Federated Directory Services

Size: px
Start display at page:

Download "Federated Directory Services"

Transcription

1 Federated Directory Services for the connected enterprise Federated Directory Server helps overcome the challenge of distributed identity data, which is a significant hurdle to the deployment of new enterprise business solutions. Table&of&Contents& Business&challenges&and&solution&scenarios&...&2 Business&scenarios&...&2 Enterprisesecurity...2 Collaborationandsocialinteraction...3 Cloud access&provisioning...4 Mobileaccess...4 Federated&Directory&Server&...&5 Migrateorco<exist...5 Joinmultipledirectories...6 Enrichwithdatafromothersources...6 SelectivewriteBackofchangestotheoriginalsource...6 Federateauthenticationbacktooriginalsource...7 Performance&characteristics&...&7 Conclusion&...&8

2 Business&challenges&and&solution&scenarios&& Therequirementsareclear: allusersmustbeabletologinthroughoneserver and find information about everybody in one place. Rip and replace is not an option.ontheotherhand,anysignificantchangetotheexistinginfrastructureis notacceptableeither.somethingneedstogive. Identity data is a critical component of the connected enterprise. This is information about employees, customers, contractors, and business partners. It is essential for focus areas such as enterprise security, collaboration and social interaction, cloud based solutions, and business compliance. Each of these realms introduces challenges and requirements of their own,andthey will be discussedfurtheroninthispaper. Althoughnotasurprise,itisstillcuriousthatthiscriticalinformationisstoredin several places, but not in the same format, and not even consistent in data content.additionally,itissometimesmanagedunderdifferentjurisdictionswith unique processes and compliance requirements. Finally the systems that store this information have varying degrees of technical availability, scalability, data reliabilityandsecuritypolicy. IBMFederated Directory Server bridgesthissetofchallenges.itisbuiltona world leading, market proven,and massively scalable directory service. Yet it integratesrightbackintofragileenvironmentsthathaveimportantdata,though they might not for various reasons be ready to directly support the new requirementsoftheplannedenterprisesolutions. Business&scenarios& Thebusinessareasshownbelowhavehighvisibilityinmostenterprises.They providethebackgroundforadiscussiononhowfederateddirectoryservercan rapidlyhelptodeployenterprise solutionsinthesecontexts. Enterprise&security& Security is an ever more important component of the enterprise infrastructure. However, it is common that identity data is fragmented across multiple LDAP directories or other resources. This complicates deployment of services

3 suchassinglesign<on 1 thatuseauthenticationserverstoverifythatusernames andpasswordsarevalid.forexample:& a. Forcomplianceorcounter<threatreasons,anorganizationcouldmandate thatallusersauthenticateusingtheir addressoremployeenumber. This is difficult to implement if there is no standard for login names acrosstheenterprisedirectories. b. Employeesneedtointeractwithcustomerswhenloggingintoexternally facing IT systems such as enterprise content systems or social software like IBM Connections 2. For security reasons the existing enterprise directoriescannotbeusedtoauthenticateusersinthissituation. There are other common problems such as that enterprise applications only beingableto connect to a single corporate LDAP directory for authentication purposes. However, people can exist in several directories, and the naming structure for authentication credentials can vary across the systems. Also, certaindirectoriesmightcontainpeopleandgroupsthatarenottobesurfaced totheenterpriselevel. Collaboration&and&social&interaction& Thefirstitemontheagendawhenplanningsocialsoftwareinanenterpriseisto address any authentication challenges as described in the previous section. However, once security has been addressed, thenextstageis todesigna rich environment for users. Social software is about content and context, which means that information about people needs to be available and visible. For example, phone numbers, organizational and geographical location, and similar contentthatmayexistinothersystemsintheenterprise. 1 IBMSecurityAccessManagement: ISAM: ESSO: 2

