Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected]
|
|
|
- Britney Ryan
- 10 years ago
- Views:
Transcription
1 Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected] International Center for Advanced Internet Research
2 Outline Security Mechanisms Access Control Schemes Shibboleth Underlying Technologies Conclusion David E. Martin NetSecure09 March 12,
3 Common Security Mechanisms Username/Password Static Password One Time Password Dynamically Generated Password (SecureID Fob) Digital Certificate Kerberos Ticket Biometric Data David E. Martin NetSecure09 March 12,
4 Username/Password Advantages Everyone is familiar with it Generally easy to remember Disadvantages People Generally Chose Common Username and a Bad Password Difficult to Securely Issue/Reset a Password Others Can Read a Username/Password Sent Over a Network David E. Martin NetSecure09 March 12,
5 Username/Password Variations One Time Password User Gets a List of Passwords Each Can Be Used Once Example: German Banks Issues 6-Digit TAN To Customers to Authorize On-Line Transactions Dynamically Generated Password A Program or Device Uses an Algorithm to Generate a Password the Server Expects Example: Wells Fargo Sends out SecureID Fobs Biometric Data Fingerprint or Retinal Image is Sent as Password Mostly Used to Secure Local Data Example: Lenovo Client Security Solutions Uses Fingerprint Reader to Access Local Password Store David E. Martin NetSecure09 March 12,
6 Issues Enforcing Good Passwords Nobody Likes Your Password must be at least six characters with a mixture of letters and numbers. It must be changed every 90 days and you cannot reuse passwords. Issuing One-Time Passwords List Must Be Transmitted Securely And Stored Securely Hardware SecureID Fobs Get Lost, Fingerprint Readers Break David E. Martin NetSecure09 March 12,
7 Digital Certificates Private/Public Keys Each User and Server Has A Public and Private Key A Message Encrypted with the Private Key Can Only Be Read with the Public Key A Message Encrypted with the Public Key Can Only Be Read with the Private Key X.509 ITU-T Standard for a Public Key Infrastructure Public Key Certificates, Certificate Revocation Lists, Attribute Certificates, and a Certification Path Validation Algorithm David E. Martin NetSecure09 March 12,
8 Public/Private Key Scenarios Verify Identity X Gets An Encrypted Message from Y X Decrypt it With the Y s Public Key If This Decryption Works, The Message is From Y Send Message Securely X Encrypts the Message with Y s Public Key and Sends the Message to Y Y Receives the Message and Decrypts It with His Private Key The Message Can Only Be Read by Y David E. Martin NetSecure09 March 12,
9 SSL Negotiation From David E. Martin NetSecure09 March 12,
10 Digital Certificate Problems Users Hate Them Can t Remember Them Can t Understand Them Can t Move Them Around A Certificate Doesn t Verify Identity You Have a Secure Link, But Who Is On the Other End? David E. Martin NetSecure09 March 12,
11 Required New Yorker Cartoon David E. Martin NetSecure09 March 12,
12 Identity Solutions Manual Sending of Public Key Public Directory LDAP, Web Pages Web of Trust Key Ring Private Key Infrastructure David E. Martin NetSecure09 March 12,
13 PKI Architecture David E. Martin NetSecure09 March 12,
14 PKI Implementations PKI Deployed In Limited Areas Verification of WWW Server Identity Heavily Used in Internet Explorer and Firefox Closed User Groups Like Universities or Government Despite Expectations A Worldwide PKI Has Not Formed PKI Is Used for Users to Authenticate a Server And To Establish Secure Connection Between Server and User But Plain Old Username/Password is Used by the Server to Authenticate User David E. Martin NetSecure09 March 12,
15 Controlling Access to Resources Identity Based on IP Address The Site Supplies a Range of IP Addresses to the Resource Provider The Resource Provider s Server Looks at the Source IP of the Request Requests from Addresses in the Range Identified Are Granted Access to the Resources Purchased by the Site Proxy Servers or VPNs Allow Off-Site Access Privacy is Maintained, But No Ability to Control Specific Users or Groups Identity Based on Registration A User Registers with a Resource Supplier, Who Verifies It with the Site The User is Given a Unique Username/Password to Gain Access to the Resource Privacy is Lost, But Access Can Be Tailored to Each User or Group Attributes Rather Than Identity The User Requests Access to a Resource The Resource Provider Queries the Site About the User and Attributes are Exchanged Until the Resource Provider Has Enough Information Privacy is Maintained, And Access Can Be Controlled at the User Level David E. Martin NetSecure09 March 12,
16 What is Shibboleth? An Architecture and Protocol An Attribute-Based System A Set of Profiles Based on the OASIS SAML Standard A Project of the Internet2 Middleware Initiative Defining a Policy Framework and the Shibboleth Architecture Developing an Open Source Implementation Supporting the Deployment of Shibboleth in Higher Ed An Implementation of the Shibboleth Architecture Software Developed by the I2/MACE Shibboleth Project There are Other Independent Implementations David E. Martin NetSecure09 March 12,
