Federated Directory Services
|
|
- Colin Miles Mathews
- 8 years ago
- Views:
Transcription
1 Federated Directory Services for the connected enterprise Federated Directory Server helps overcome the challenge of distributed identity data, which is a significant hurdle to the deployment of new enterprise business solutions. Table&of&Contents& Business&challenges&and&solution&scenarios&...&2 Business&scenarios&...&2 Enterprisesecurity...2 Collaborationandsocialinteraction...3 Cloud access&provisioning...4 Mobileaccess...4 Federated&Directory&Server&...&5 Migrateorco<exist...5 Joinmultipledirectories...6 Enrichwithdatafromothersources...6 SelectivewriteBackofchangestotheoriginalsource...6 Federateauthenticationbacktooriginalsource...7 Performance&characteristics&...&7 Conclusion&...&8
2 Business&challenges&and&solution&scenarios&& Therequirementsareclear: allusersmustbeabletologinthroughoneserver and find information about everybody in one place. Rip and replace is not an option.ontheotherhand,anysignificantchangetotheexistinginfrastructureis notacceptableeither.somethingneedstogive. Identity data is a critical component of the connected enterprise. This is information about employees, customers, contractors, and business partners. It is essential for focus areas such as enterprise security, collaboration and social interaction, cloud based solutions, and business compliance. Each of these realms introduces challenges and requirements of their own,andthey will be discussedfurtheroninthispaper. Althoughnotasurprise,itisstillcuriousthatthiscriticalinformationisstoredin several places, but not in the same format, and not even consistent in data content.additionally,itissometimesmanagedunderdifferentjurisdictionswith unique processes and compliance requirements. Finally the systems that store this information have varying degrees of technical availability, scalability, data reliabilityandsecuritypolicy. IBMFederated Directory Server bridgesthissetofchallenges.itisbuiltona world leading, market proven,and massively scalable directory service. Yet it integratesrightbackintofragileenvironmentsthathaveimportantdata,though they might not for various reasons be ready to directly support the new requirementsoftheplannedenterprisesolutions. Business&scenarios& Thebusinessareasshownbelowhavehighvisibilityinmostenterprises.They providethebackgroundforadiscussiononhowfederateddirectoryservercan rapidlyhelptodeployenterprise solutionsinthesecontexts. Enterprise&security& Security is an ever more important component of the enterprise infrastructure. However, it is common that identity data is fragmented across multiple LDAP directories or other resources. This complicates deployment of services
3 suchassinglesign<on 1 thatuseauthenticationserverstoverifythatusernames andpasswordsarevalid.forexample:& a. Forcomplianceorcounter<threatreasons,anorganizationcouldmandate thatallusersauthenticateusingtheir addressoremployeenumber. This is difficult to implement if there is no standard for login names acrosstheenterprisedirectories. b. Employeesneedtointeractwithcustomerswhenloggingintoexternally facing IT systems such as enterprise content systems or social software like IBM Connections 2. For security reasons the existing enterprise directoriescannotbeusedtoauthenticateusersinthissituation. There are other common problems such as that enterprise applications only beingableto connect to a single corporate LDAP directory for authentication purposes. However, people can exist in several directories, and the naming structure for authentication credentials can vary across the systems. Also, certaindirectoriesmightcontainpeopleandgroupsthatarenottobesurfaced totheenterpriselevel. Collaboration&and&social&interaction& Thefirstitemontheagendawhenplanningsocialsoftwareinanenterpriseisto address any authentication challenges as described in the previous section. However, once security has been addressed, thenextstageis todesigna rich environment for users. Social software is about content and context, which means that information about people needs to be available and visible. For example, phone numbers, organizational and geographical location, and similar contentthatmayexistinothersystemsintheenterprise. 1 IBMSecurityAccessManagement: ISAM: ESSO: 2