4 Suchinformationrichnessisusuallynotavailableinexistingdirectories,sothe data must be brought in, merged, correlated and cleaned before this added content can be made available to the social software. A final point is that this informationneedstobeavailablefast,andsometimesglobally,whichmeansthat dependence on the systems where the data originated should be avoided becausetheymightnotbedesignedforthehigherperformanceandavailability requirements. Cloud& &access&&&provisioning&& Cloud is a broad topic. Therefore a few scenarios are used to illustrate where FederatedDirectoryServercansimplifydeploymentandusageofnewservices. The core problem from an identity perspective is that the cloud<based systems do not have access to the existing authentication services. Depending on the situation,thiscanbeaddressedby a. Synchronizing user information between the enterprise and the cloud environments. Federated Directory Server supports the SCIM protocol, which is a commonly supported protocol for user provisioning. For example, any changes in local Active Directories can be synchronized acrosstoacloudidentityservice. b. Providing the cloud environment with access to the enterprise authentication services. This can work well in a private cloud scenario where the new cloud infrastructure is within existing enterprise infrastructure. c. UsefederationserviceslikeIBMFederatedIdentityManager 3,whichlets enterpriseusersaccesscloudserviceswithoutsynchronization. FederatedDirectoryServerisasolidfoundationforprivate,hybrid,orpublic cloudprojectswhenexistingusersneedaccesstonewservices. Mobile&access& Accessfrommobiledevicesinsidetheenterpriseisinmanywayssimilartothat fromworkstations.however,onceoutsidetheenterpriseperimeter,themobile unitsmustfirstaccesstheinfrastructurethroughavpnserviceorothermobile access management service 4. These services struggle with the same issues as described in the Enterprise security section above in that there might be multipleinternaldirectorieswhereusersaremanaged.furthermore,theactual structure of the user credentials is possibly different in the systems as well, making it challenging to consolidate for mobile access. For example, on one systemlogginginmightrequireausernamesuchas anne_p@marketing,while onanotherserveritmightbe AnneParks/Marketing. Federated Directory Server can provide a single name space to the mobile gatewayssothatallusersmayusethesametypeoflogin,suchas address IBMSecurityAccessManagerforCloudandMobile: 03.ibm.com/software/products/us/en/samcm/

5 or employee number, yet still be authenticated against their home directory in linewiththewaythatauthenticationiscurrentlyconfigured. Federated&Directory&Server& Federated Directory Server delivers a number of capabilities that allow an organization to address the above business scenarios. It is a foundation for enterprise security and identity visibility that combines performance, global scalability, and government class security with deep integration to legacy directoryservices.inthiswayanorganizationcankeepwhatisalreadyinplace, yetextendtheuseoftheinformationtosupportnewrequirements. The deployment scenarios illustrated below are examples that will be used to discussthecapabilitiesintheproduct.thesescenariosdonotexcludeeachother, andaredescribedthiswaytosimplifyeachusecaseratherthanlistallindividual capabilities. Migrate&or&coFexist& Whentransitioningfromonedirectorytoanotheritisusuallynotenoughtojust migrate the data since business will be ongoing until the move is complete. Sometimes both directories need to stay in place for some time, which introducesanumberoftechnicalconsiderations. a. Mustchangesintheoriginaldirectoryimmediatelybepropagatedtothe newdirectory? b. Canoriginaldatabeusedasis,ormustitbecheckedandpossiblycleaned orotherwisemodifiedtoconformtoenterprisestandards? c. Should users get new passwords, or should login to the new directory resultinauthenticationbacktotheoriginaldirectory? d. If attributes are modified in the new directory, should these changes be writtenbacktotheoriginaldirectory? e. Should the directory hierarchy be mirrored in the new directory or shouldthedatastructurebesimplified?

6 f. Shouldgroupsalsobesynchronized? Federated Directory Server supports all of these scenarios, providing an organization with a significant amount of flexibility when planning a directory migrationorco<existenceproject. Join&multiple&directories& Dealingwithmultipledirectoriesisnotverydifferentfromthepreviousscenario. WithFederatedDirectoryServer,anynumberofdirectoriescanbeintegratedat the same time. All of the capabilities mentioned above work as expected with multipledirectories. Federated Directory Server additionally helps consolidate the user names that are used to log in. The existing directories possibly have different naming structures, which can lead to confusion in the organization. FDS allows you to choose a common attribute to identify users, transparently converting login credentials to the values expected by the existing directories. The next section will describe how data from other sources can be pulled into the user profiles andthenbeusedtoidentifyuserswhentheylogin. Enrich&with&data&from&other&sources& Notonlydoesidentitydatathatisstoredinmultipledirectoriesneedtoappear asifitiscomingfromthesameplace,butthisdatamightneedtobecombined withinformationfromothertypesofsystemsanddatastoresaswell.infdsthis is called joining data from multiple sources. For example, there might be additional organization data in an Human Resources (HR) system, or other attributesinadatabasethatneedtobeavailableinthenewdirectory.fdscan join in data from any number of sources because the underlying technology is basedondirectoryintegrator.thisincludesaccessingwebservices,rest<based systems, SQL databases, and many other out<of<the<box sources, as well as entirelycustomsourcesbyexploitingthepowerofdirectoryintegrator. Selective&writeBack&of&changes&to&the&original&source& Changes in Security Directory Server (SDS) can be pushed back to the source systems.forexample,usersmightbeallowedtomodifytheirhomeaddressand telephone number, which will be written back to Active Directory so that the Microsoft environment can benefit from changes created by the new systems. Thisprovidesanadditionallayerofsecurity,mitigatingtheneedforsettingup advanced security models to restrict direct access to the existing directories. Part of the vision for FDS has been to insulate and extend the existing data environments, to reduce the risk of exposing them directly to new enterprise servicesthattheywerenotdesignedtohandle.

