Extending APS Packages with Single Sign On. Brian Spector, CEO, CertiVox / Gene Myers, VP Engineering, CertiVox
|
|
- Johnathan Webster
- 8 years ago
- Views:
Transcription
1 Extending APS Packages with Single Sign On Brian Spector, CEO, CertiVox / Gene Myers, VP Engineering, CertiVox
2 Introducing APS 2.0 A Platform for Integration APS Dynamic UI HTML5 Extensibility Certified Services APS Service Bus User/account context Secure cross-resource integration APS Authentication Protocol Multi-factor, multiprovider SSO (OpenID Connect, SAML, AD ) Profit from the cloud 2
3 Today s APS/Developer SSO Session will cover: Who is CertiVox? What is Parallels Identity Manager? What problem does it solve? What is new in SSO in APS 2.0 and POA 5.5? APS Authentication Security What is the APS Authentication Protocol (APS AP)? Why APS AP is an SSO internet security game changer How to enable your APS 2.0 syndicated service for the APS Authentication Protocol Nuts and Bolts Q&A Profit from the cloud 3
4 About CertiVox Security Leader Provider of certificateless cryptography software and services to Global 2000 Founded in 2008, with technology in development since 2006 SaaS cryptographic key management and open-source crypto SDKs Experienced leadership team 100 s of blue chip companies Our clients & references Profit from the cloud 4
5 The CertiVox World Open Source Library for Elliptic Curve Cryptography IaaS Offering APS Authentication Frictionless 2-factor Browsers and smartphones IaaS Offering Based upon MIRACL Frictionless Key Management and Certificateless Crypto Full SaaS Solution Offering Frictionless Easy to Use Secure Messaging and Secure Managed File Transfer Capture regulated SMB market segment with highest growth potential Sales model: Provisioned entirely through APS High value free version upgrade to Professional differentiated value / reduce churn Profit from the cloud 5
6 Parallels Identity Manager Single-Sign-On (SSO) multi-factor authentication services for Parallels Automation, Parallels Plesk Panel products, and APS
7 Parallels Identity Manager Universal, federated SSO multi-factor authentication services for Plesk, PPA, PBA / POA and APS Reduces username / password database smash and grab attacks and client vulnerabilities Provides for rich upsell / cross sell opportunities for mobile multi-factor authentication as a service to your customers Profit from the cloud 7
8 Revolutionary Multi-factor Authentication Easily integrates with existing websites / web apps via API Frictionless on-boarding through APS 2.0 for existing users Profit from the cloud 8
9 Revolutionary Multi-factor Authentication Infinitely stronger and easier than username / password HTML5 or Seamless Mobile 3-Factor O.O.B. Authentication 1 Integrated SkyPin 2 Login with mobile 3 providing secure login Scan and authenticate with SkyPin App Profit from the cloud 9
10 Before SkyPin User Authentication for SSO After SkyPin Multi-Factor Authentication for SSO Difficult to remember Insecure easy to phish, scam, key log, etc. Bad user experience leads to insecurity 4 digit PIN - infinitely easier than username / password Elliptic curve cryptography based infinitely more secure than username / password Profit from the cloud 10
11 Before SkyPin Service Provider Authentication for SSO After SkyPin Service Provider Authentication for SSO Username Bob28 v.noir Alice_467 Sarah.h! Password sarah password123 linkedin facebook1 Vince.noir Username Bob28 v.noir Alice_467 Sarah.h! Samsam10 sunnykid1 Password sarah password123 linkedin facebook1 hello Pass1! Vince.noir SkyPin Authentication Server Samsam10 hello sunnykid1 Pass1! Databases are inherently not secured and difficult to protect Smash and Grab attacks are the new normal Liable for legal action if hacked With SkyPin there is no username /password database, just one server cryptographic key If the key is compromised, it reveals nothing about the users on the system Profit from the cloud 11
12 SkyPin vs. Hardware 2-Factor SkyPin Hardware 2-Factor Cost Free* Avg $100 per user per year SkyPin has these additional advantages: Easy to use and easy to implement Profit from the cloud 12
13 SkyPin vs. Hardware 2-Factor SkyPin Hardware 2-Factor Cost Free* Avg $100 per user per year Implementation 2 Hours Weeks to Months SkyPin has these additional advantages: Easy to use and easy to implement Dramatic cost reductions no complex hardware or software provisioning Profit from the cloud 13
14 SkyPin vs. Hardware 2-Factor SkyPin Hardware 2-Factor Cost Free* Avg $100 per user per year Implementation 2 Hours Weeks to Months User Training Minimal Extensive SkyPin has these additional advantages: Easy to use and easy to implement Dramatic cost reductions no complex hardware or software provisioning Single sign on across multiple services and cross-domain Profit from the cloud 14
