Proxied Authentication in SSO Setups with Common OSS. Open Identity Summit 2015 Prof. Dr. René Peinl Berlin,
|
|
|
- Philip Chandler
- 10 years ago
- Views:
Transcription
1 Proxied Authentication in SSO Setups with Common OSS Open Identity Summit 2015 Prof. Dr. René Peinl Berlin,
2 Agenda 1 Use case / context 2 Challenge and ideal solution 3 Analysis of established SSO protocols 4 Analysis of use cases and involved systems 5 Conclusion and outlook 2
3 Project: Social Collaboration Hub (SCHub) Goal: Establishing an integrated infrastructure for effective support of team collaboration, esp. for knowledge intensive tasks and regionally distributed employees direct support for knowledge and business processes From a user s perspective, a unified intranet with continuous support for working tasks without breaches in the workflow should arise. Solution: Integration of Open Source Software from the areas portal, document management (DMS), groupware and business process management (BPM) 10/ /2016
4 SCHub system architecture nginx End-user Applications Liferay Nuxeo OX App Suite Middleware / Supporting Services Camunda BPM ElasticSearch Shindig CAS Backend Dovecot Postfix MySQL Galera / XtraDB Cluster CEPH neo4j Open LDAP Infrastructure Docker OpenStack + KVM Mesos + Marathon Univention Corporate Server
5 SCHub communication flows Connections to/from CAS and LDAP ommitted for clarity 5
6 Challenge Securely authenticate from one server system to communicate with another server system in the name of the user logged on to the first system Use cases 1. Access to the ECMS Nuxeo via CMIS * from Liferay and OX 2. Triggering workflows in Camunda from Liferay, Nuxeo and OX 3. Storing activities in Shindig from Liferay, Nuxeo, OX and Camunda 4. Accessing s in Dovecot via IMAP ** from OX * Content Management Interoperability Services ** Internet Mail Access Protocol 6
7 Terms No common terminology to describe the challenge double hop issue (Microsoft) Not widely accepted term delegated authentication (SAML) Also used for delegating authentication to an external system Impersonation Server 1 impersonates the user, but mainly used to describe attacks proxy authentication HTTP proxy that authenticates, vs app that does API calls => proxied authentication in order to avoid wrong associations 7
8 Ideal solution 8
9 SSO protocols OAuth 2.0 Authorization code grant flow seems well suited for the scenario Existing implementations assume authorization server (SSO system) and resource server (server system 2) are identical Supplement on bearer token usage mentions our scenario Problem really solved in successor OpenID connect SAML 2.0 Delegated SAML authentication [1] is describing the scenario Technologies used are specified in addendum to SAML 2.0 spec. Not fully supported by CAS 4.1, new in Nuxeo 7.4, established in Liferay, but delegated authentication still questionable 9
10 SSO protocols Kerberos Not tailored for the Web-based world but still suitable Supports the scenario with ticket granting tickets Two open source Kerberos v5 implementations for Linux MIT Kerberos Server Heimdall CAS, Nuxeo and Liferay support Kerberos, CAS only with AD 10
11 Proprietary solutions CAS * Proxy Authentication Uses similar mechanism like Kerberos Server 1 can request proxy granting ticket (PGT) Afterwards use PGT to request proxy tickets for server 2 Server 2 must validate whole chain included in proxy ticket CAS * ClearPass Password replay feature of CAS Server 1 can request the current user s password Authentication against server 2 with username/password Less secure, not nice, but effective and efficient * Central Authentication Service, Jasig / Apero 11
12 Use case CMIS All systems with CMIS interface in the project use Apache Chemistry Chemistry supports OAuth 2.0 since version 0.13 (04/2015) Nuxeo is still using version 0.12 in their latest version 7.4 (09/2015) Liferay explicitly states that only user/password auth is supported although Liferay is already using Chemistry version 0.13 Decision Evaluate usage of CAS ClearPass Encourage Liferay to support OAuth 2.0 Encourage Chemistry community to update support to OID connect 12
13 Use case workflows Camunda only supports basic http authentication Authentication is exchangable Multiple candidates would make sense OAuth 2.0 or even better OpenID connect seem the right way to go Decision Write an own wrapper around Camunda Evaluate usage of RESTeasy and RESTlet for this wrapper Use OAuth 2.0 with bearer tokens for authentication until CAS supports OpenID connect 13
14 Use case OpenSocial OpenSocial 2.x uses OAuth 2.0 as primary authentication mechanism Apache Shindig comes with an OAuth 2.0 service provider For the project, Apache Shindig was CASified Special challenge: systems have to authenticate if user is not logged in (e.g. for long running processes) Decision Use 2-legged OAuth 2.0 for storing activities in Shindig 14
15 Use case IMAP Dovecot is used as an IMAP Server Dovecot does only support Kerberos In large scale installations like Strato, communication between OX Server and Dovecot uses a master password to authenticate Decision Since our SaaS scenario of the project is similar to the Strato hosting, we will also use the master password feature 15
16 Conclusion and outlook The described scenario has some pitfalls and is costly to implement Although solved in theory, it is still demanding in practice As often, new protocols like OAuth are less sophisticated than older protocols like Kerberos, who are seen as heavy weight OpenID connect is a promising specification SSO with the Web frontend is easy, but hard for end-to-end solutions Use libraries that do authentication for you! 16
17 Please do SSO right from the beginning! Hof University Alfons-Goppel-Platz Hof, Germany Prof. Dr. René Peinl Head of research group systems integration Teaching area: Web architecture Phone Fax [email protected]
Collaborative process maturing support by mining activity streams. iknow 2015 Prof. Dr. René Peinl Graz, 21.10.2015
Collaborative process maturing support by mining activity streams iknow 2015 Prof. Dr. René Peinl Graz, 21.10.2015 Agenda 1 Use case / context 2 Background: established research streams 3 Process mining
Proxied Authentication in Single Sign-On Setups with Common Open Source Systems an Empirical Survey