4 Suchinformationrichnessisusuallynotavailableinexistingdirectories,sothe data must be brought in, merged, correlated and cleaned before this added content can be made available to the social software. A final point is that this informationneedstobeavailablefast,andsometimesglobally,whichmeansthat dependence on the systems where the data originated should be avoided becausetheymightnotbedesignedforthehigherperformanceandavailability requirements. Cloud& &access&&&provisioning&& Cloud is a broad topic. Therefore a few scenarios are used to illustrate where FederatedDirectoryServercansimplifydeploymentandusageofnewservices. The core problem from an identity perspective is that the cloud<based systems do not have access to the existing authentication services. Depending on the situation,thiscanbeaddressedby a. Synchronizing user information between the enterprise and the cloud environments. Federated Directory Server supports the SCIM protocol, which is a commonly supported protocol for user provisioning. For example, any changes in local Active Directories can be synchronized acrosstoacloudidentityservice. b. Providing the cloud environment with access to the enterprise authentication services. This can work well in a private cloud scenario where the new cloud infrastructure is within existing enterprise infrastructure. c. UsefederationserviceslikeIBMFederatedIdentityManager 3,whichlets enterpriseusersaccesscloudserviceswithoutsynchronization. FederatedDirectoryServerisasolidfoundationforprivate,hybrid,orpublic cloudprojectswhenexistingusersneedaccesstonewservices. Mobile&access& Accessfrommobiledevicesinsidetheenterpriseisinmanywayssimilartothat fromworkstations.however,onceoutsidetheenterpriseperimeter,themobile unitsmustfirstaccesstheinfrastructurethroughavpnserviceorothermobile access management service 4. These services struggle with the same issues as described in the Enterprise security section above in that there might be multipleinternaldirectorieswhereusersaremanaged.furthermore,theactual structure of the user credentials is possibly different in the systems as well, making it challenging to consolidate for mobile access. For example, on one systemlogginginmightrequireausernamesuchas anne_p@marketing,while onanotherserveritmightbe AnneParks/Marketing. Federated Directory Server can provide a single name space to the mobile gatewayssothatallusersmayusethesametypeoflogin,suchas address IBMSecurityAccessManagerforCloudandMobile: 03.ibm.com/software/products/us/en/samcm/
5 or employee number, yet still be authenticated against their home directory in linewiththewaythatauthenticationiscurrentlyconfigured. Federated&Directory&Server& Federated Directory Server delivers a number of capabilities that allow an organization to address the above business scenarios. It is a foundation for enterprise security and identity visibility that combines performance, global scalability, and government class security with deep integration to legacy directoryservices.inthiswayanorganizationcankeepwhatisalreadyinplace, yetextendtheuseoftheinformationtosupportnewrequirements. The deployment scenarios illustrated below are examples that will be used to discussthecapabilitiesintheproduct.thesescenariosdonotexcludeeachother, andaredescribedthiswaytosimplifyeachusecaseratherthanlistallindividual capabilities. Migrate&or&coFexist& Whentransitioningfromonedirectorytoanotheritisusuallynotenoughtojust migrate the data since business will be ongoing until the move is complete. Sometimes both directories need to stay in place for some time, which introducesanumberoftechnicalconsiderations. a. Mustchangesintheoriginaldirectoryimmediatelybepropagatedtothe newdirectory? b. Canoriginaldatabeusedasis,ormustitbecheckedandpossiblycleaned orotherwisemodifiedtoconformtoenterprisestandards? c. Should users get new passwords, or should login to the new directory resultinauthenticationbacktotheoriginaldirectory? d. If attributes are modified in the new directory, should these changes be writtenbacktotheoriginaldirectory? e. Should the directory hierarchy be mirrored in the new directory or shouldthedatastructurebesimplified?
