Digital Identity Management
|
|
|
- Elisabeth Underwood
- 10 years ago
- Views:
Transcription
1 Digital Identity Management Roohul Halim Syed Atif Shaharyar {rooha433, Supervisor: Anna Vapen, Project Report for Information Security Course Linköpings university, Sweden Abstract Recent trends in implementation of Identity Management Systems (IDMS) show the emergence of a predominant, hybrid approach which implements the functionalities of both Federated Single Sign-On (FSSO) and User-Centric Identity Management (UCIM). This allows users to control authentication process while still retaining the convenient features of federated single sign on. This paper presents the conceptual differences and similarities in UCIM and FSSO for better understanding of the design approaches to user centric, federated and hybrid IDMS. 1. Introduction The term digital identity refers to attributes and values that uniquely identify the real world entities (individual, organization, system or machine) that may act/participate in the digital world to gain access to certain resources. The crisis of managing digital identity grows with the proportional growth in usage of digital systems in businesses and government organizations, resulting a single entity forms many identity relations with different digital administrative authorities that knows particular entity in a certain ways. Over the years many mechanisms have been developed for entities presenting credentials for authentication to gain access to the resources. The differences in approaches are based on system requirements, administrative policies, technologies and security risks however usability of the identification mechanisms remains pivotal to all these factors. Conceptually there are different levels of identity management based on design, implementation and functionalities they provide, that distinguishes roles federated and user centric systems [9]. Moreover the mechanisms of these IDMS differ on the basis of credential management procedures. These procedures depend on whether multi domain identity sharing is required and the degree required for users controlling the process. [1, 9] 1.1 Aim The aim of this report is to present an overview of different mechanisms of identity management solutions generally used and the recent trends that leads to the forming of new mechanisms. The report also covers different identity management solutions and their taxonomy on the bases of goal, architecture, security and usability. Moreover we intend to answer the following questions: What are the factors on which classification of identity management system depends? What are the recent trends in IDMS development? What are the security and usability aspects of various IDMSs? On the basis of such a study, differences and similarities between each mechanism of IDMS are presented. 1.2 Method For data gathering and research we have used the methodology that, first we have selected some scientific and research articles published or presented in reputed conferences related to federated and user-centric identity management from different databases and then we have analyzed them. We have compared federated and usercentric identity management after analyzing it from the papers by means of differences and similarities between them. On the basis of such analysis the results are presented. 1.3 Background Digital Identity management is the process of representing and identifying individuals in computer networks. During our research and study, we identify three identity mechanisms; federated, user-centric and hybrid. Under each category, there are various identity management systems available in the market, some of
2 Fig 1. Simple SSO operation them are open source and some are license based. Various established and big IT companies provide identity management systems and services to their clients. IBM Tivoli Access Manager is a federated Single sign on solution single sign-n and sign-off across the enterprise and the capability to configure security policies to prevent unauthorized access to private corporate applications [10]. Sun OpenSSO Enterprise provides complete solution of Single Sign-On (SSO) for internal and external applications [11]. Oracle Enterprise Single Sign-On is designed to use any LDAP directory or any database server as its user record storage. It can work with biometrics or token solutions [12]. The very famous SSO open source system, which is originally developed by Yale University and it, became Jasig project in December 2004 [7], is known as CAS (Central Authentication Service). This system is very popular among the educational institutes and it provides more or less all the functionality, which any other FSSO systems provide. We can also take an example of Google, Microsoft and yahoo; it provides single sign-on to its users when accessing s, groups, docs etc. 2. Federated Identity Management A federation is a group of institutions and organizations that sign up to an agreed set of policies for exchanging information about users and resources to enable access and use of resources and services. The federation, combined with identity management software within institutions and organizations, can be referred to as federated access management. Federated identity systems bring together two or more separately managed identity systems to perform mutual authentication and authorization tasks and to share identity attributes and offer users cross-domain single sign-on [6]. In Federated Identity management, one party collects all information and manages it and facilitates all information between them.. A Federated Single Sign-on (FSSO) system is an IDMS that allows the use of the same user s Personal Identification