idea behind this authentication method is that the user initially logs in to a personal profile page via regular 2-factor authentication, where a code for use on the mobile device is created. The first time the user initiates authentication via the mobile device, he will be asked to supply this code, which will then be used to create a unique cookie on the device. The next time the user then authenticates via this mobile device, he will just be exposed to the primary authentication requirements (typically username and password ), since the secondary authentication factor is handled by Identify simply checking that the code in the cookie is valid. Another feature that has been added to manage the increasing number of mobile users is one that controls the types of authentication methods that are offered on mobile devices. For each authentication connection type it has been made possible to specify if it should be offered for mobile use making it possible to e.g. exclude logins requiring Java. It can also be used to ensure that users are forced to use certain authentication methods from mobile devices. The One-Time Password authentication page has also been improved so that it provides users information on whether his OTP was sent via or SMS, as well as additional information on what he is supposed to do next. Another minor improvement concerns the page that users end up on after Single Logout. Where users were earlier redirected to the Identity Provider login page after logging out, we have now changed it so that the user is sent to a customizable information page.

4 Claim Transformation The claims transformation pipeline has seen a significant upgrade, with the addition of two new and very flexible claim transformation rules. The first one is the SQL Transformation rule, which supports the execution of queries on an SQL database when selected conditions in a user s token have been met. Values from the token can be used as parameters in the SQL query, making it possible to e.g. transfer values from the token into external user storages. With this new rule an additional option was also added to the condition regex syntax called ExistOrg(claim type). It makes it possible to check if the value for a claim type in a user s token, exists as an organization name in Identify. This can be e.g. be used to check whether a new organization needs to be created on the fly using the SQL Transformation rule. The other new rule is for External Claim Transformation, which among other things, allows data from external systems to be included in the users token, complex business processes to be included in the claim transformation pipeline, or simply just do advanced transformations of existing data in the pipeline. Even though the existing transformation rules in Identify covers a wide range of needs, there will still be scenarios where regular rules will not suffice. Using the External Claim Transformation rule a customer can code their own steps and plug them into Safewhere*identify s pipeline. A minor extension in regards to the pipeline, was the addition of an exclude from pipeline setting on all claim types. If there is a claim type that we never want issued to a token, excluding it using this setting is a lot easier than having to add an exclusion transformation step for all pipelines. Logging Logging has been further improved to include more information in the audit log reports, including more detailed user information and information on executed mass user updates and objects that were deleted. But the most important improvement has been in the way that errors are shown and logged. The error handling architecture has been completely rewritten so that all error messages from runtime now include a traceable event ID. This event ID is also attached to the errors when they are logged which makes it possible to extract reports from the system that quantifies the types of errors that have occurred. Administration

5 The following capabilities have been introduced, that will make the system more user friendly for administrators: It is possible to specify per user whether he or she should be forced to change password during the next login. The default state for whether new users should change password on the first login has been supplied as a setting on organization. The configurator has been improved to better handle unique situations as well as show clearly if the installation is still ongoing. An administrative page has been added in which it is possible to edit the regex expressions and error messages used for validation rules on fields like passwords, usernames and s. The pages for Audit Log and Server Settings have been moved to the System Settings tab, so access to these pages now requires the SystemSetupAdmin role. Usability improvements The user interface in version 3.4 has added full support for Internet Explorer 10, support for NemId applet on Windows 8 browsers, and improved rendering of Safari. Other improvements include: Default for Restrict elevation setting on claims has been changed to false, since this has turned out to be the most used setup. An error message is now shown if mass update of users was done without having highlighting any records. It was earlier necessary to write /admin/ in the URL to connect to the Identify*admin site. Now it is also possible to only write /admin.