7 Federate&authentication&back&to&original&source& Password synchronization is a thing of the past 5. Users and passwords can continuetobemanagedthewaytheycurrentlyare,eveninmultiplesystems.if desired,theycanautomaticallybetransferredtosecuritydirectoryserver(sds) at the appropriate time if the existing directory server needs to be sunset for authentication purposes. It is even possible to let users log into SDS using a differentlogincredential(suchastheir addressoremployeenumber),and have SDS automatically translate that to the correct user name when checking thepasswordintheexistingdirectories. Performance&characteristics& The hybrid integration architecture of FDS results in significant performance characteristics. Firstofall,IBMSecurityDirectoryServer(SDS)istheLDAPengineinFDS.SDSis ahighlyscalable,veryreliableandhighperformanceldapdirectoryserver.for large environments, SDS can replicate data to provide maximum speed in local infrastructures across the world. Therefore, existing data located in an identity silocanbeintegratedwithricherdatafromothersystems,andthenpropagated throughsdstomakeinformationavailableathighspeed. Although part of the same argument as above, it s worth pointing out that existing identity sources might not be designed or managed in a way that is suitable for real<time integration with new enterprise services. FDS represents an insulateandextend approachwherechangesarepulled onlyonce from existing systems and after that are accessed only from SDS. It is therefore possible to deliver world<class performance independent of the speed and availabilityofexistingsystems. 5 Passwords are usually one<way encrypted. This means that you can ask a server is this the correct password for this user, but cannot ask what is the password for this user. As a result passwords generally cannot be copied betweensystemsunlesstheysharetheexactsameencryptionalgorithm.

8 Compared to a traditional virtual directory approach, the FDS approach ensuresthatdataisavailableathighspeedaccessbeforeitisrequestedbyauser. And finally, all data can be aggregated, cleaned and harmonized to a common formatbeforeitisaccessed.themorecomplexthedataharmonization,themore costly it is to perform this in real<time and still maintain an acceptable level of performance. Conclusion& Federated Directory Server provides a new range of options for identity infrastructures. Existing directories can be seamlessly integrated into new directory services that scale in a manner that previously was not possible. Existingusermanagementprocessescanstayinplace,andcanevenbeapplied tonewdirectorieswhendesired. AsFDSisbasedontheDirectoryIntegratortechnology,itcanbecustomizedto practicallyanyscenariotohandlethespecificrequirementsoforganizationsthat haveuniquetechnicalchallenges. With FDS, distributed identity silos can be brought together so that the enterprisecanexposeasingle,logical,rich,andstructuredinterfacetonewand existingenterpriseapplications.

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

Designing a Data Solution with Microsoft SQL Server 2014

Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 22 June 2016 Designing a Data Solution with Microsoft SQL Server 2014 Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 5 days Course Description: The focus

More information

Course 20465C: Designing a Data Solution with Microsoft SQL Server

Course 20465C: Designing a Data Solution with Microsoft SQL Server Course 20465C: Designing a Data Solution with Microsoft SQL Server Module 1: Introduction to Enterprise Data Architecture As organizations grow to enterprise scale, their IT infrastructure requirements

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Egnyte Cloud File Server. White Paper

Egnyte Cloud File Server. White Paper Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage

More information

20465: Designing a Data Solution with Microsoft SQL Server

20465: Designing a Data Solution with Microsoft SQL Server 20465: Designing a Data Solution with Microsoft SQL Server Microsoft - Base de Dados Nível: Avançado Duração: 30h Sobre o curso The focus of this five-day instructor-led course is on planning and implementing