6 f. Shouldgroupsalsobesynchronized? Federated Directory Server supports all of these scenarios, providing an organization with a significant amount of flexibility when planning a directory migrationorco<existenceproject. Join&multiple&directories& Dealingwithmultipledirectoriesisnotverydifferentfromthepreviousscenario. WithFederatedDirectoryServer,anynumberofdirectoriescanbeintegratedat the same time. All of the capabilities mentioned above work as expected with multipledirectories. Federated Directory Server additionally helps consolidate the user names that are used to log in. The existing directories possibly have different naming structures, which can lead to confusion in the organization. FDS allows you to choose a common attribute to identify users, transparently converting login credentials to the values expected by the existing directories. The next section will describe how data from other sources can be pulled into the user profiles andthenbeusedtoidentifyuserswhentheylogin. Enrich&with&data&from&other&sources& Notonlydoesidentitydatathatisstoredinmultipledirectoriesneedtoappear asifitiscomingfromthesameplace,butthisdatamightneedtobecombined withinformationfromothertypesofsystemsanddatastoresaswell.infdsthis is called joining data from multiple sources. For example, there might be additional organization data in an Human Resources (HR) system, or other attributesinadatabasethatneedtobeavailableinthenewdirectory.fdscan join in data from any number of sources because the underlying technology is basedondirectoryintegrator.thisincludesaccessingwebservices,rest<based systems, SQL databases, and many other out<of<the<box sources, as well as entirelycustomsourcesbyexploitingthepowerofdirectoryintegrator. Selective&writeBack&of&changes&to&the&original&source& Changes in Security Directory Server (SDS) can be pushed back to the source systems.forexample,usersmightbeallowedtomodifytheirhomeaddressand telephone number, which will be written back to Active Directory so that the Microsoft environment can benefit from changes created by the new systems. Thisprovidesanadditionallayerofsecurity,mitigatingtheneedforsettingup advanced security models to restrict direct access to the existing directories. Part of the vision for FDS has been to insulate and extend the existing data environments, to reduce the risk of exposing them directly to new enterprise servicesthattheywerenotdesignedtohandle.
7 Federate&authentication&back&to&original&source& Password synchronization is a thing of the past 5. Users and passwords can continuetobemanagedthewaytheycurrentlyare,eveninmultiplesystems.if desired,theycanautomaticallybetransferredtosecuritydirectoryserver(sds) at the appropriate time if the existing directory server needs to be sunset for authentication purposes. It is even possible to let users log into SDS using a differentlogincredential(suchastheir addressoremployeenumber),and have SDS automatically translate that to the correct user name when checking thepasswordintheexistingdirectories. Performance&characteristics& The hybrid integration architecture of FDS results in significant performance characteristics. Firstofall,IBMSecurityDirectoryServer(SDS)istheLDAPengineinFDS.SDSis ahighlyscalable,veryreliableandhighperformanceldapdirectoryserver.for large environments, SDS can replicate data to provide maximum speed in local infrastructures across the world. Therefore, existing data located in an identity silocanbeintegratedwithricherdatafromothersystems,andthenpropagated throughsdstomakeinformationavailableathighspeed. Although part of the same argument as above, it s worth pointing out that existing identity sources might not be designed or managed in a way that is suitable for real<time integration with new enterprise services. FDS represents an insulateandextend approachwherechangesarepulled onlyonce from existing systems and after that are accessed only from SDS. It is therefore possible to deliver world<class performance independent of the speed and availabilityofexistingsystems. 5 Passwords are usually one<way encrypted. This means that you can ask a server is this the correct password for this user, but cannot ask what is the password for this user. As a result passwords generally cannot be copied betweensystemsunlesstheysharetheexactsameencryptionalgorithm.
8 Compared to a traditional virtual directory approach, the FDS approach ensuresthatdataisavailableathighspeedaccessbeforeitisrequestedbyauser. And finally, all data can be aggregated, cleaned and harmonized to a common formatbeforeitisaccessed.themorecomplexthedataharmonization,themore costly it is to perform this in real<time and still maintain an acceptable level of performance. Conclusion& Federated Directory Server provides a new range of options for identity infrastructures. Existing directories can be seamlessly integrated into new directory services that scale in a manner that previously was not possible. Existingusermanagementprocessescanstayinplace,andcanevenbeapplied tonewdirectorieswhendesired. AsFDSisbasedontheDirectoryIntegratortechnology,itcanbecustomizedto practicallyanyscenariotohandlethespecificrequirementsoforganizationsthat haveuniquetechnicalchallenges. With FDS, distributed identity silos can be brought together so that the enterprisecanexposeasingle,logical,rich,andstructuredinterfacetonewand existingenterpriseapplications.