Information (PII) across multiple organizations within a federation [3]. Normally users have to sign-on to multiple systems with multiple sign-on pages, each of which may involve different usernames and passwords. The goal of FIM is to permit users to access different resources such as (websites and/or applications) from one sign-on. User has to sign in only once to access all the resources and services of different partners across the enterprise. There will be only one partner for allocating and managing the identities. Federated Identity management involves three parties; the client web browser, application which is requesting for authentication and the third is SSO server [6]. Figure 1 shows the details operation of the Federated Single Signon mechanism. The hassles of administration regarding managing user accounts become simple by implementing single sign-on. The SSO server performs authentication and only the authentication server stores the password this increases the overall security since the passwords are not passed across the network to other applications. The credentials
3 never leave the authentication domain, it just passes a ticket to the application and the application never knows about the credentials. Secondly the affiliated or secondary domains must have to trust on the authentication domain that credentials must be asserted properly and protect it from unauthorized use. Although implementing SSO decreases some security aspects but it increases in some other ways. For example, if a user leaves his machine without logging off, a malicious user can access the application. Though it is a general security problem but it is even worst with SSO because the malicious user can have access to all resources and application. Another security problem is that a single central authentication service is used for all the applications; it can be very attractive for the attackers who plan for a denial of service attack. With a single central authentication, if the access information has been hacked then it means that the attacker can access all the resources with one access information [6]. Federated SSO have some dependencies i.e. it relies on other infrastructure like authentication system, requires interface to the web server and identity management/registration. Most SSO systems are HTTP based and rely on cookies which is widely accepted and supported by the browsers but users who disable cookies or change browser security settings may lose SSO capability, HTTP redirection and placement of token in a query string are other dependencies of the SSO systems. HTTP is a stateless protocol, every time SSO software must check every request by the user s end, that he/she is authenticated user and have access to the resources. The session or authentication polices should be maintained on the SSO server. This means that every time the user clicks on a link or URL, there is traffic between the user browser, web application and SSO server. This traffic can become large; therefore most modern single sign on systems use LDAP (lightweight Directory Access Protocol) directories to store the authentication and authorization policies [7]. SSO Needs protocol between authentication domain and target application like Token/ticket-based and SAML POST/artefact profiles. Applications often need more than just authentication information like attributes of the user etc. X.509 certificates provide an alternative approach for the cookies but it has some draw backs it requires installation on the user s machine and it can be confusing for users [7]. 3. User Centric Identity User centric identity is management in which user are in context rather than the organizations. A user -centric IDMS needs to support user control and consider usercentric architectural and usability aspects. [1] It enables people to choose which of their identities to use at which sites, analogously to how they choose which card to pull out of their wallet in different circumstances. In user centricity the user is involved in every identity transaction. It provides user to choose identity form different identity providers on whom they trust. It enables users to protect their privacy and easiness to adopt and use. No need to remember passwords and username for different applications, the user can use same username and password everywhere. OpenID is an access user mechanism for user centric identity and it is also a decentralized mechanism for single sign on. Users have the option to select the provider on whom they trust and only maintain relationships with identity providers on whom they trust and rely and in this context the user has control over his attributes and he is involved in every identity provisioning transaction [1]. It solves the problem of scattering online profile across the dozens of sites. 3.1 OpenID Framework OpenID 1.0 was originally developed in 2005 by Brad Fitzpatrick, Chief Architect of Six Apart, Ltd.. It is now deployed by a wide range of websites, particularly those heavy in user-generated content [1]. OpenID 1.0 provides HTTP-based URL authentication protocol. However with the new upgraded protocol, OpenID authentication 2.0 is becoming the community driven platform, such that it provides better flexibility and encourage innovation. OpenID 2.0 introduced new technology called XRI (Extensible Resource Identifiers) instead of URL based authentication technique. XRI has better security and support for both public and private identifiers. OpenID 2.0 still provides support for both URL and XRIs as user identifiers. With continuing growth and development the OpenID framework is considered as feasible solution for UCIM. [4] 3.2 OpenID mechanism OpenID shares the authentication session from one web site in essence. The mechanism works as the user A log into to OpenID provider (e.g. after registration, receives the OpenID URL to create session. Now if user A wants to get registered on some other web site (e.g. on the internet which provide support for OpenID then instead of supplying user name and password, user only give its OpenID URL and ( communicate with to check if user A has the authentication session or not). If yes then login and create new session for itself and if not then redirect to