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

White Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services

White Paper: Cloud Identity is Different. World Leading Directory Technology. Three approaches to identity management for cloud services World Leading Directory Technology White Paper: Cloud Identity is Different Three approaches to identity management for cloud services Published: March 2015 ViewDS Identity Solutions A Changing Landscape

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support

Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support Learning & Development Specialist Customer Support Services Been with Microsoft for 7 years Professionally

More information

UIT USpace Flexible and Secure File Manager for Cloud Storage

UIT USpace Flexible and Secure File Manager for Cloud Storage UIT USpace Flexible and Secure File Manager for Cloud Storage USpace File Manager for Cloud Storage Main features: USpace is a cloud storage solution which is very suitable for both private cloud deployment

More information

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Timothy Siu SE Manager, JES Nov/10/2003 sun.com/solutions/

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

Building a Cloud-Ready, Future-Proof Identity Infrastructure:

Building a Cloud-Ready, Future-Proof Identity Infrastructure: Building a Cloud-Ready, Future-Proof Identity Infrastructure: Three Keys to Success UnboundID Corp. 13809 Research Blvd Suite 500 Austin, TX 78750 512-600-7700 www.unboundid.com Executive Summary Social

More information

Designing a Data Solution with Microsoft SQL Server 2014

Designing a Data Solution with Microsoft SQL Server 2014 Page 1 of 8 Overview The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies.

More information

Moving to the Cloud: What Every CIO Should Know

Moving to the Cloud: What Every CIO Should Know Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Microsoft SharePoint Architectural Models

Microsoft SharePoint Architectural Models Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint

More information

IBM Cognos Performance Management Solutions for Oracle

IBM Cognos Performance Management Solutions for Oracle IBM Cognos Performance Management Solutions for Oracle Gain more value from your Oracle technology investments Highlights Deliver the power of predictive analytics across the organization Address diverse

More information

Designing a Data Solution with Microsoft SQL Server

Designing a Data Solution with Microsoft SQL Server The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL Server 2014 and other Microsoft technologies. It describes how

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

Open-Xchange Hosted Edition Directory Integration

Open-Xchange Hosted Edition Directory Integration OPEN-XCHANGE Whitepaper Open-Xchange Hosted Edition Directory Integration Concept to integrate Open-Xchange Hosted Edition into Company Directory Services v1.00 Author: Editors: Layout: Manuel Kraft Manuel

More information

SMART Solutions for Active Directory Migrations

SMART Solutions for Active Directory Migrations SMART Solutions for Active Directory Migrations Challenges of Active Directory Migrations Types of Active Directory Migrations Intra- Forest Migration between Domains in the Same Forest Separate a Forest

More information

Course 20465: Designing a Data Solution with Microsoft SQL Server

Course 20465: Designing a Data Solution with Microsoft SQL Server Course 20465: Designing a Data Solution with Microsoft SQL Server Overview About this course The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure

More information

Designing a Data Solution with Microsoft SQL Server

Designing a Data Solution with Microsoft SQL Server Course 20465C: Designing a Data Solution with Microsoft SQL Server Page 1 of 6 Designing a Data Solution with Microsoft SQL Server Course 20465C: 4 days; Instructor-Led Introduction The focus of this four-day

More information

Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465

Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Course Outline Module 1: Designing a Database Server Infrastructure This module explains how to design an appropriate database server

More information

Cross-domain Identity Management System for Cloud Environment

Cross-domain Identity Management System for Cloud Environment Cross-domain Identity Management System for Cloud Environment P R E S E N T E D B Y: N A Z I A A K H TA R A I S H A S A J I D M. S O H A I B FA R O O Q I T E A M L E A D : U M M E - H A B I B A T H E S

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions 20533B - Version: 1 02 July 2016 Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions 20533B - Version: 1 5 days Course Description: This course is

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

Modernize IAM with a Web Scale LDAP Directory Server

Modernize IAM with a Web Scale LDAP Directory Server Modernize IAM with a Web Scale LDAP Directory Server with Nathanael Coffing, Co- founder of Syntegrity Copyright 2015 UnboundID, Inc. Today s Speakers Terry Sigle Dir. of SoluEons Engineering, UnboundID