17 Where Does Shibboleth Come From? Shibboleth is a Hebrew Word That Means an Ear of Corn, Stream or Flood The Word Comes from the Old Testament (Judges 12:1-6) The Ephraimites Were Returning Home After Being Defeated Trying to Invade Gilead. The Fords Across the River Jordan Were Blocked By Gildeadites Who Made Those Who Wanted to Pass Say Shibboleth. The Ephraimites Pronounced the sh as si and Thus Were Identified and Killed. In Modern Usage, A Shibboleth is a Word or Sound Used to Detect Outsiders David E. Martin NetSecure09 March 12,
18 Shibboleth Goals Provide Security While Not Degrading Privacy Attribute-based Access Control Have the Enterprise Broker Most Services in Inter-Realm Interactions Authentication, Authorization, Resource Discovery, etc. Foster Inter-Realm Trust Fabrics Leverage campus expertise and build rough consensus Influence the Marketplace; Develop Where Necessary Support for Heterogeneity and Open Standards Multiple Implementation of Shibboleth OASIS SAML David E. Martin NetSecure09 March 12,
19 Shibboleth Architecture 1. The User Accesses A Protected Resource 2. The Resource Redirects The User To The Where Are You From? (WAYF) Service, So That He Can Select His Home Organization 3. The User Is Then Directed To His Home Organization, Which Sends Him To The Authentication System For His Organization 4. The User Authenticates Himself, By Whatever Means His Organization Deems Appropriate 5. After Successful Authentication, A One-time Handle Or Session Identifier Is Generated For This User Session, And The User Is Returned To The Resource 6. The Resource Uses The Handle To Request Attribute Information From The Identity Provider For This User 7. The Organization Allows Or Denies The Attribute Information To Be Made Available To This Resource Using The Attribute Release Policy. 8. Based On The Attribute Information Made Available, The Resource Then Allows Or Denies The User Access To The Resource David E. Martin NetSecure09 March 12,
20 Shibboleth Architecture David E. Martin NetSecure09 March 12,
21 Shibboleth Demo Here David E. Martin NetSecure09 March 12,
22 Trust and Attribute Exchange In Order for This to Work The Service Provider and Identity Provider Must Trust Each Other Shibboleth Projects Spends Much Time on Such Federation There Must Also be a Common Way of Requesting and Supplying Attributes Shibboleth Drove Efforts to Develop SAML Finally, the Attributes Must be Understood by Both Parties Shibboleth Led eduperson Effort David E. Martin NetSecure09 March 12,
23 SAML Security Assertion Markup Language (SAML) An XML-Based Standard for Exchanging Authentication and Authorization Data Between Security Domains Between an Identity Provider (a Producer of Assertions) and a Service Provider (a Consumer of Assertions) SAML is a product of the OASIS Security Services Technical Committee SAML 2.0 Issued in March 2005 David E. Martin NetSecure09 March 12,
24 eduperson SAML Defines How to Pass Attributes, But Not What The Attributes Are Most Shibboleth Service Providers Require eduperson Attributes to be Passed From the Identity Provider eduperson Defines a Common Set of Attributes and Definitions displayname, givenname, Initials, telephonenumber, postaladdress, preferredlanguare, eduperson Extends inetorgperson with Attributes Supporting inter-realm Access David E. Martin NetSecure09 March 12,
25 Conclusion Shibboleth Provides Strong Authentication While Maintaining Privacy Shibboleth Drives Associated Technologies SAML, eduperson, Federation Shibboleth is Being Expanded Beyond Web Access GridShib Integrates Shibboleth Into Globus Toolkit Shibboleth is A Model for Commercial Efforts CardSpace, Liberty Alliance, etc. Thanks to Ken Klingenstein and Team David E. Martin NetSecure09 March 12,
Single Sign-On: Reviewing the Field
Outline Michael Grundmann Erhard Pointl Johannes Kepler University Linz January 16, 2009 Outline 1 Why Single Sign-On? 2 3 Criteria Categorization 4 Overview shibboleth 5 Outline Why Single Sign-On? Why
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
TF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component =============================================
TF-AACE Deliverable B.2 Define the components and protocols to guarantee a harmonized operation of A&A systems Deliverable B2 - The Authentication Component =============================================
Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications
Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:
Distributed Identity Management Model for Digital Ecosystems
International Conference on Emerging Security Information, Systems and Technologies Distributed Identity Management Model for Digital Ecosystems Hristo Koshutanski Computer Science Department University
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