4 3.2.1 YADIS, URL, XRL and OpenID Yadis is a service discovery system, which allows relying parties authenticate the user only by providing the identity URL. It supports services such as Single sign-on across web sites, which is used in the implementation of OpenID A Yadis ID can either be a traditional URL or a newer XRI (Extensible Resource Identifiers) i-name, where the i-name must resolve to a URL. A Yadis ID can either be a URL or XRI i-name, where the iname must resolve to a URL. The Yadis URL either equals to the Yadis ID (if this is a URL) or it can be a resolved URL of the XRI i-name [5]. It is important to understand the need of XRI, beside the well mature URL based technology. Generally there are two important reasons for using XRI. First the domain-name based URL can be expired or changed and the credentials for representing the entity can no more resolvable at the site it belongs. Secondly XRI uses HTTPS as default configuration therefore while using XRI it is not required to further configure the HTTPS protocol for securing the procedures of OpenID [5]. 4. Differences and Similarities Although the concept of federated and user centric identity management have different from each other, in terms of controlling the identities. But they have some similarities and differences from which they can be identified. We would like to compare the two systems because if the implementation approaches are the same than we can identify their relatives advantages and disadvantages. 4.1 Similarities FID and UCIM both allow a user to authenticate with a single identity across different sites, although in UCIM users have full empowerment to choose his/her identity provider. Web-based distributed authentication and authorization services, such as controlled access to protected content resources are supported by both FSSO and UCIM. There are some issues which are related to FID an UCIM i.e. redirection from destination site to service provider and after authentication from the identity provider, redirect back to the destination site. Sessions are maintained on both destination and identity provider, but on every operation the destination site confirmed it from the service provider that the user is logged in or not, and it lead to large traffic between the destination site, browser and service provider [5, 6]. 4.2 Differences Federated Identity management has only one service provider for authentication but in UCIM there can be anonymous and randomized service providers, i.e. the user has full right to choose his/her identity provider. Moreover, FIM have a centralized database for user credentials. UCIM uses a decentralized approach because it uses more than one identity provider. Federated identity allows a user to authenticate at a single site and there is no need to provide additional information to other sites, while at the other hand in UCID, additional information is required on the first logon. By definition Federated identity management involves three main entities, namely user, identity provider (IdP) and service provider. The IdP manages and potentially issues user credentials, and the service providers (also known as relying parties) are entities that provide services to users based on their attributes whereas a user centric IDMS needs to support user control and consider user-centric architectural and usability aspects [1]. 5. Windows CardSpace The recent trends are leading towards the design of a new approach to IDMS where users are allowed to control the authentication process while still retaining the convenient features of federated single sign on, Microsoft provides an IDMS called Windows Cardspace. It is based on a new Microsoft.Net component designed to give users a consistent digitalidentity experience using a specialized user agent. Microsoft addresses the problems of identifying authentic sites to the users with reliability and is also overcoming the problem related to usernames and passwords. Users face many problems in identification on the sites they use. Username/password authentication is common and easier but its security laps are well known. Password reuse, insecure passwords, forgotten passwords, and poor password management practices provides greater opportunities for attackers furthermore password theft attacks enabled by counterfeit web sites and man in the middle attacks, requires a new solution [8,9]. Windows CardSpace can be consider as such a solution. Windows CardSpace is suited to maintain a set of personal digital identifiers and that is performed through "information cards". These cards are much easier to use than the username and passwords, moreover this solution is more secure than passwords. In addition to this, Information cards are managed on client computers by a software component called an identity selector. An identity selector is a user interface (UI) that appears when a user attempts to authenticate to a Web site that requests an information card. Microsoft s CardSpace [8, 9] utilizes client side software to achieve user control and an identity credential is provided by online identity providers selected by a user, therefore in this ways user enjoys both the features of UCIM and FSSO.