15 SkyPin vs. Hardware 2-Factor SkyPin SkyPin has these additional advantages: Easy to use and easy to implement Hardware 2-Factor Cost Free* Avg $100 per user per year Implementation 2 Hours Weeks to Months User Training Minimal Extensive Open Standards APS Authentication Typically Proprietary Dramatic cost reductions no complex hardware or software provisioning Single sign on across multiple services and cross-domain Up-sell / cross-sell SkyPin mobile for out-of-channel multifactor authentication Profit from the cloud 15
16 Parallels Automation 5.5: SkyPin Secured multi-factor authentication Increase top-line with strong authentication CertiVox Data Center Parallels Identity Manager Service SkyPin Managed Server Service Provider Data Center Alice APS 2.0 Controller Parallels Identity Manager Server SkyPin for HTML5 (Firefox, Chrome, etc.) Parallels Automation 5.5 Free for Parallels Customers Frictionless On-boarding Works out-of-the box with PA 5.5 Upgrade to Mobile 3-Factor Profit from the cloud 16
17 What is new in APS 2.0 Single-Sign-On?
18 APS 2.0 Security Parallels Identity Manager Architecture APS SSO API New PA 5.5 Service New PIM SSO Server APS PIM Application AD / LDAP Open ID Connect What s new in 5.5 and APS 2.0? Scalable LDAP Directory SAML PIM APS Package POA 5.5 MN APS Controller 2.0 Open DJ Highly Scalable LDAP Directory Migration Script/ Upgrade Script Profit from the cloud 18
19 APS 2.0 Security Parallels Identity Manager Architecture APS SSO API PIM APS Package New PA 5.5 Service New PIM SSO Server APS PIM Application POA 5.5 MN APS Controller 2.0 AD / LDAP Open ID Connect SAML Open DJ Highly Scalable LDAP Directory What s new in 5.5 and APS 2.0? Scalable LDAP Directory APS 2.0 Identity Provider: Existing LDAP/AD OpenID Connect Legacy SAML Migration Script/ Upgrade Script Profit from the cloud 19
20 APS 2.0 Security Parallels Identity Manager Architecture APS SSO API PIM APS Package New PA 5.5 Service New PIM SSO Server APS PIM Application POA 5.5 MN APS Controller 2.0 AD / LDAP Open ID Connect SAML Open DJ Highly Scalable LDAP Directory Migration Script/ Upgrade Script What s new in 5.5 and APS 2.0? Scalable LDAP Directory APS 2.0 Identity Provider: Existing LDAP/AD OpenID Connect Legacy SAML LDAP synchronization Profit from the cloud 20
21 APS 2.0 Security Parallels Identity Manager UI Authentication User visits your website User securely signs in with any APS 2.0 Authentication Provider (like SkyPin) User only has to login once to go anywhere across all applications and service boundaries Adding Parallels SSO through APS 2.0 to your website or web app is as easy as adding an advert to your page! Pluggable iframe Profit from the cloud 21
22 What is the APS Authentication Protocol? 3 party authentication Strong end-to-end encryption of user identity without PKI No complicated server side code User Identity Cross Infrastructure Boundaries One-pass Protocol Maximum Security Standards Based Profit from the cloud 22
23 APS Authentication Protocol Token Structure User ID A unique ID of the user in the system Scope / App ID Some UUID of the application Expiry User Data (Scope Params) Provider Inner Token Signature Token expiry information This field is filled by the application for additional token scope The authentication provider ID that actually issued the token Some additional information provided by the authentication provider for later use Allows any application that speaks APS AP to validate the token instantly, without re-directs Profit from the cloud 23
24 APS Authentication Protocol Overview Internally Provisioned Applications Welcome to The Blog! This is first record in my Blog which I m going to This is my second record in my Blog, which I wrote on the second day Profit from the cloud 24
25 Cross Syndication / Domain Barriers with APS AP Parallels Automation User Parallels Identity Manager User Login Across Domains Encrypted Token User Browser Successful Authentication APS 2.0 Enabled Syndication Service User Logged in Parallels Enabled APS 2.0 Service Provider Customer Decrypted User Token Verify + = Signature ID Information Profit from the cloud 25
26 Summary: Make the move to APS 2.0/ Parallels Automation 5.5 SkyPin state-of-the-art multi-factor authentication works out of the box! Scalable SSO means authenticate users once for all services, including Parallels Automation Support integration of nearly all identity management standards APS Authentication Protocol enables SSO across service boundaries with strong encryption, no configuration, no excessive bandwidth re-directs Profit from the cloud 26
27 ISV/Developer Get started with the APS Authentication Protocol for your Cloud Service or APS package 1. Sign up for developer account on Dev sign up 4. Call SkyPin PIN PAD from your test URL 2. Get your APS AP SkyKeys 5. Sign up and authenticate test users 3. Download the APS AP code from GitHub and integrate it into your application (easier than supporting Ouath/ OpenID Connect, etc)! Integrate APS AP APS 2.0 Leverage APS AP 6. Get APS 2.0 enabled by incorporating PIM SSO into your APS package Profit from the cloud 27
