WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES
|
|
|
- Mitchell O’Connor’
- 10 years ago
- Views:
Transcription
1 WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES
2 Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access via a Common Access Card (CAC). It is the standard identification for Active-Duty Military Personnel, Selected Reserve, United States Department of Defense (DoD) civilian employees, and eligible contractor personnel. It is also the principal card used to enable physical access to buildings and controlled spaces, and it provides access to defense computer networks and systems CAC cards are utilized for strong authentication and to permit access into applications including those outside of the enterprise network to guarantee security. This paper will discuss the needs of CAC card users, including utilization of the CAC credential for application authentication; access into network, and effective Single Sign On. Then, the solution provided by SecureAuth IdP will be examined. Not only will the unique, useful, and efficient functions of the IdP be illustrated; the ways in which those functions are most effective and suitable for CAC organizations will be made clear. Table of Contents Introduction: What is a CAC Card? 3 The Needs of CAC Card Holders..3 The SecureAuth IdP Solution..4 Versatile Authentication System 5 VAS for External Devices 6 Access to ALL Applications with CAC Validation 7 Security Token Service (STS..7 Single Sign On Portal to Web and SaaS Applications 8 Identity Access Management..9 Conclusion 10 WHITEPAPER 2
3 Introduction: What is a CAC Card? Common Access Cards (CAC) are United States Department of Defense (DoD) smart cards issued to those in Active Duty, The Reserve, The National Guard, and to Eligible Contractor Personnel. They provide identification information of the holder as well as permit physical access into buildings and controlled spaces, and virtual access into DoD computer networks and systems. A CAC card contains a photograph of the holder, his/her federal identifier, affiliation, service or agency, pay grade, rank, blood type, date of birth, DoD identification number, and the DoD benefits number. Also, embedded within the card are: Integrated Circuit Chip (ICC) of 32k, 64k, or 128k of data PDF417 Barcode MAG Stripe Code 39 Barcode These cards are built to the Homeland Security Presidential Directive 12 (HSPD-12) standards, which qualify the identifications used to gain access to secure facilities where there is potential for terrorist attacks. CAC cards have been issued to over 18 million people, so it makes sense to utilize this item that is undoubtedly secure and always onhand to enable complete access online. The Needs of CAC Card Holders Users are in need of a secure solution that protects enterprise data, is easily deployable, and improves user experience. With their CAC cards, they are looking to achieve uncompromised protection without duplicating or altering their existing infrastructure and: Strong, multi-factor authentication Access into all applications network, web, and cloud Single Sign On (SSO) to and between all applications SaaS applications and resources create a far more efficient workflow and experience for the enterprise. Despite there being heightened security risks, conducting business outside of the network is not only more convenient, it is also necessary. Most web and network resources do NOT accept CAC credentials without modification, including Google, due to the very nature of physical-to-cloud authentication. WHITEPAPER 3
4 This leaves government entities with a real dilemma. How do they meet the government imposed Cloud First initiative to move applications to the cloud but still comply to the HSPD-12 (CAC) mandate? The SecureAuth IdP Solution SecureAuth IdP is a cost-efficient, single secure solution that provides versatile authentication, and identity assertion for web and SaaS applications that can be integrated into the pre-existing government infrastructure. Furthermore, SecureAuth IdP can accept identities and authenticate them with CAC cards. With SecureAuth IdP, users can be accurately authenticated, appropriately granted access, and properly directed through web, network, and SaaS applications by simply swiping their CAC card. WHITEPAPER 4
5 Versatile Authentication System SecureAuth IdP provides a Versatile Authentication System (VAS) that not only authenticates users but also gives enterprises flexible and unlimited configuration options. Multi-factor authentication takes something that the user has and something that the user knows to validate their identities for a period of time. Administrators can decide to configure authentication duration for 1 session, 1 day, 30 days, 90 days, etc. For these federal employees that fall under HSPD-12, they have CAC cards and PINs, and they know usernames and passwords. SecureAuth IdP offers a variety of options from which to choose authentication methods. Along with CAC cards, validation can be achieved through: SMS OTP Telephony OTP OTP Static PIN KBA/KBQ Yubikey (USB) X.509 Native X.509 Java NFC Prox Card Mobile OATH Token (TOTP) Browser OATH Token (TOTP) Windows Desktop OATH Token (TOTP) Third-Party OATH token (TOTP) PUSH Notification Help Desk Social IDs (Google, Facebook, Twitter, Linked) Federated IDs (SAML, WS-Fed, OpenId) Device Fingerprinting Password Cardholders can use their CAC cards that are always with them to confirm their identities alongside their enterprise credentials (username and password) through SecureAuth IdP. This eliminates the need for users to memorize several passwords, and instead secures everything with a single set of credentials. WHITEPAPER 5