5 6. Conclusion The IDMS provides users the ways to manage their identities through their unique attributes and values, there are differences in approaches to IDMSs. An IDMS can be classified as federated, user centric and as a hybrid system. The FSSO provides a way to bring together more than one separately managed identity system, to perform authentication across multiple domains with a single sign-on. In Federated Identity management, one party becomes identity provider and collects all credentials and manages all the information between other parties. A Federated Single Sign-on (FSSO) system is an identity management system (IMS) that allows the use of the same user s Personal Identification Information (PII) across multiple organizations within a federation On the other hand user centric identity management systems consider users perspectives in managing identities in which users are allowed to control authentication process, their privacy preferences, choosing their user names and passwords for accessing different resources and decide which service provider to use. OpenId is the example of such kind of system. The recent trends are leading to words the design of new approach to IDMS where users are allowed to control authentication process while still retaining the convenient features of federated single sign on, Windows CardSpace is the example of such system. References [1] Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross, Dieter Sommer, User centricity: A taxonomy and open issues Source, Volume 15, Issue 5 (October 2007), ACM - DIM 2006, Pages [5] The Identity and Accountability Foundation for Web 2.0, [6] Maler, E.; Reed, D.; The Venn of Identity: Options and Issues in Federated Identity Management, Volume 6, Issue 2, March-April IEEE Pages [7] Jasig Community, date viewed : 27 April 2009 [8] Windows CardSpace, date viewed : 20 April 2009 [9] Bramhall, P. Hansen, M. Rannenberg, K. Roessler, T. Hewlett- Packard Labs., Palo Alto; User-Centric Identity Management: New Trends in Standardization and Regulation, Volume: 5, Issue: 4, IEEE; page(s): [10] IBM - Tivoli Access Manager for Enterprise, www-01.ibm.com/software/tivoli/products/accessmgr-esso/: date viewed : 7 th May 2009 [11] Sun OpenSSO Enterprise, e/index.xml: date viewed : 7 th May 2009 [12] Oracle Enterprise Single Sign-On, o/index.html: date viewed : 7 th May 2009 [2] McKnight, D. and Chervany, N.: The Meanings of Trust. Technical Report MISRC 96-04, Management Information Systems Research Center, University of Minnesota, 96. [3] A User-centric Federated Single Sign-on System Suriadi Suriadi, Ernest Foo, Audun Jøsang : Information Security Institute - Queensland University of Technology, Brisbane, Australia [4] David Recordon VeriSign Inc, Mountain View CA, Drummond Reed Cordance Corporation, Sammamish WA, OpenID 2.0: a platform for usercentric identity management,proceedings of the second ACM workshop on Digital identity management
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK
Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science
An Identity Management Survey. on Cloud Computing
Int. Journal of Computing and Optimization, Vol. 1, 2014, no. 2, 63-71 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijco.2014.458 An Identity Management Survey on Cloud Computing Ardi BENUSI
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Safewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
Negotiating Trust in Identity Metasystem
Negotiating Trust in Identity Metasystem Mehmud Abliz Department of Computer Science University of Pittsburgh Pittsburgh, Pennsylvania 15260 [email protected] Abstract Many federated identity management
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
An Anti-Phishing mechanism for Single Sign-On based on QR-Code
An Anti-Phishing mechanism for Single Sign-On based on QR-Code Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David
Keywords Distributed database system, Database security, Single sign-on, Web Services, Facebook Connect services
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
QR-SSO : Towards a QR-Code based Single Sign-On system
QR-SSO : Towards a QR-Code based Single Sign-On system Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David Argles School
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
OpenID and identity management in consumer services on the Internet
OpenID and identity management in consumer services on the Internet Kari Helenius Helsinki University of Technology [email protected] Abstract With new services emerging on the Internet daily, users need
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Comparing Identity Management Frameworks in a Business Context
Comparing Identity Management Frameworks in a Business Context Jaap-Henk Hoepman, Rieks Joosten, and Johanneke Siljee [email protected], [email protected], [email protected] TNO, the Netherlands
IT Exam Training online / Bootcamp
DumpCollection IT Exam Training online / Bootcamp http://www.dumpcollection.com PDF and Testing Engine, study and practice Exam : 70-534 Title : Architecting Microsoft Azure Solutions Vendor : Microsoft
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other.