More information

Designing Database Solutions for Microsoft SQL Server 2012

Designing Database Solutions for Microsoft SQL Server 2012 Course 20465A: Designing Database Solutions for Microsoft SQL Server 2012 Length: Audience(s): 5 Days Level: 300 IT Professionals Technology: Microsoft SQL Server 2012 Type: Delivery Method: Course Instructor-led

More information

Server-based Password Synchronization: Managing Multiple Passwords

Server-based Password Synchronization: Managing Multiple Passwords Server-based Password Synchronization: Managing Multiple Passwords Self-service Password Reset Layer v.3.2-004 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax:

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Exam : 000-003 Title : Fundamentals of Applying Tivoli Security and Compliance Management Solutions V2 Version : Demo 1.What is another

More information

Active Directory LDAP

Active Directory LDAP Whitepaper WPS Parking Solutions Hoevenweg 11 5652 AW EIndhoven T +31 (0)40 250 91 11, info@wps-nl.com, www.wpsparkingsolutions.com T +31(0)40 250 91 11, E info@wps-nl.com, W www.wpsparkingsolutions.com

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from

More information

How To Deploy Cisco Jabber For Windows 2.5.1 On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or

How To Deploy Cisco Jabber For Windows 2.5.1 On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or Deployment Models Cisco Jabber for Windows provides two deployment models, on-premises or cloud-based. Learn about each deployment model and review the available options for on-premises and cloud-based

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

TO DEPLOY A VIRTUAL DIRECTORY TOP THREE REASONS. White Paper June 2009. Abstract

TO DEPLOY A VIRTUAL DIRECTORY TOP THREE REASONS. White Paper June 2009. Abstract TOP THREE REASONS TO DEPLOY A VIRTUAL DIRECTORY White Paper June 2009 Abstract A virtual directory presents a single, consolidated view of disparate identity data to organizations dealing with diverse

More information

PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者

PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者 PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者 http://www.pass4test.jp 1 年 で 無 料 進 級 することに 提 供 する Exam : 000-003 Title : Fundamentals of Applying Tivoli Security and Compliance Management Solutions V2 Vendors :

More information

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

ENZO UNIFIED SOLVES THE CHALLENGES OF OUT-OF-BAND SQL SERVER PROCESSING

ENZO UNIFIED SOLVES THE CHALLENGES OF OUT-OF-BAND SQL SERVER PROCESSING ENZO UNIFIED SOLVES THE CHALLENGES OF OUT-OF-BAND SQL SERVER PROCESSING Enzo Unified Extends SQL Server to Simplify Application Design and Reduce ETL Processing CHALLENGES SQL Server does not scale out

More information

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper Okta White paper Top 8 Identity and Access Management Challenges with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-top8-113012

More information

BEDIFFERENT ACE G E R M A N Y. aras.com. Copyright 2012 Aras. All Rights Reserved.

BEDIFFERENT ACE G E R M A N Y. aras.com. Copyright 2012 Aras. All Rights Reserved. Copyright 2012 Aras. All Rights Reserved. BEDIFFERENT ACE G E R M A N Y Copyright 2012 Aras. All Rights Reserved. ACE Germany Leveraging the Cloud Rob McAveney Director of Product Management Aras Corp

More information

BES10 Cloud architecture and data flows

BES10 Cloud architecture and data flows BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

The State of Hybrid Cloud

The State of Hybrid Cloud The State of Hybrid Cloud To learn more about this full research or to inquire about membership, contact us: +1-866-913-8101 IT.Support@ executiveboard.com www.cebglobal.com/it CEB Infrastructure Leadership

More information

White Paper Converting Lotus Notes Applications to the Cloud Using the CIMtrek converter Product

White Paper Converting Lotus Notes Applications to the Cloud Using the CIMtrek converter Product White Paper Converting Lotus Notes Applications to the Cloud Using the CIMtrek converter Product CIMtrek Ltd Introduction: CIMTrek has been created to help organizations modernise their legacy applications

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

This course is intended for database professionals who need who plan, implement, and manage database solutions. Primary responsibilities include:

This course is intended for database professionals who need who plan, implement, and manage database solutions. Primary responsibilities include: Course Page - Page 1 of 5 Designing Solutions for Microsoft SQL Server 2014 M-20465 Length: 3 days Price: $1,795.00 Course Description The focus of this three-day instructor-led course is on planning and

More information

How To Get A Single Sign On (Sso)