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

SECUREAUTH IDP AND OFFICE 365

SECUREAUTH IDP AND OFFICE 365 WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that

More information

Identity. Provide. ...to Office 365 & Beyond

Identity. Provide. ...to Office 365 & Beyond Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

Safewhere*Identify. Introduction. You just need one system for all your user on-boarding, admin and authentication

Safewhere*Identify. Introduction. You just need one system for all your user on-boarding, admin and authentication Safewhere*Identify Introduction You just need one system for all your user on-boarding, admin and authentication Contents Introducing Safewhere Identify... 3 Facebook, Google, Active Directory, one-time

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service

SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service Document Version: 1.0 2014-09-01 Content 1....4 1.1 Release s....4 1.2 Product Overview....8 Product Details.... 9 Supported Browser Versions....10 Supported Languages....12 1.3 Getting Started....13 1.4

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Portal Instructions for Mac

Portal Instructions for Mac Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Contextual Authentication: A Multi-factor Approach

Contextual Authentication: A Multi-factor Approach Contextual Authentication: A Multi-factor Approach Multi-factor Authentication Layer v.3.2-003 PortalGuard dba PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail:

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Deploying RSA ClearTrust with the FirePass controller

Deploying RSA ClearTrust with the FirePass controller Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies

More information

Mashup Sites for SharePoint 2007 Authentication Guide. Version 3.1.1

Mashup Sites for SharePoint 2007 Authentication Guide. Version 3.1.1 Mashup Sites for SharePoint 2007 Authentication Guide Version 3.1.1 Copyright Copyright 2010-2011, JackBe Corp. and its affiliates. All rights reserved. Terms of Use This documentation may be printed and

More information

Mashup Sites for SharePoint 2007 Authentication Guide. Version 3.2.1

Mashup Sites for SharePoint 2007 Authentication Guide. Version 3.2.1 Mashup Sites for SharePoint 2007 Authentication Guide Version 3.2.1 Copyright Copyright 2012, JackBe Corp. and its affiliates. All rights reserved. Terms of Use This documentation may be printed and copied

More information

OpenLogin: PTA, SAML, and OAuth/OpenID

OpenLogin: PTA, SAML, and OAuth/OpenID OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

OpenSSO: Cross Domain Single Sign On

OpenSSO: Cross Domain Single Sign On OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Logout Support on SP and Application

Logout Support on SP and Application Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team aai@switch.ch Single Logout: Is it possible? Single Logout will work only in some

More information

Using Foundstone CookieDigger to Analyze Web Session Management

Using Foundstone CookieDigger to Analyze Web Session Management Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.

More information

ManageEngine ADSelfService Plus. Evaluator s Guide

ManageEngine ADSelfService Plus. Evaluator s Guide ManageEngine ADSelfService Plus Evaluator s Guide Table of Contents Document Summary:...3 ADSelfService Plus Overview:...3 Core Features & Benefits:...4 ADSelfService Plus Architecture:...5 Admin Portal:...

More information

i-mobile Multi-Factor Authentication

i-mobile Multi-Factor Authentication i-mobile Multi-Factor Authentication Introduction... 1 i-mobile Multi-Factor Authentication... 1 i-mobile WAP MFA Enrollment... 2 i-mobile Application MFA Enrollment... 4 Error Conditions and Resolutions...

More information

Dell One Identity Cloud Access Manager 8.1

Dell One Identity Cloud Access Manager 8.1 Dell One Identity Cloud Access Manager 8.1 October 2015 These release notes provide information about the release. About New features Enhancements Resolved issues Known issues System requirements Browser

More information

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a

More information

From centralized to single sign on

From centralized to single sign on The LemonLDAP::NG project Abstract LemonLDAP::NG is a modular WebSSO (Web Single Sign On) software based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the

More information

PHP Integration Kit. Version 2.5.1. User Guide

PHP Integration Kit. Version 2.5.1. User Guide PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Egnyte Single Sign-On (SSO) Installation for OneLogin

Egnyte Single Sign-On (SSO) Installation for OneLogin Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

In this topic we will cover the security functionality provided with SAP Business One.

In this topic we will cover the security functionality provided with SAP Business One. In this topic we will cover the security functionality provided with SAP Business One. 1 After completing this topic, you will be able to: Describe the security functions provided by the System Landscape

More information

MYOB EXO BUSINESS WHITE PAPER

MYOB EXO BUSINESS WHITE PAPER MYOB EXO BUSINESS WHITE PAPER Social Media in MYOB EXO Business EXO BUSINESS MYOB ENTERPRISE SOLUTIONS Contents Introduction... 3 How Social Media Integration Works... 3 The Authentication Process... 3

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

Service Updates and Enhancements

Service Updates and Enhancements Service Updates and Enhancements May 8, 2013 McAfee understands that providing the tools for a trusted communication environment is our primary directive. Accomplishing this goal requires listening to

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

CA CloudMinder. Getting Started with SSO 1.5

CA CloudMinder. Getting Started with SSO 1.5 CA CloudMinder Getting Started with SSO 1.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

Dynamic DNS How-To Guide

Dynamic DNS How-To Guide Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol

More information

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?

