Using Kerberos for Web Authentication. Wesley Craig University of Michigan
|
|
|
- Imogene Walsh
- 10 years ago
- Views:
Transcription
1 Using Kerberos for Web Authentication Wesley Craig University of Michigan
2 Outline Basic Auth WebSSO SASL & HTTP Kerberos & TLS SPNEGO PKI, PKI, PKI For each technology, a brief over view, drawbacks, and benefits. All informed by our work for University of Michigan on CoSign.
3 Proxy Authentication Web Kerberized Service Browser Three sorts of proxy: web server enforces authz; web server uses, e.g. SASL, to authn as itself authz as user, application enforces authz; web server authn as user for applications that don t support split authn/z, e.g., AFS.
4 Basic Auth Defined in RFC 2617 Most browsers & web servers implement it
5 mod_auth_kerb Basic Web Browser KDC Browser:GET : 401 WWW-Authenticate: Basic realm="some text" Browser GET Authorization: Basic base64(user:password)
6 mod_auth_kerb Basic Web Browser KDC Browser:GET : 401 WWW-Authenticate: Basic realm="some text" Browser GET Authorization: Basic base64(user:password)
7 Basic Auth Risks User gives password to every web server Breaks single sign-on Trains users to freely give their password Is the server secure? Every web server needs SSL (or not) Every web server needs a keytab (or not) Should I be sending my password to this server? Has this server been compromised?
8 Basic Auth Benefits Widely supported & well understood Works with WebDAV
9 WebSSO Typically Form & Cookie Typically only single sign-on for web services Examples: CoSign, WebAuth, CAS, etc. Typically, because WebSSO s can also leverage true SSO
10 CoSign Design Compartmentalized Security Kerberos V Proxy Kerberos Tickets High Availability Global Logout
11 CoSign Extensions Centralized Guest Accounts Proxy CoSign Cookies Re-Authentication Multi-Factor Apache Authentication Modules X.509
12 CoSign Web Browser KDC CoSign
13 CoSign Web Browser KDC CoSign
14 CoSign Web Browser KDC CoSign
15 CoSign Web Browser KDC CoSign
16 CoSign Risks Requires cookies, which can be stolen May use passwords, which can be stolen
17 CoSign Benefits Broad browser support Can leverage: Basic Auth, SPNEGO, Shib, PKI, other WebSSOs, etc. Simple for users to understand Simple for CoSign-protected services
18 Kerberos over HTTP Kerberos over TLS (aka SSL) RFC 2712 lynx, curl, stunnel SASL over HTTP draft-nystrom-http-sasl-12.txt (expired) No support for graphical browsers.
19 SPNEGO Defined in RFC 4178 Simple and Protected Generic Security Service Application Program Interface Negotiation Mechanism HTTP Negotiate: draft-brezak-spnego-http-05.txt HTTP Negotiate: draft-jaganathan-kerberos-http-01.txt (expired in January)
20 mod_auth_kerb SPNEGO Web Browser KDC
21 mod_auth_kerb SPNEGO Web Browser KDC
22 SPNEGO Risks Limited browser support and/or complex configuration Web server support Kerberos client support Browsers don t necessarily behave as expected or in a friendly way. Some don t support delegation. Supporting Kerberos might mean supporting AD on some platforms.
23 SPNEGO Benefits True SSO Delegation works for tiered/proxied services Active community
24 SSL Client Authentication Distribute X.509 client certificates to users What about Kerberos?
25 PKI - client certificates Web Browser KDC KCT Web server sends transcript of SSL handshake to credential translator and gets back kerberos credentials.
26 PKI - client certificates Web Browser KDC KCT Web server sends transcript of SSL handshake to credential translator and gets back kerberos credentials.