28 Next Steps Plan to Build APS 2.0 Packages Parallels PartnerNet Portal Cloud Services Developer Program - Sign up by March 13th (for APS-enabled ISV/SI partners) APS 2.0 Beta Program - Access to APS 2.0/PA 5.5 Hands-on-labs, Sandbox, and documentation - Additional online technical training & regular readiness check-in calls with APS engineers and architects - Program Requirements Include the scenario you want to solve with APS 2.0 to qualify to participate If qualified, you will be invited to the APS 2.0 Beta kickoff - Get your hands dirty with APS 2.0 Beta Be ready for launch your own packages! Profit from the cloud 28
29 For more information on CertiVox, contact: Questions? Brian Spector CEO / CertiVox brian@certivox.com Gene Myers VP of Engineering gene@certivox.com
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
More informationIntroduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationSingle Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
More informationmanaging SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
More informationAPI-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationSecure Your Enterprise with Usher Mobile Identity
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
More informationEXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
More informationAdding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
More informationThe Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
More informationA brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
More informationAbout Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More informationApplying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
More informationWHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationAgenda. How to configure
dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
More informationAVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
More informationSAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate
More informationHP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
More informationSEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
More informationInteroperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
More informationGetting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
More informationSaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
More informationFederated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
More informationSingle Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationWeb Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
More informationThe Password Problem Will Only Get Worse
The Password Problem Will Only Get Worse New technology for proving who we are Isaac Potoczny-Jones Galois & SEQRD ijones@seqrd.com @SyntaxPolice Goals & Talk outline Update the group on authentication
More informationQ&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific
Q: Is the challenge required or can pass through authentication be used with regard to automatic login after you login to your corporate domain? A: You can configure the system to pass on the challenge
More informationEnhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
More informationBuilding Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
More informationSecuring WebFOCUS A Primer. Bob Hoffman Information Builders
Securing WebFOCUS A Primer Bob Hoffman Information Builders 1 Agenda Gain an understanding of the WebFOCUS Architecture Where can security be implemented? Review the internal WebFOCUS repository and resource
More informationVidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
More informationFrans Bolk CEO UniQ-ID
Frans Bolk CEO UniQ-ID Uses certificates ( x.509) Has its own UniQ-CA ETSI Level of Security LoS5 ( Common Criteria EAL5+) ISO29115 and ISO29003 Level of Assurance LoA 4, and 3, and 2 ( STORK4+, and 3,
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationUSING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
More informationParallels Automation. Overview of New Features and Enhancements in Version 6.0. White Paper. www.parallels.com
Parallels Automation White Paper Overview of New Features and Enhancements in Version 6.0 www.parallels.com Table of Contents Introduction... 3 New Feature Highlights... 3 Transfer Subscriptions between
More informationEntrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003
Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled
More informationSafewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationIdentity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationParallels Automation. Parallels Automation Trusted by Top Service Providers Worldwide. White Paper. www.parallels.com
Parallels Automation White Paper Parallels Automation Trusted by Top Service Providers Worldwide www.parallels.com Table of Contents Parallels Automation Trusted by Top Service Providers Worldwide... 3
More informationFor details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.
Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
More informationCloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu
Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5 www.kc-class.eu 1 1 Outline Cloud computing General overview Deployment and service models Security issues Threats
More informationLeveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
More informationp@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
More informationMobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationConfiguring Salesforce
Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
More informationMcAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationDirectory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
Okta White paper Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-dint-053013 Table of Contents
More informationnexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
More informationSECUREAUTH IDP AND OFFICE 365
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
More informationHow to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
More informationHow To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
More informationMOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com
MOBILITY Transforming the mobile device from a security liability into a business asset. pingidentity.com Table of Contents Introduction 3 Three Technologies That Securely Unleash Mobile and BYOD 4 Three
More informationEasy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
More informationSymplified I: Windows User Identity. Matthew McNew and Lex Hubbard
Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationSAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
More informationCybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
More informationComputer Systems Security 2013/2014. Single Sign-On. Bruno Maia ei09095@fe.up.pt. Pedro Borges ei09063@fe.up.pt
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia ei09095@fe.up.pt Pedro Borges ei09063@fe.up.pt December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationecommerce Stages of Authentication Dynamic Factor Authentication
ecommerce Stages of Authentication Dynamic Factor Authentication Card Data, name & Password MagnePrint Score card swipe Password Name Hardware authentication Mutual device authentication Single factor
More informationWhite Pages Managed Service Solution Rapid Global Directory Implementation. White Paper
White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision
More informationOkta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
More informationAVG Business Secure Sign On Active Directory Quick Start Guide
AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and
More informationWhite paper Contents
Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Management Challenges of Software
More informationDifferentiate and Grow Your Hosting Business with Parallels Business Automation Standard. Alex Goncharov, Sr. Director, PBAS Product Marketing
Differentiate and Grow Your Hosting Business with Parallels Business Automation Standard Alex Goncharov, Sr. Director, PBAS Product Marketing Growing hosting business with automation Launched USONYX in
More informationWhite Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
More informationThe Who, What, When, Where and Why of IAM Bob Bentley
The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages
More informationThe Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
More informationCopyright Giritech A/S. Secure Mobile Access
Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary
More informationCopyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
More informationThe Challenges of Web single sign-on
Serge Vereecke Security Architect IBM Security Services serge_vereecke@be.ibm.com The Challenges of Web single sign-on GSE Event September 7, 2012 Agenda Single sign-on technology Why single sign-on Challenges
More informationMobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
More informationIntunex Oy Skillhive Service Description 1 / 6
Intunex Oy Skillhive Service Description 1 / 6 About Skillhive Skillhive is a social business application designed for connecting and sharing expertise within organizations. Skillhive enables employees
More informationWorkday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
More informationPassword Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos
Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website:
More informationParallels Automation Cloud Enablement. Oleg Melnikov. Senior VP, Automation. Profit from the Cloud TM
Parallels Automation Cloud Enablement Profit from the Cloud TM Oleg Melnikov Senior VP, Automation Singapore 2011 Agenda Enabling Cloud Ecosystem Partnering to deliver Cloud Winning by reselling Parallels
More informationIntegrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
More informationIdentity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
More informationSHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
More informationLBSEC. http://www.liveboxcloud.com
2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee
More informationNetworkingPS Federated Identity Solution Solutions Overview
NetworkingPS Federated Identity Solution Solutions Overview OVERVIEW As the global marketplace continues to expand, new and innovating ways of conducting business are becoming a necessity in order for
More informationCloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator
More informationWhite Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
More informationTime to Value: Successful Cloud Software Implementation
Time to Value: Successful Cloud Software Implementation Cloud & Data Security 2015 Client Conference About the Presenter Scott Schimberg, CPA, CMA Partner, Consulting, Armanino Scott became a Certified
More informationInfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x
InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x Active Innovations, Inc. Copyright 1998 2015 www.inforouter.com Installing the LDAP Authentication Web Service
More informationConnected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationIdentity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
More informationINTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
More informationWhite Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services
World Leading Directory Technology White Paper: Cloud Identity is Different Three approaches to identity management for cloud services Published: March 2015 ViewDS Identity Solutions A Changing Landscape
More informationHow to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
More information