White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
More informationDesigning a Data Solution with Microsoft SQL Server 2014
20465C - Version: 1 22 June 2016 Designing a Data Solution with Microsoft SQL Server 2014 Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 5 days Course Description: The focus
More informationCourse 20465C: Designing a Data Solution with Microsoft SQL Server
Course 20465C: Designing a Data Solution with Microsoft SQL Server Module 1: Introduction to Enterprise Data Architecture As organizations grow to enterprise scale, their IT infrastructure requirements
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationEgnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
More information20465: Designing a Data Solution with Microsoft SQL Server
20465: Designing a Data Solution with Microsoft SQL Server Microsoft - Base de Dados Nível: Avançado Duração: 30h Sobre o curso The focus of this five-day instructor-led course is on planning and implementing
More informationCourse 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationWHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory
WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering
More informationOpen Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
More informationWhite Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services
World Leading Directory Technology White Paper: Cloud Identity is Different Three approaches to identity management for cloud services Published: March 2015 ViewDS Identity Solutions A Changing Landscape
More informationFederated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
More informationBill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support
Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support Learning & Development Specialist Customer Support Services Been with Microsoft for 7 years Professionally
More informationUIT USpace Flexible and Secure File Manager for Cloud Storage
UIT USpace Flexible and Secure File Manager for Cloud Storage USpace File Manager for Cloud Storage Main features: USpace is a cloud storage solution which is very suitable for both private cloud deployment
More informationSun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost
Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Timothy Siu SE Manager, JES Nov/10/2003 sun.com/solutions/
More informationImplementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
More informationBuilding a Cloud-Ready, Future-Proof Identity Infrastructure:
Building a Cloud-Ready, Future-Proof Identity Infrastructure: Three Keys to Success UnboundID Corp. 13809 Research Blvd Suite 500 Austin, TX 78750 512-600-7700 www.unboundid.com Executive Summary Social
More informationDesigning a Data Solution with Microsoft SQL Server 2014
Page 1 of 8 Overview The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies.
More informationMoving to the Cloud: What Every CIO Should Know
Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling
More informationImplementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationMicrosoft SharePoint Architectural Models
Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint
More informationIBM Cognos Performance Management Solutions for Oracle
IBM Cognos Performance Management Solutions for Oracle Gain more value from your Oracle technology investments Highlights Deliver the power of predictive analytics across the organization Address diverse
More informationDesigning a Data Solution with Microsoft SQL Server
The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies. It describes how
More informationCourse 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
More informationOpen-Xchange Hosted Edition Directory Integration
OPEN-XCHANGE Whitepaper Open-Xchange Hosted Edition Directory Integration Concept to integrate Open-Xchange Hosted Edition into Company Directory Services v1.00 Author: Editors: Layout: Manuel Kraft Manuel
More informationSMART Solutions for Active Directory Migrations
SMART Solutions for Active Directory Migrations Challenges of Active Directory Migrations Types of Active Directory Migrations Intra- Forest Migration between Domains in the Same Forest Separate a Forest
More informationCourse 20465: Designing a Data Solution with Microsoft SQL Server