27 PKI - pkinit & SPNEGO Web Browser KDC
28 PKI - pkinit & SPNEGO Web Browser KDC
29 PKI - junk certificates Web Browser KDC KCT KCA
30 PKI - junk certificates Web Browser KDC KCT KCA
31 PKI - junk certificates Web Browser KDC KCT KCA
32 PKI - junk certificates Web Browser KDC KCT KCA
33 SSL Client Authentication Risks Need either PKI or client software Hard for users to understand Certificates can be stolen More complex solutions inherit all the problems of their underlying components Not widely adopted
34 SSL Client Authentication Benefits True SSO PKI is useful outside of browsers PKI is useful beyond authentication
35 University of Michigan Deploy Multi-Factor AuthN in CoSign Deploy Client Certificates in CoSign Deploy SPNEGO in CoSign Deploy WebDAV with Basic Auth
36 Q & A [email protected] [email protected]
Kerberos and Single Sign On with HTTP
Kerberos and Single Sign On with HTTP Joe Orton Senior Software Engineer, Red Hat Overview Introduction The Problem Current Solutions Future Solutions Conclusion Introduction WebDAV: common complaint of
Kerberos and Single Sign-On with HTTP
Kerberos and Single Sign-On with HTTP Joe Orton Red Hat Introduction The Problem Current Solutions Future Solutions Conclusion Overview Introduction WebDAV: common complaint of poor support for authentication
NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman
NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman The Slow Convergence of PKI and Kerberos At Connectathon 1995 Dan Nessett of Sun Microsystems was quoted saying Kerberos will
External Identity and Authentication Providers For Apache HTTP Server
External Identity and Authentication Providers For Apache HTTP Server Jan Pazdziora Principal Software Engineer Identity Management Engineering, Red Hat 17 th November 2014 Basic Authentication The only
Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization
Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization Michael Heldebrant Solutions Architect, Red Hat Outline Authentication overview Basic LDAP
IceWarp Server - SSO (Single Sign-On)
IceWarp Server - SSO (Single Sign-On) Probably the most difficult task for me is to explain the new SSO feature of IceWarp Server. The reason for this is that I have only little knowledge about it and
External and Federated Identities on the Web
External and Federated Identities on the Web Jan Pazdziora Sr. Principal Software Engineer Identity Management Special Projects, Red Hat 1 st October 2015 Scope and problem statement Applications get deployed
Enabling Applications to Use Your Identity Management System
Enabling Applications to Use Your Identity Management System Or Why Mark began losing his hair at age 23 Mark Earnes# The Pennsylvania State University Where We Are Coming From Authentication: Kerberos
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
Globus Toolkit: Authentication and Credential Translation
Globus Toolkit: Authentication and Credential Translation JET Workshop, April 14, 2004 Frank Siebenlist [email protected] http://www.globus.org/ Copyright (c) 2002 University of Chicago and The University
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
Architecture of Enterprise Applications III Single Sign-On
Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]
Single sign-on enabled OpenCms
Single sign-on enabled OpenCms Architecture for Single sign-on implementation into OpenCms Pavel Slavíček, [email protected] Brno, The Czech Republic, 2. 5. 2008 Content Single sign-on introduction
Using Kerberos tickets for true Single Sign On
Using Kerberos tickets for true Single Sign On Table of Contents Introduction This document details the reasoning for, configuration of and experiences from the initial setup of Kerberos tickets for SSO
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
SAP Business Objects Security
SAP Business Objects Security Pal Alagarsamy President Business Intelligence Practice GloWiz Inc 1 GloWiz Inc GloWiz is an IT Staffing and Consulting company since 2005 We focus on Business Intelligence,
CAC AND KERBEROS FROM VISION TO REALITY
CAC AND KERBEROS FROM VISION TO REALITY Mil OSS Conference 2011 Dmitri Pal Sr. Engineering Manager Red Hat Inc. Aug 31, 2011 Outline Setting up context... Card authentication now Open issues Pieces of
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Security Provider Integration Kerberos Authentication
Security Provider Integration Kerberos Authentication 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Setting Up Cosign Clients
Setting Up Cosign Clients March 4, 2003 This presentation was originally given at an Academic Computing Support Forum (ACSF) meeting at the University of Michigan. Agenda Cosign overview Configuring cosign
Identity Management: The authentic & authoritative guide for the modern enterprise
Identity Management: The authentic & authoritative guide for the modern enterprise Ellen Newlands, Product Manager Dmitri Pal, Director, Engineering 06-26-15 Goals of the Presentation Introduce Identity
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected]
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected] Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
Kerberos SSO on Netscaler 10.1 120.13 through Kerberos Constrained Delegation Or Impersonation
Kerberos SSO on Netscaler 10.1 120.13 through Kerberos Constrained Delegation Or Impersonation Table of Contents 1. Introduction... 3 1.1 Audience... 36 1.2 Introduction... 36 2. Goal... 5 3. Application
Connecting Web and Kerberos Single Sign On