6 VAS for External Devices With SecureAuth IdP, mobile users can also achieve fully secured access into enterprise data. The devices may vary depending on what they allow, but users CAC cards can permit entrance from anywhere. Users with CAC cards can also utilize the convenient and secure mobile abilities if their devices support the cards. Certain laptops or smartphones will appropriately read CAC cards and users can accomplish 2-Factor Authentication (2FA) with them via SecureAuth IdP for Mobile. The federal agencies have issued these users CAC readers for their HSPD-12 credentials. This function grants CAC card users access into their company on virtually any device with the same powerful protection that SecureAuth IdP provides for internal users. WHITEPAPER 6
7 Access to all Applications with CAC Validation Strong authentication with CAC cards meets the government mandates on user authentication, but the ability to achieve access into applications, especially SaaS apps, is still needed. Though other systems may not accept CAC cards as permits into applications, SecureAuth IdP does. Users can authenticate their CAC credentials via SecureAuth and then obtain access to the web, network, and SaaS applications. Among the many features on a CAC card is an X.509 v3 certificate. SecureAuth can pull the identity of the user from the CAC certificate and accept it into the IdP. SecureAuth is flexible and can then translate the identity into the context and format that the relying party application can accept. It does not make a difference how the applications are configured or where they are located (in the network or the cloud) because SecureAuth IdP can transpose the ID so that it is accepted by all programs without requiring additional coding from the enterprise. The SecureAuth solution for CAC card holders follows the guidelines of the Federal Cloud Computing Strategy as well as an Executive Strategy to protect confidential data while decreasing IT costs and expenditures. With the all-in-one system, everything remains secure and easily accessible, which significantly decreases the amount of IT help desk calls. Security Token Service (STS) Built into SecureAuth IdP is a Security Token Service (STS) that translates the format of the user s identity. The solution was designed to accept any ID and to translate those IDs into acceptable ones quickly and without hassle. This occurs with the integrated STS built-into SecureAuth IdP. When users insert their CAC cards and log in with their company credentials, their identity is transferred to SecureAuth IdP for authentication and consumption. Within the IdP, the ID is manipulated and formatted for acceptance by the relying applications. SecureAuth supports many application protocols, so as long as the desired program is upheld by one of them, the user s ID can be aptly shaped for admittance. Though the user is transferred to the application in a SAML or similar format, SecureAuth solely does the authentication before entrance even occurs. The IdP s extraction of the necessary information from the CAC card certificate and the enterprise directory performs WHITEPAPER 7
8 the authentication. SecureAuth IdP does not store any of this information; it simply retains the approved ID, which can then be altered accordingly by the STS. Enterprises receive these functions out of the box as they are all built into SecureAuth IdP, so there is no additional coding required. Single Sign On Portal to Web and SaaS Applications The STS enables Single Sign On (SSO) to any and all applications. SSO secures data and relieves the user of complicated and tedious procedures like signing into each application individually or having to memorize numerous, unique passwords. Through the utilization of the CAC card, users can navigate to and between all SaaS and network applications after their initial sign-on. SecureAuth IdP creates a portal for SaaS and web applications that comes prepackaged in the system. In this one location, all admission is negotiated. It is a secure point of access to applications for all users who can only reach it after authentication. The STS continues to consume the user s identity and translates it appropriately to assert it to specific applications through the Portal. This way, it does not matter what type of identity the application accepts because the IdP will relay it correctly and safely. How it works: Users open an application and supply their CAC cards for authentication into the company directory through SecureAuth IdP. The IdP approves the identity after receiving necessary credentials and the second factor information, and holds that ID for the duration of their session. The STS in SecureAuth IdP converts the ID into acceptable SAML or other federated artifacts. The application into which the user originally attempted to enter is then available for the recoded ID. From there, the user can navigate throughout any applications without login prompts. This all ensues within the IdP where the STS continually transforms the user s identity into app-suitable IDs. All post-authentication events occur securely and effectively without requiring any work, and are 100% configurable in the administration console. WHITEPAPER 8