Course 20465: Designing a Data Solution with Microsoft SQL Server Overview About this course The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure
More informationDesigning a Data Solution with Microsoft SQL Server
Course 20465C: Designing a Data Solution with Microsoft SQL Server Page 1 of 6 Designing a Data Solution with Microsoft SQL Server Course 20465C: 4 days; Instructor-Led Introduction The focus of this four-day
More informationDesigning Database Solutions for Microsoft SQL Server 2012 MOC 20465
Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Course Outline Module 1: Designing a Database Server Infrastructure This module explains how to design an appropriate database server
More informationCross-domain Identity Management System for Cloud Environment
Cross-domain Identity Management System for Cloud Environment P R E S E N T E D B Y: N A Z I A A K H TA R A I S H A S A J I D M. S O H A I B FA R O O Q I T E A M L E A D : U M M E - H A B I B A T H E S
More informationImplementing Microsoft Azure Infrastructure Solutions
20533B - Version: 1 02 July 2016 Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions 20533B - Version: 1 5 days Course Description: This course is
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationModernize IAM with a Web Scale LDAP Directory Server
Modernize IAM with a Web Scale LDAP Directory Server with Nathanael Coffing, Co- founder of Syntegrity Copyright 2015 UnboundID, Inc. Today s Speakers Terry Sigle Dir. of SoluEons Engineering, UnboundID
More informationDesigning Database Solutions for Microsoft SQL Server 2012
Course 20465A: Designing Database Solutions for Microsoft SQL Server 2012 Length: Audience(s): 5 Days Level: 300 IT Professionals Technology: Microsoft SQL Server 2012 Type: Delivery Method: Course Instructor-led
More informationServer-based Password Synchronization: Managing Multiple Passwords
Server-based Password Synchronization: Managing Multiple Passwords Self-service Password Reset Layer v.3.2-004 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax:
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : 000-003 Title : Fundamentals of Applying Tivoli Security and Compliance Management Solutions V2 Version : Demo 1.What is another
More informationActive Directory LDAP
Whitepaper WPS Parking Solutions Hoevenweg 11 5652 AW EIndhoven T +31 (0)40 250 91 11, info@wps-nl.com, www.wpsparkingsolutions.com T +31(0)40 250 91 11, E info@wps-nl.com, W www.wpsparkingsolutions.com
More informationOPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
More informationStep-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet
Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from
More informationHow To Deploy Cisco Jabber For Windows 2.5.1 On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or
Deployment Models Cisco Jabber for Windows provides two deployment models, on-premises or cloud-based. Learn about each deployment model and review the available options for on-premises and cloud-based
More informationSecurity Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
More informationTO DEPLOY A VIRTUAL DIRECTORY TOP THREE REASONS. White Paper June 2009. Abstract
TOP THREE REASONS TO DEPLOY A VIRTUAL DIRECTORY White Paper June 2009 Abstract A virtual directory presents a single, consolidated view of disparate identity data to organizations dealing with diverse
More informationPASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者
PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者 http://www.pass4test.jp 1 年 で 無 料 進 級 することに 提 供 する Exam : 000-003 Title : Fundamentals of Applying Tivoli Security and Compliance Management Solutions V2 Vendors :
More informationDesigning, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008
Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More informationENZO UNIFIED SOLVES THE CHALLENGES OF OUT-OF-BAND SQL SERVER PROCESSING
ENZO UNIFIED SOLVES THE CHALLENGES OF OUT-OF-BAND SQL SERVER PROCESSING Enzo Unified Extends SQL Server to Simplify Application Design and Reduce ETL Processing CHALLENGES SQL Server does not scale out
More informationTop 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper
Okta White paper Top 8 Identity and Access Management Challenges with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-top8-113012
More informationBEDIFFERENT ACE G E R M A N Y. aras.com. Copyright 2012 Aras. All Rights Reserved.