More information

Copyright Pivotal Software Inc, 2013-2015 1 of 10

Copyright Pivotal Software Inc, 2013-2015 1 of 10 Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10

More information

Development Specifications. January 14th, 2012

Development Specifications. January 14th, 2012 Development Specifications January 14th, 2012 Introduction Technology New User Registration Creating a new Cause WePay Integration Creating Accounts for Users Accepting Donations Charging Application Fees

More information

GpsGate Server. Installation and Administration Guide. Version: 2.2 Rev: 2

GpsGate Server. Installation and Administration Guide. Version: 2.2 Rev: 2 GpsGate Server Installation and Administration Guide Version: 2.2 Rev: 2 Table of Contents 1 Introduction...3 2 Technical Requirements...4 2.1 Third Party Software...4 2.2 Recommended and Supported Web

More information

SAML Authentication Quick Start Guide

SAML Authentication Quick Start Guide SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.

More information

IT Exam Training online / Bootcamp

IT Exam Training online / Bootcamp DumpCollection IT Exam Training online / Bootcamp http://www.dumpcollection.com PDF and Testing Engine, study and practice Exam : 70-534 Title : Architecting Microsoft Azure Solutions Vendor : Microsoft

More information

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Configuring Integration Between Multichannel and Salesforce.com

Configuring Integration Between Multichannel and Salesforce.com Configuring Integration Between Multichannel and Salesforce.com Copyright 2013-2014 LiveOps Inc. All rights reserved. LiveOps, LiveOps Applications, LiveOps Authoring, LiveOps Insight, LiveOps Social and

More information

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1 PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity

More information

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

Single Sign-on Frequently Asked Questions

Single Sign-on Frequently Asked Questions Single Sign-on Frequently Asked Questions Q1. What is Single Sign-on? Q2. How does SSO work? Q3. How do I access the SSO portal? Q4. Where can I find help on how to use the SSO portal? Q5. How do I reset

More information

Security for Cloud- and On Premise Deployment. Mendix App Platform Technical Whitepaper

Security for Cloud- and On Premise Deployment. Mendix App Platform Technical Whitepaper Security for Cloud- and On Premise Deployment Mendix App Platform Technical Whitepaper Security for Cloud- and On Premise Deployment EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 THE MENDIX APP PLATFORM...

More information

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House

More information

Identity Server Guide Access Manager 4.0

Identity Server Guide Access Manager 4.0 Identity Server Guide Access Manager 4.0 June 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF

More information

Enhancing Web Application Security

Enhancing Web Application Security Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other.

To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other. w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Installation for VMware Horizon To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

ADMINISTRATOR GUIDE VERSION

ADMINISTRATOR GUIDE VERSION ADMINISTRATOR GUIDE VERSION 4.0 2014 Copyright 2008 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical, for any purpose

More information

Administering Jive for Outlook

Administering Jive for Outlook Administering Jive for Outlook TOC 2 Contents Administering Jive for Outlook...3 System Requirements...3 Installing the Plugin... 3 Installing the Plugin... 3 Client Installation... 4 Resetting the Binaries...4

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager TECHNICAL BRIEF Using SafeNet Authentication Manager as Identity Provider for AirWatch Contents Description... 2 Single Sign-On Dataflow... 2 Identity Provider Configuration...

More information

Absorb Single Sign-On (SSO) V3.0

Absorb Single Sign-On (SSO) V3.0 Absorb Single Sign-On (SSO) V3.0 Overview Absorb allows single sign-on (SSO) with third-party systems, regardless of the programming language. SSO is made secure by a series of calls (between Absorb and

More information

Logout in Single Sign-on Systems

Logout in Single Sign-on Systems Logout in Single Sign-on Systems Sanna Suoranta, Asko Tontti, Joonas Ruuskanen, Tuomas Aura IFIP IDMAN, London, UK, 8-9.4.2013 Logout in Single Sign-on Systems Motivation Single sign-on (SSO) systems SSO

More information

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

Single sign-on for ASP.Net and SharePoint

Single sign-on for ASP.Net and SharePoint Single sign-on for ASP.Net and SharePoint Author: Abhinav Maheshwari, 3Pillar Labs Introduction In most organizations using Microsoft platform, there are more than one ASP.Net applications for internal

More information

SAS Agent for Outlook Web App

SAS Agent for Outlook Web App SAS Agent for Outlook Web App CUSTOMER RELEASE NOTES Version: 1.08 Build: 1.08.579 Issue Date: 17 November 2015 Document Part Number: 007-012888-001, Rev. F Contents Product Description... 2 Release Description...