w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Installation for VMware Horizon To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO April 19, 2008 Pat Patterson Federation Architect [email protected] blogs.sun.com/superpat Agenda Web Access Management > The Problem > The Solution >
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode Haojiang Gao 1 Beijing Northking Technology Co.,Ltd Zhongguancun Haidian Science Park Postdoctoral
Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)
w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS) To set up ADFS so that your employees can access Egnyte using their ADFS credentials,
Microsoft.NET Passport, a solution of single sign on
Microsoft.NET Passport, a solution of single sign on Zheng Liu Department of Computer Science University of Auckland [email protected] Abstract: As the World Wide Web grows rapidly, accessing web-based
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
Securing WebFOCUS A Primer. Bob Hoffman Information Builders
Securing WebFOCUS A Primer Bob Hoffman Information Builders 1 Agenda Gain an understanding of the WebFOCUS Architecture Where can security be implemented? Review the internal WebFOCUS repository and resource
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
Two SSO Architectures with a Single Set of Credentials
Two SSO Architectures with a Single Set of Credentials Abstract Single sign-on (SSO) is a widely used mechanism that uses a single action of authentication and authority to permit an authorized user to
A User-centric Federated Single Sign-on System
2007 IFIP International Conference on Network and Parallel Computing - Workshops A User-centric Federated Single Sign-on System Suriadi Suriadi, Ernest Foo, Audun Jøsang Information Security Institute
Identity Federation Broker for Service Cloud
2010 International Conference on Sciences Identity Federation Broker for Cloud He Yuan Huang 1, Bin Wang 1, Xiao Xi Liu 1, Jing Min Xu 1 1 IBM Research China {huanghey, wangbcrl, liuxx, xujingm}@cn.ibm.com
Trend of Federated Identity Management for Web Services
30 Trend of Federated Identity Management for Web Services Chulung Kim, Sangyong Han Abstract While Web service providers offer different approaches to implementing security, users of Web services demand
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
Cloud Computing. Chapter 5 Identity as a Service (IDaaS)
Cloud Computing Chapter 5 Identity as a Service (IDaaS) Learning Objectives Describe challenges related to ID management. Describe and discuss single sign-on (SSO) capabilities. List the advantages of
The Role of Federation in Identity Management
The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected]
Single Sign-On for the Internet: A Security Story Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected] BlackHat USA, Las Vegas 2007 Introduction With the explosion of Web 2.0 technology,
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth
Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth Marcos A. P. Leandro, Tiago J. Nascimento, Daniel R. dos Santos, Carla M. Westphall, Carlos B. Westphall
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
Single Sign-on. Overview. Using SSO with the Cisco WebEx and Cisco WebEx Meeting. Overview, page 1
Overview, page 1 Using SSO with the Cisco WebEx and Cisco WebEx Meeting Applications, page 1 Requirements, page 2 Configuration of in Cisco WebEx Messenger Administration Tool, page 3 Sample Installation
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS 1,2 XIANG LIYUN, 1 FANG ZHIYI, 1 SUN HONGYU 1 College of Computer Science and Technology, Jilin University, Changchun, China 2 Department of Computer
Copyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Enterprise Knowledge Platform
Enterprise Knowledge Platform Single Sign-On Integration with Windows Document Information Document ID: EN136 Document title: EKP Single Sign-On Integration with Windows Version: 1.3 Document date: 19
Pierce County IT Department GIS Division Xuejin Ruan Dan King
Pierce County IT Department GIS Division Xuejin Ruan Dan King Web Application Work Flow Main Topics Authentication Authorization Session Management * Concurrent Session Management * Session Timeout Single
OpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
2 Authentication and identity management services in multi-platform cloud infrastructure
Abstract The security provision within multi-platform cloud computing environment is still considered not to be properly solved due to different problems with technical and humanbased origin. ICT users
Operating Level Agreement for NYU Login Service
Operating Level Agreement for NYU Login Service This Operating Level Agreement (OLA) documents the agreement regarding support of Single Sign-On (SSO) services for a Partner Service, which has been integrated
etoken Single Sign-On 3.0
etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Persona-aware Identity Management (PIdM): Towards a framework for managing persona identity
Persona-aware Identity Management (PIdM): Towards a framework for managing persona identity Sejin (Eva) Choi Supervised by Professor Clark Thomborson A dissertation for the partial fulfilment of Bachelor
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Identity Management in Telcos. Jörg Heuer, Deutsche Telekom AG, Laboratories. Munich, April 2008
Identity Management in Telcos Jörg Heuer, Deutsche Telekom AG, Laboratories. Munich, April 2008 1 Agenda. Introduction User-centric Identity and Telcos Comprehensive Identity Models IDM Reference Architecture
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006
Siebel CRM On Demand Single Sign-On An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On Introduction... 3 Single Sign-On with Siebel CRM On Demand... 4 Customer Requirements... 4 SSO
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