Copyright 2012 Aras. All Rights Reserved. BEDIFFERENT ACE G E R M A N Y Copyright 2012 Aras. All Rights Reserved. ACE Germany Leveraging the Cloud Rob McAveney Director of Product Management Aras Corp
More informationBES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationThe State of Hybrid Cloud
The State of Hybrid Cloud To learn more about this full research or to inquire about membership, contact us: +1-866-913-8101 IT.Support@ executiveboard.com www.cebglobal.com/it CEB Infrastructure Leadership
More informationWhite Paper Converting Lotus Notes Applications to the Cloud Using the CIMtrek converter Product
White Paper Converting Lotus Notes Applications to the Cloud Using the CIMtrek converter Product CIMtrek Ltd Introduction: CIMTrek has been created to help organizations modernise their legacy applications
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationThis course is intended for database professionals who need who plan, implement, and manage database solutions. Primary responsibilities include:
Course Page - Page 1 of 5 Designing Solutions for Microsoft SQL Server 2014 M-20465 Length: 3 days Price: $1,795.00 Course Description The focus of this three-day instructor-led course is on planning and
More informationHow To Get A Single Sign On (Sso)
Single Sign-On Vijay Kumar, CISSP Agenda What is Single Sign-On (SSO) Advantages of SSO Types of SSO Examples Case Study Summary What is SSO Single sign-on is a user/session authentication process that
More informationIDENTITY & ACCESS MANAGEMENT
Securely Enabling Your Business IDENTITY & ACCESS MANAGEMENT Customer Solution Case Study FishNet Security Helps Hotelier Prepare for Rapid Move to Cloud with New Identity Management Solution Achieving
More informationWhite Paper. Using Universal Platform TM to Facilitate Disaster Recovery Projects
White Paper Using Universal Platform TM to Facilitate Disaster Recovery Projects Page 2 of 9 Common challenges faced by companies during a Disaster Recovery project Controlling and brokering access to
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 20465B; 5 days, Instructor-led
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 20465B; 5 days, Instructor-led Course Description This five-day, instructor-led course provides you with the
More informationGrid and Multi-Grid Management
Key Benefits High Availability, Massive Scalability Infoblox Provides always on network services through scalable, redundant, reliable and faulttolerant architecture Guarantees data integrity and availability
More informationMS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More informationBEDIFFERENT A C E 2 0 1 2 I N T E R N A T I O N A L
Copyright 2012 Aras. All Rights Reserved. BEDIFFERENT A C E 2 0 1 2 I N T E R N A T I O N A L Copyright 2012 Aras. All Rights Reserved. ACE 2012 I N TERNATIONAL Leveraging the Cloud Rob McAveney Director
More informationAriett Purchasing & Expense Management. Go Paperless, Go Mobile, Go Easy.
Ariett Purchasing & Expense Management Use Ariett on Any Device Ariett Purchasing & Expense Management Ariett in the Microsoft Azure Cloud Microsoft Recently Published Case Study on Ariett Product Solutions
More informationSecure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security
Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the
More informationYour Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser
Kaseya Product Brief The Kaseya Platform Making your systems more secure, your staff more productive, your services more reliable and your results easier to validate. No matter what part of Kaseya s integrated
More informationABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
More informationHow to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
More informationSECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for
More informationADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT
OMADA IDENTITY SUITE - Adaptable Identity Management and Access Governance Governance Compliance Identity Management Cloud Self-Service Security Complete control of who has access to what is an essential
More informationEXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
More informationEMC Data Protection Advisor 6.0
White Paper EMC Data Protection Advisor 6.0 Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection environments, improve compliance
More informationDirectory Integration in LANDesk Management Suite
Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer
More informationChoosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions
Choosing a File Sync & Share Solution PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Agenda File Sync & Share What and Why File Sync & Share How Selection Criteria Q & A Summary 3
More information20465C: Designing a Data Solution with Microsoft SQL Server
20465C: Designing a Data Solution with Microsoft SQL Server Course Details Course Code: Duration: Notes: 20465C 5 days This course syllabus should be used to determine whether the course is appropriate
More informationSimplified Management With Hitachi Command Suite. By Hitachi Data Systems
Simplified Management With Hitachi Command Suite By Hitachi Data Systems April 2015 Contents Executive Summary... 2 Introduction... 3 Hitachi Command Suite v8: Key Highlights... 4 Global Storage Virtualization
More informationOpenStack Cloud Migration : Migrating On-premise workloads to OpenStack Private Cloud
OpenStack Cloud Migration : Migrating On-premise workloads to OpenStack Private Cloud June 16, 2015 DONGJOON MIN ISA TECHNOLOGIES,INC. 1 djmin@zconverter.com Table of Contents Executive Summary.. 3 What
More informationWHITEPAPER SECURITY APPROACHES AND SECURITY TECHNOLOGIES IN INTEGRATION CLOUD
WHITEPAPER SECURITY APPROACHES AND SECURITY TECHNOLOGIES IN INTEGRATION CLOUD TABLE OF CONTENTS 1 In this whitepaper... 3 2 User security... 4 2.1 Authentication... 4 2.2 Authorization & Access Control...