How To Get A Single Sign On (Sso) Single Sign-On Vijay Kumar, CISSP Agenda What is Single Sign-On (SSO) Advantages of SSO Types of SSO Examples Case Study Summary What is SSO Single sign-on is a user/session authentication process that

More information

IDENTITY & ACCESS MANAGEMENT

IDENTITY & ACCESS MANAGEMENT Securely Enabling Your Business IDENTITY & ACCESS MANAGEMENT Customer Solution Case Study FishNet Security Helps Hotelier Prepare for Rapid Move to Cloud with New Identity Management Solution Achieving

More information

White Paper. Using Universal Platform TM to Facilitate Disaster Recovery Projects

White Paper. Using Universal Platform TM to Facilitate Disaster Recovery Projects White Paper Using Universal Platform TM to Facilitate Disaster Recovery Projects Page 2 of 9 Common challenges faced by companies during a Disaster Recovery project Controlling and brokering access to

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 20465B; 5 days, Instructor-led

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 20465B; 5 days, Instructor-led Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 20465B; 5 days, Instructor-led Course Description This five-day, instructor-led course provides you with the

More information

Grid and Multi-Grid Management

Grid and Multi-Grid Management Key Benefits High Availability, Massive Scalability Infoblox Provides always on network services through scalable, redundant, reliable and faulttolerant architecture Guarantees data integrity and availability

More information

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

BEDIFFERENT A C E 2 0 1 2 I N T E R N A T I O N A L

BEDIFFERENT A C E 2 0 1 2 I N T E R N A T I O N A L Copyright 2012 Aras. All Rights Reserved. BEDIFFERENT A C E 2 0 1 2 I N T E R N A T I O N A L Copyright 2012 Aras. All Rights Reserved. ACE 2012 I N TERNATIONAL Leveraging the Cloud Rob McAveney Director

More information

Ariett Purchasing & Expense Management. Go Paperless, Go Mobile, Go Easy.

Ariett Purchasing & Expense Management. Go Paperless, Go Mobile, Go Easy. Ariett Purchasing & Expense Management Use Ariett on Any Device Ariett Purchasing & Expense Management Ariett in the Microsoft Azure Cloud Microsoft Recently Published Case Study on Ariett Product Solutions

More information

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the

More information

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser Kaseya Product Brief The Kaseya Platform Making your systems more secure, your staff more productive, your services more reliable and your results easier to validate. No matter what part of Kaseya s integrated

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

SECURITY AND REGULATORY COMPLIANCE OVERVIEW Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for

More information

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT OMADA IDENTITY SUITE - Adaptable Identity Management and Access Governance Governance Compliance Identity Management Cloud Self-Service Security Complete control of who has access to what is an essential

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

EMC Data Protection Advisor 6.0

EMC Data Protection Advisor 6.0 White Paper EMC Data Protection Advisor 6.0 Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection environments, improve compliance

More information

Directory Integration in LANDesk Management Suite

Directory Integration in LANDesk Management Suite Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer

More information

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Choosing a File Sync & Share Solution PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Agenda File Sync & Share What and Why File Sync & Share How Selection Criteria Q & A Summary 3

More information

20465C: Designing a Data Solution with Microsoft SQL Server

20465C: Designing a Data Solution with Microsoft SQL Server 20465C: Designing a Data Solution with Microsoft SQL Server Course Details Course Code: Duration: Notes: 20465C 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Simplified Management With Hitachi Command Suite. By Hitachi Data Systems

Simplified Management With Hitachi Command Suite. By Hitachi Data Systems Simplified Management With Hitachi Command Suite By Hitachi Data Systems April 2015 Contents Executive Summary... 2 Introduction... 3 Hitachi Command Suite v8: Key Highlights... 4 Global Storage Virtualization

More information

OpenStack Cloud Migration : Migrating On-premise workloads to OpenStack Private Cloud

OpenStack Cloud Migration : Migrating On-premise workloads to OpenStack Private Cloud OpenStack Cloud Migration : Migrating On-premise workloads to OpenStack Private Cloud June 16, 2015 DONGJOON MIN ISA TECHNOLOGIES,INC. 1 djmin@zconverter.com Table of Contents Executive Summary.. 3 What

More information

WHITEPAPER SECURITY APPROACHES AND SECURITY TECHNOLOGIES IN INTEGRATION CLOUD

WHITEPAPER SECURITY APPROACHES AND SECURITY TECHNOLOGIES IN INTEGRATION CLOUD WHITEPAPER SECURITY APPROACHES AND SECURITY TECHNOLOGIES IN INTEGRATION CLOUD TABLE OF CONTENTS 1 In this whitepaper... 3 2 User security... 4 2.1 Authentication... 4 2.2 Authorization & Access Control...