9 Identity Access Management SecureAuth IdP offers many great functions for government enterprises looking to protect their data but one of the best is its flexible, configurable, and integrated Identity Access Management (IAM) tools. Admins are in full control of managing the permissions of users, groups, devices, and applications. SecureAuth provides to companies the necessary tools to become their own Identity Provider while it simply enforces their policies. In a completely browser-based GUI admin console, all actions can be logged and audited, and each preference can be set through drop-downs and single clicks. All options are available for immediate deployment and require zero coding. Admins are able to adjust settings for individual users by utilizing the same directories that they already have in place. Allocations and restrictions can be applied so that users can access only the applications and information pertinent to their roles. Companies can also quickly and effectively remove the user profiles that are no longer connected to the organization to ensure a complete denial of future admission. Applications can be modified for both 2FA and SSO. Admins can specify that 2FA is required for the initial program and full SSO will allow users into all additional applications; or they can choose to require 2FA for all applications and deny SSO completely. The options are truly limitless. SecureAuth IdP can also enforce 3-Factor Authentication (3FA) if needed. This can be ordered for all users and all programs, or only for individual profiles and specific applications. For user profiles and applications, 1-Touch Revocation is available as well. Admins can swiftly and easily remove permissions for access and/or SSO from their console. WHITEPAPER 9
10 User Self-Management is another useful tool that comes with SecureAuth IdP. This enables the users themselves to take some control of their profiles. Users are able to reset their own passwords and revoke their own or their device s access without any assistance from the IT help desk. All configurations can be made easily and quickly without any coding, third party tools, or expensive overhead costs. SecureAuth IdP makes the lives of all users easier and the profits of companies higher. Conclusion A CAC credential is a necessary accessory for federal employees and associates. It encompasses high confidence and is an item that holders always possess. It only makes sense to apply this level of trust to all resources. SecureAuth provides that option with the IdP solution that accepts CAC cards for strong authentication and SSO capabilities into all network, web, and SaaS applications. SecureAuth IdP was built to be flexible and accommodating. It accepts the CAC identification credentials and can then translate it into a format that is accepted by millions of applications, all while confidently securing data. WHITEPAPER 10
11 The IdP and all of its functions come prepackaged together in a single solution that does not require hardware, installations, or coding; and it integrates seamlessly into your existing infrastructure. With SecureAuth IdP, users only require one set of credentials and one second factor item to gain access into all facets of the enterprise. CAC cardholders already meet these criteria in an undoubtedly safe form. SecureAuth IdP conducts the difficult task of translating the identity that has been provisioned to the CAC credential and extends this identity to other IT resources, namely web, network, and cloud applications. SecureAuth executes this through an extensive library of data manipulation routines and application SSO mechanisms. All of these facilities are made easy for the government admin via an intuitive GUI interface. SecureAuth IdP enables government enterprises to provide secure HSPD-12 mandated access to web, network, and SaaS resources in a single solution package. WHITEPAPER 11
12 8965 Research Drive, Irvine, CA p: f: secureauth.com
SECUREAUTH IDP AND OFFICE 365
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
WHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION
WHITEPAPER SECUREAUTH IDP DEVICE FINGERPRINTING LOW-FRICTION, BYOD AUTHENTICATION Executive Overview The explosion of devices laptops, desktops and now the plethora of mobile devices has left enterprises
Secure Access Control for Mobile, Cloud, and Web Apps
Secure Access Control for Mobile, Cloud, and Web Apps SecureAuth IdP is a revolutionary platform that provides flexible and secure access control through strong authentication, single sign-on, and user
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
The Cloud, Mobile and BYOD Security Opportunity with SurePassID
The Cloud, Mobile and BYOD Security Opportunity with SurePassID Presentation for MSPs and MSSPs January 2014 SurePassID At A Glance Founded 2009 Headquartered in Orlando, FL 6 sales offices in North America,