More informationmanaging SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
More informationRoad2Master Office 365 Hybrid Deployment and Migration Part 1 - Introduction. Ashwin Venugopal www.road2master.ms
Please Note: This is made for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS. Unless otherwise noted, the example companies, organizations,
More informationWHITE PAPER. Active Directory and the Cloud
WHITE PAPER Active Directory and the Cloud HyperOffice, 2011 What is Active Directory? What are its benefits? Active Directory (AD) is a directory service created by Microsoft. Active Directory is popularly
More informationWHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
More informationSingle Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
More informationUnderstanding Object Storage and How to Use It
SWIFTSTACK WHITEPAPER An IT Expert Guide: Understanding Object Storage and How to Use It November 2014 The explosion of unstructured data is creating a groundswell of interest in object storage, certainly
More informationBusiness-Driven, Compliant Identity Management
Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System
More information"Charting the Course... MOC 20465 C Designing a Data Solution with Microsoft SQL Server Course Summary
Course Summary Description The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL and other Microsoft technologies. It
More informationTop Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper
Top Eight Identity & Access Management Challenges with SaaS Applications Okta White Paper Table of Contents The Importance of Identity for SaaS Applications... 2 1. End User Password Fatigue... 2 2. Failure-Prone
More informationAuthentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
More informationBetter Together with Microsoft Dynamics CRM
Better Together with Microsoft Dynamics CRM Enhance the power and effectiveness of Microsoft Dynamics CRM business software with Microsoft products and technologies that work even better, together. Microsoft
More informationExtend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
More informationIdentity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
More informationCourse 20465C: Designing a Data Solution with Microsoft SQL Server
Course 20465C: Designing a Data Solution with Microsoft SQL Server Five days, instructor-led About this Course The focus of this five-day instructor-led course is on planning and implementing enterprise
More informationBuilding Secure Cloud Applications. On the Microsoft Windows Azure platform
Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside
More informationBusiness-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
More informationDocumentation. CloudAnywhere. http://www.cloudiway.com. Page 1
Documentation CloudAnywhere http://www.cloudiway.com Page 1 Table of Contents 1 INTRODUCTION 3 2 OVERVIEW 4 2.1 KEY FUNCTIONALITY 4 2.2 PREREQUISITES 5 3 FEATURES 6 3.1 A UNIVERSAL PROVISIONING SOLUTION.
More informationOracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
More informationDesigning a Data Solution with Microsoft SQL Server
Course Code: M20465C Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing a Data Solution with Microsoft SQL Server Overview The focus of this five-day instructor-led course is on planning
More information6231A - Maintaining a Microsoft SQL Server 2008 Database
6231A - Maintaining a Microsoft SQL Server 2008 Database Course Number: 6231A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft Certified Professional
More informationnexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationActive Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
More informationDesigning a Data Solution with Microsoft SQL Server 2014
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Course 20465C: Designing a Data Solution with Microsoft SQL Server 2014 Length: 5 Days Audience: IT Professionals
More informationQuest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
More informationSecurity, Reliability & Control with Hosted Exchange
Hosted Applications Commonly referred to a Cloud Computing and/or Software-as-a-Service (SaaS), web-hosted software applications service provides you with a new way to get business software and applications
More information