Connecting Web and Kerberos Single Sign On Rok Papež ARNES [email protected] Terena networking conference Malaga, Spain, 10.6.2009 Kerberos Authentication protocol (No) authorization Single Sign On
Using the MyProxy Online Credential Repository
Using the MyProxy Online Credential Repository Jim Basney National Center for Supercomputing Applications University of Illinois [email protected] What is MyProxy? Independent Globus Toolkit add-on
GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days
GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
Integrating Kerberos into Apache Hadoop
Integrating Kerberos into Apache Hadoop Kerberos Conference 2010 Owen O Malley [email protected] Yahoo s Hadoop Team Who am I An architect working on Hadoop full time Mainly focused on MapReduce Tech-lead
Step- by- Step guide to Configure Single sign- on for HTTP requests using SPNEGO web authentication
Step- by- Step guide to Configure Single sign- on for HTTP requests using SPNEGO web authentication Summary STEP- BY- STEP GUIDE TO CONFIGURE SINGLE SIGN- ON FOR HTTP REQUESTS USING SPNEGO WEB AUTHENTICATION
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
GL550 - Enterprise Linux Security Administration
GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such
Open-source Single Sign-On with CAS (Central Authentication Service)
Open-source Single Sign-On with CAS (Central Authentication Service) Pascal Aubry, Vincent Mathieu & Julien Marchal Copyright 2004 ESUP-Portail consortium Open-source Single Sign-On with CAS Single Sign-On
SSO Methods Supported by Winshuttle Applications
Winshuttle and SSO SSO Methods Supported by Winshuttle Applications Single Sign-On (SSO) delivers business value by enabling safe, secure access to resources and exchange of information at all levels of
Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU
Middleware integration in the Sympa mailing list software Olivier Salaün - CRU 1. Sympa, its middleware connectors 2. Sympa web authentication 3. CAS authentication 4. Shibboleth authentication 5. Sympa
Single Sign-On: Reviewing the Field
Outline Michael Grundmann Erhard Pointl Johannes Kepler University Linz January 16, 2009 Outline 1 Why Single Sign-On? 2 3 Criteria Categorization 4 Overview shibboleth 5 Outline Why Single Sign-On? Why
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION COURSE DESCRIPTION: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at the University of Pennsylvania
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at the University of Pennsylvania Shumon Huque & Deke Kassabian University of Pennsylvania Internet2 Fall Member Meeting September
Vintela Single Sign-on for Java from Quest Software. Deployment Guide WebSphere Edition 3.2
Vintela Single Sign-on for Java from Quest Software Deployment Guide WebSphere Edition 3.2 Vintela Single Sign-on for Java(c) 2006 Quest Software, Inc. All rights reserved. No part of this work may be
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
Single Sign-On Using SPNEGO
Single Sign-On Using SPNEGO Introduction As of Percussion CM Server version 7.0.2, build 201106R01, patch level RX-17069, Windows Single Sign-On (SSO) using SPNEGO is now supported. Through the SSO feature,
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Single Sign-On for Kerberized Linux and UNIX Applications
Likewise Enterprise Single Sign-On for Kerberized Linux and UNIX Applications AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise facilitates the
A method to Implement the Kerberos User. Authentication and the secured Internet Service
A method to Implement the Kerberos User Authentication and the secured Internet Service Pak Song-Ho, Pak Myong-Suk,Jang Chung-Hyok Kim Il Sung University, Pyongyang, DPR of Korea Abstract This paper proposes
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
Microsoft Windows Server 2012 R2 Remote Desktop Services - How to Set Up (Mostly) Seamless Logon for RDP Connections
Microsoft Windows Server 2012 R2 Remote Desktop Services - How to Set Up (Mostly) Seamless Logon for RDP Connections KRISTIN L. GRIFFIN MVP, REMOTE DESKTOP SERVICES Tech Editor: Toby Phipps MVP, Remote
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Two SSO Architectures with a Single Set of Credentials
Two SSO Architectures with a Single Set of Credentials Abstract Single sign-on (SSO) is a widely used mechanism that uses a single action of authentication and authority to permit an authorized user to
From centralized to single sign on
The LemonLDAP::NG project Abstract LemonLDAP::NG is a modular WebSSO (Web Single Sign On) software based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the
BlueCoat s Guide to Authentication V1.0
BlueCoat s Guide to Authentication V1.0 Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service names are
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet
Single Sign On In A CORBA-Based
Single Sign On In A CORBA-Based Based Distributed System Igor Balabine IONA Security Architect Outline A standards-based framework approach to the Enterprise application security Security framework example:
Integrating WebPCM Applications into Single Sign On (SSO) Tom Schaefer Better Software Solutions, Inc. UN 4023 V
Integrating WebPCM Applications into Single Sign On (SSO) Tom Schaefer Better Software Solutions, Inc. UN 4023 V Agenda What is SSO? How does it work? Tools for SSO on ClearPath Integrating Active Directory
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Ensure that your environment meets the requirements. Provision the OpenAM server in Active Directory, then generate keytab files.