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT Executive Overview SAML (Security Assertion Markup Language) is a standard that facilitates the exchange of security information. Developed by
EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report
KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Identity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition
The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition Find out what organizations need to know to compare two-factor vendors and check
White Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Safewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
HOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com
MOBILITY Transforming the mobile device from a security liability into a business asset. pingidentity.com Table of Contents Introduction 3 Three Technologies That Securely Unleash Mobile and BYOD 4 Three
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach Multi-factor Authentication Layer v.3.2-003 PortalGuard dba PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail:
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
NetIQ Advanced Authentication Framework
NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Securing WebFOCUS A Primer. Bob Hoffman Information Builders
Securing WebFOCUS A Primer Bob Hoffman Information Builders 1 Agenda Gain an understanding of the WebFOCUS Architecture Where can security be implemented? Review the internal WebFOCUS repository and resource
AVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment
WHITEPAPER How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment www.onelogin.com 150 Spear Street, Suite 1400, San Francisco, CA 94105 855.426.7272 EXECUTIVE SUMMARY
Connected Data. Connected Data requirements for SSO
Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
Cloud Authentication. Getting Started Guide. Version 2.1.0.06
Cloud Authentication Getting Started Guide Version 2.1.0.06 ii Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
How to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
User Identity and Authentication
User Identity and Authentication WordPress, 2FA, and Single Sign-On Isaac Potoczny-Jones [email protected] http://tozny.com About the Speaker Galois, Inc. - @galoisinc. Research & Development for computer
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
HOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
Using YSU Password Self-Service
Using YSU Password Self-Service Using YSU Password Self-Service Password Self-Service Web Interface Required Items: YSU (MyYSU) Directory account, Web browser This guide will assist you with using the
Two Factor Authentication and PKI Token (for Windows)
Two Factor Authentication and PKI Token (for Windows) What s happening? Dow Jones is implementing two factor authentication to increase security and provide ease of use to end users. What is Two Factor
SAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
Multi-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics
Identity, Privacy, and Data Protection in the Cloud XACML David Brossard Product Manager, Axiomatics 1 What you will learn The issue with authorization in the cloud Quick background on XACML 3 strategies
SP-initiated SSO for Smartsheet is automatically enabled when the SAML feature is activated.
Chapter 87 Configuring Smartsheet The following is an overview of the steps required to configure the Smartsheet Web application for single sign-on (SSO) via SAML. Smartsheet offers both IdP-initiated
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
Identity as a Service Powered by NetIQ IdentityAccess Service Configuration and Administration Guide
Identity as a Service Powered by NetIQ IdentityAccess Service Configuration and Administration Guide December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers,
Cisco Software-as-a-Service (SaaS) Access Control
Cisco Software-as-a-Service (SaaS) Access Control Overview The benefits of using Software-as-a-Service (SaaS) solutions - software solutions delivered via the cloud-computing model - are clear for many
The Password Problem Will Only Get Worse
The Password Problem Will Only Get Worse New technology for proving who we are Isaac Potoczny-Jones Galois & SEQRD [email protected] @SyntaxPolice Goals & Talk outline Update the group on authentication
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
Single Sign On for ShareFile with NetScaler. Deployment Guide
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
Proposal Document TitleDocument Version 1.0 TitleDocument
G-Cloud - Strong Authentication Service - Service Definition Proposal Document Author TitleDocument Version 1.0 TitleDocument Document publication date - 02/12/2014 Title Document Classification - Public
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Single Sign-on Frequently Asked Questions
Single Sign-on Frequently Asked Questions Q1. What is Single Sign-on? Q2. How does SSO work? Q3. How do I access the SSO portal? Q4. Where can I find help on how to use the SSO portal? Q5. How do I reset
YubiKey Authentication Module Design Guideline
YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