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

Road2Master Office 365 Hybrid Deployment and Migration Part 1 - Introduction. Ashwin Venugopal www.road2master.ms

Road2Master Office 365 Hybrid Deployment and Migration Part 1 - Introduction. Ashwin Venugopal www.road2master.ms Please Note: This is made for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS. Unless otherwise noted, the example companies, organizations,

More information

WHITE PAPER. Active Directory and the Cloud

WHITE PAPER. Active Directory and the Cloud WHITE PAPER Active Directory and the Cloud HyperOffice, 2011 What is Active Directory? What are its benefits? Active Directory (AD) is a directory service created by Microsoft. Active Directory is popularly

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

Understanding Object Storage and How to Use It

Understanding Object Storage and How to Use It SWIFTSTACK WHITEPAPER An IT Expert Guide: Understanding Object Storage and How to Use It November 2014 The explosion of unstructured data is creating a groundswell of interest in object storage, certainly

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System

More information

"Charting the Course... MOC 20465 C Designing a Data Solution with Microsoft SQL Server Course Summary

Charting the Course... MOC 20465 C Designing a Data Solution with Microsoft SQL Server Course Summary Course Summary Description The focus of this five-day instructor-led course is on planning and implementing enterprise database infrastructure solutions by using SQL and other Microsoft technologies. It

More information

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper Top Eight Identity & Access Management Challenges with SaaS Applications Okta White Paper Table of Contents The Importance of Identity for SaaS Applications... 2 1. End User Password Fatigue... 2 2. Failure-Prone

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

Better Together with Microsoft Dynamics CRM

Better Together with Microsoft Dynamics CRM Better Together with Microsoft Dynamics CRM Enhance the power and effectiveness of Microsoft Dynamics CRM business software with Microsoft products and technologies that work even better, together. Microsoft

More information

Extend and Enhance AD FS

Extend and Enhance AD FS Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy

More information

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise

More information

Course 20465C: Designing a Data Solution with Microsoft SQL Server

Course 20465C: Designing a Data Solution with Microsoft SQL Server Course 20465C: Designing a Data Solution with Microsoft SQL Server Five days, instructor-led About this Course The focus of this five-day instructor-led course is on planning and implementing enterprise

More information

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

Building Secure Cloud Applications. On the Microsoft Windows Azure platform Building Secure Cloud Applications On the Microsoft Windows Azure platform Contents 1 Security and the cloud 3 1.1 General considerations 3 1.2 Questions to ask 3 2 The Windows Azure platform 4 2.1 Inside

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance

More information

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1 Documentation CloudAnywhere http://www.cloudiway.com Page 1 Table of Contents 1 INTRODUCTION 3 2 OVERVIEW 4 2.1 KEY FUNCTIONALITY 4 2.2 PREREQUISITES 5 3 FEATURES 6 3.1 A UNIVERSAL PROVISIONING SOLUTION.

More information

OracleAS Identity Management Solving Real World Problems

OracleAS Identity Management Solving Real World Problems OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability

More information

Designing a Data Solution with Microsoft SQL Server

Designing a Data Solution with Microsoft SQL Server Course Code: M20465C Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing a Data Solution with Microsoft SQL Server Overview The focus of this five-day instructor-led course is on planning

More information

6231A - Maintaining a Microsoft SQL Server 2008 Database

6231A - Maintaining a Microsoft SQL Server 2008 Database 6231A - Maintaining a Microsoft SQL Server 2008 Database Course Number: 6231A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft Certified Professional

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

Designing a Data Solution with Microsoft SQL Server 2014

Designing a Data Solution with Microsoft SQL Server 2014 CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Course 20465C: Designing a Data Solution with Microsoft SQL Server 2014 Length: 5 Days Audience: IT Professionals

More information

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest

More information

Security, Reliability & Control with Hosted Exchange

Security, Reliability & Control with Hosted Exchange Hosted Applications Commonly referred to a Cloud Computing and/or Software-as-a-Service (SaaS), web-hosted software applications service provides you with a new way to get business software and applications

More information