This chapter provides information about the feature which allows end users to log into a Windows client machine on a Windows domain, then use certain Cisco Unified Communications Manager applications without
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
Guide to SASL, GSSAPI & Kerberos v.6.0
SYMLABS VIRTUAL DIRECTORY SERVER Guide to SASL, GSSAPI & Kerberos v.6.0 Copyright 2011 www.symlabs.com Chapter 1 Introduction Symlabs has added support for the GSSAPI 1 authentication mechanism, which
TIBCO ActiveMatrix BPM Single Sign-On
Software Release 3.1 November 2014 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
FreeIPA - Open Source Identity Management in Linux
FreeIPA - Open Source Identity Management in Linux Martin Košek Supervisor, Software Engineering, Red Hat ORS 2013, Karviná 1 Identity Management What is identity management? Identity
How to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
Configuring Integrated Windows Authentication for JBoss with SAS 9.3 Web Applications
Configuring Integrated Windows Authentication for JBoss with SAS 9.3 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide
Protecting Juniper SA using Certificate-Based Authentication Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS 1,2 XIANG LIYUN, 1 FANG ZHIYI, 1 SUN HONGYU 1 College of Computer Science and Technology, Jilin University, Changchun, China 2 Department of Computer
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Unleash the Power of Single Sign-On with Microsoft and SAP
Collaboration Technology Support Center Microsoft Collaboration Brief September 2007 Unleash the Power of Single Sign-On with Microsoft and SAP White Paper Authors Tilo Boettcher, Microsoft Corp ([email protected])
UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON. Chad Watson Sr. Business Intelligence Developer
UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON Chad Watson Sr. Business Intelligence Developer UPGRADING TO XI 3.1 SP6 What Business Objects Administrators should consider before installing a Service Pack.
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications
Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
Single Sign-On for the UQ Web
Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user
Security solutions Executive brief. Understand the varieties and business value of single sign-on.
Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies
Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications
Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
VMware Zimbra Security. Protecting Your VMware Zimbra Email and Collaboration Environment
Protecting Your VMware Zimbra Email and Collaboration Environment Technical WHITE PAPER Table of Contents VMware Zimbra Approach to Security... 3 Open-Source Commitment.... 3 Flexible, Object-Based Design....
Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract
Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite Abstract This white paper outlines the deployment and configuration of a Single Sign-On solution for EMC Documentum
ENABLING SINGLE SIGN-ON: SPNEGO AND KERBEROS Technical Bulletin For Use with DSView 3 Management Software
ENABLING SINGLE SIGN-ON: SPNEGO AND KERBEROS Technical Bulletin For Use with DSView 3 Management Software Avocent, the Avocent logo, The Power of Being There and DSView are registered trademarks of Avocent
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
Single Sign On. Configuration Checklist for Single Sign On CHAPTER
CHAPTER 39 The single sign on feature allows end users to log into a Windows client machine on a Windows domain, then use certain Cisco Unified Communications Manager applications without signing on again.