More information

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user

More information

What s New in SaaS Commissions

What s New in SaaS Commissions What s New in SaaS Commissions CallidusCloud is excited to introduce the latest release of SaaS Commissions. This release focuses on new levels of usability and visualization for the sales organization

More information

VERALAB LDAP Configuration Guide

VERALAB LDAP Configuration Guide VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to

More information

Business Banking Customer Login Experience for Enhanced Login Security

Business Banking Customer Login Experience for Enhanced Login Security Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification

More information

CLAIMS-BASED IDENTITY FOR WINDOWS

CLAIMS-BASED IDENTITY FOR WINDOWS CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with

More information

UNI Login. Authentication

UNI Login. Authentication UNI Login Authentication UNI C februar 2012 UNI Login Authentication UNI C februar 2012 Authentication with UNI Login 1 Index 1 Authentication with UNI Login... 2 1.1 How does it work?... 2 1.2 How does

More information

AccountView. Single Sign-On Guide

AccountView. Single Sign-On Guide AccountView Single Sign-On Guide 2014 Morningstar. All Rights Reserved. AccountView Version: 1.4 Document Version: 2 Document Issue Date: March 09, 2013 Technical Support: (866) 856-4951 Telephone: (781)

More information

QualysGuard SAML 2.0 Single Sign-On. Technical Brief

QualysGuard SAML 2.0 Single Sign-On. Technical Brief QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager SharePoint Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

Leveraging SAML for Federated Single Sign-on:

Leveraging SAML for Federated Single Sign-on: Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.

More information

Security Upgrade FAQs

Security Upgrade FAQs Security Upgrade FAQs Your online security is important to us. Soon, we ll be upgrading your online banking experience to include a new security service, which is known in the online security industry

More information

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access

More information

Pierce County IT Department GIS Division Xuejin Ruan Dan King

Pierce County IT Department GIS Division Xuejin Ruan Dan King Pierce County IT Department GIS Division Xuejin Ruan Dan King Web Application Work Flow Main Topics Authentication Authorization Session Management * Concurrent Session Management * Session Timeout Single

More information

WordCom, Inc. Secure File Transfer Web Application

WordCom, Inc. Secure File Transfer Web Application WordCom, Inc. Secure File Transfer Web Application Table of Contents 1. Introduction 2. Logging into WordCom s File Transfer Web Client 3. Toolbar buttons 4. Sending a package in Enhanced Mode (If installed

More information

Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team

Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team Presented by: Tom Connolly, Jason Lieberman Company: BizTech Session ID: #10351 Overview Introductions Background Web

More information

Working with Indicee Elements

Working with Indicee Elements Working with Indicee Elements How to Embed Indicee in Your Product 2012 Indicee, Inc. All rights reserved. 1 Embed Indicee Elements into your Web Content 3 Single Sign-On (SSO) using SAML 3 Configure an

More information

SAS Agent for Outlook Web Access

SAS Agent for Outlook Web Access SAS Agent for Outlook Web Access CUSTOMER RELEASE NOTES Version: 1.06 Build: 1.06.27725 Issue Date: 4 February 2015 Document Part Number: 007-012888-001, Rev. D Contents Product Description... 2 Release

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

System Administration Training

System Administration Training Table of Contents 1 Components: Web Server Components: SQL Server 3 Components: File System 4 Components: Other Components 5 Server Configuration: Pre-Requisites 6 Server Configuration: Running the Installer

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

Operating Level Agreement for NYU Login Service

Operating Level Agreement for NYU Login Service Operating Level Agreement for NYU Login Service This Operating Level Agreement (OLA) documents the agreement regarding support of Single Sign-On (SSO) services for a Partner Service, which has been integrated

More information

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the

More information

User Management Tool 1.5

User Management Tool 1.5 User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management

More information