An Anti-Phishing mechanism for Single Sign-On based on QR-Code
An Anti-Phishing mechanism for Single Sign-On based on QR-Code Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Implementing Identity Provider on Mobile Phone
Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,
Patron Verification and Security The Web OPAC and Beyond. Richard Goerwitz Carleton College
Patron Verification and Security The Web OPAC and Beyond Richard Goerwitz Carleton College Who am I? I work primarily in higher education University of Chicago Brown University Currently at Carleton College
2 Transport-level and Message-level Security
Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective The Globus Security Team 1 Version 4 updated September 12, 2005 Abstract This document provides an overview of the Grid Security
Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone
Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Although single sign-on (SSO) technology based on Liberty standards is being rapidly adopted by businesses, governments and
Controlling Web Access with BMC Web Access Manager WHITE PAPER
Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Globus Toolkit: Authentication and Credential Translation
Globus Toolkit: Authentication and Credential Translation JET Workshop, April 14, 2004 Frank Siebenlist [email protected] http://www.globus.org/ Copyright (c) 2002 University of Chicago and The University
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September 2007. Trianz 2008 White Paper Page 1
White Paper Authentication and Access Control - The Cornerstone of Information Security Vinay Purohit September 2007 Trianz 2008 White Paper Page 1 Table of Contents 1 Scope and Objective --------------------------------------------------------------------------------------------------------
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
External Authentication with WebCT. What We ll Discuss
External Authentication with WebCT WebCT, Inc http://www.webct.com/ What We ll Discuss Introductions Terminology Authentication in WebCT External Authentication Custom Authentication Authorization in WebCT
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
Standards and Guidelines for. Information Technology. Infrastructure, Architecture, and Ongoing Operations
Standards and Guidelines for Information Technology Infrastructure, Architecture, and Ongoing Operations This document describes applicable standards and guidelines for the university's policy on Information
Scenario: IPsec Remote-Access VPN Configuration
CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create
How to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
Angel Dichev RIG, SAP Labs
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine SSL
Abstract. 1. Introduction. Ohio State University Columbus, OH 43210 {langella,oster,hastings,kurc,saltz}@bmi.osu.edu
Dorian: Grid Service Infrastructure for Identity Management and Federation Stephen Langella 1, Scott Oster 1, Shannon Hastings 1, Frank Siebenlist 2, Tahsin Kurc 1, Joel Saltz 1 1 Department of Biomedical
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
OIO SAML Profile for Identity Tokens
> OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6
Web based single sign on. Caleb Racey Web development officer Webteam, customer services, ISS
Web based single sign on Caleb Racey Web development officer Webteam, customer services, ISS Overview The need for single sign on (SSO) User and admin perspectives Current state off SSO provision pubcookie
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
An SAML Based SSO Architecture for Secure Data Exchange between User and OSS
An SAML Based SSO Architecture for Secure Data Exchange between User and OSS Myungsoo Kang 1, Choong Seon Hong 1,Hee Jung Koo 1, Gil Haeng Lee 2 1 Department of Computer Engineering, Kyung Hee University
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003
Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled
Application of the PAPI authn and authz system to the TJ-II Remote Participation environment. Madrid, 21 March 2003
Application of the PAPI authn and authz system to the TJ-II Remote Participation environment Madrid, 21 March 2003 Outline An introduction to PAPI A short tour on PAPI internals Applying PAPI in the TJ-II
ShareFile Security Overview
ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Shibboleth On-line Authentication System
Shibboleth On-line Authentication System Jon Browne Senior Consultant Drew Heald BSc (Hons), MPhil, MCP Systems Developer IBIS Business Consultants Ltd Accessing a Web Resource Request Client W W W Server
SAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate
TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES
TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES Xiaoyu Li a and Maree Pather b a Department of Information Technology, Nelson Mandela Metropolitan University b Department of Applied
GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK
Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