Detlef Hühnlein et al. (Eds.): Open Identity Summit 2015, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn 2015 43 Proxied Authentication in Single Sign-On Setups with Common Open
Approaches and challenges for a SSO enabled extranet using Jasig CAS. Florian Holzschuher René Peinl 10.09.2013
Approaches and challenges for a SSO enabled extranet using Jasig CAS Florian Holzschuher René Peinl 10.09.2013 iisys - Institut für Informationssysteme Mission: The institute is a competence centre for
ClearPass A CAS Extension Enabling Credential Replay
ClearPass A CAS Extension Enabling Credential Replay Andrew Petro Unicon, Inc. http://www.ja-sig.org/wiki/display/casum/clearpass Copyright Unicon, Inc., 2008-2010. Some rights reserved. This work is licensed
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Architecture of Enterprise Applications III Single Sign-On
Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
Access Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen
ENTERPRISE SECURITY WITH KEYCLOAK From the Intranet to Mobile By Divya Mehra and Stian Thorgersen PROJECT TIMELINE AGENDA THE OLD WAY Securing monolithic web app relatively easy Username and password
A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF
A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF Whitepaper 08/17/2015 Summary 1. Introductio... 3 1.1 What is TMG / UAG?... 3 2. How can
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
HOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps
Sofia Event Center 14-15 May 2014 Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps Radi Atanassov SharePoint MCM & MVP
Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011
Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
Authentication and access control in Sympa mailing list server
Authentication and access control in Sympa mailing list server February 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction
Integrating Apex into Federated Environment using SAML 2.0. Jon Tupman Portalsoft Solutions Ltd
Integrating Apex into Federated Environment using SAML 2.0 Jon Tupman Portalsoft Solutions Ltd Introduction Migration challenge Federated vs Single sign-on SAML process flow Integrating Apex and Weblogic
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Single sign-on enabled OpenCms
Single sign-on enabled OpenCms Architecture for Single sign-on implementation into OpenCms Pavel Slavíček, [email protected] Brno, The Czech Republic, 2. 5. 2008 Content Single sign-on introduction
The Challenges of Web single sign-on
Serge Vereecke Security Architect IBM Security Services [email protected] The Challenges of Web single sign-on GSE Event September 7, 2012 Agenda Single sign-on technology Why single sign-on Challenges
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
Enterprise Access Control Patterns For REST and Web APIs
Enterprise Access Control Patterns For REST and Web APIs Francois Lascelles Layer 7 Technologies Session ID: STAR-402 Session Classification: intermediate Today s enterprise API drivers IAAS/PAAS distributed
Integrating WebPCM Applications into Single Sign On (SSO) Tom Schaefer Better Software Solutions, Inc. UN 4023 V
Integrating WebPCM Applications into Single Sign On (SSO) Tom Schaefer Better Software Solutions, Inc. UN 4023 V Agenda What is SSO? How does it work? Tools for SSO on ClearPath Integrating Active Directory
Open-source Single Sign-On with CAS (Central Authentication Service)
Open-source Single Sign-On with CAS (Central Authentication Service) Pascal Aubry, Vincent Mathieu & Julien Marchal Copyright 2004 ESUP-Portail consortium Open-source Single Sign-On with CAS Single Sign-On
Onegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
Federated Identity for Cloud Computing and Cross-organization Collaboration
Federated Identity for Cloud Computing and Cross-organization Collaboration Steve Moitozo Strategy and Architecture SIL International 20110616.2 (ICCM) Follow me @SteveMoitozo2 2 Huge Claims You want federated
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
The Role of Federation in Identity Management
The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation
Digital Asset Management Beyond CMIS
Digital Asset Management Beyond CMIS CMIS is an important component of DAM for many organizations, but knowing how to use it to maximize its effectiveness is the key. In this paper: How organizations use
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
External and Federated Identities on the Web
External and Federated Identities on the Web Jan Pazdziora Sr. Principal Software Engineer Identity Management Special Projects, Red Hat 1 st October 2015 Scope and problem statement Applications get deployed
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
LinuxCon North America
LinuxCon North America Enterprise Identity Management with Open Source Tools Dmitri Pal Sr. Engineering Manager Red Hat, Inc. 09.16.2013 Context What is identity management? 2 LinuxCon North America Context
owncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
CENTRAL AUTHENTICATION SERVICE (CAS) SSO FOR EMC DOCUMENTUM REST SERVICES
White Paper FOR EMC DOCUMENTUM REST SERVICES Abstract This white paper provides a detailed review of Central Authentication Service (CAS) SSO integration with EMC Documentum REST Services by exploring
September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence
September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple
OVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience
Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a
SharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
Authentication and access control in Sympa mailing list software
Authentication and access control in Sympa mailing list software May 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
BOF2337 Open Source Identity and Access Management Expert Panel, Part II. 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA
Open Source Identity and Access Management Expert Panel, Part II 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA slide 2 Expert Panel Emmanuel Lécharny, Apache Software Foundation Howard
Integration with Active Directory. Jeremy Allison Samba Team
Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,
Securing WebFOCUS A Primer. Bob Hoffman Information Builders
Securing WebFOCUS A Primer Bob Hoffman Information Builders 1 Agenda Gain an understanding of the WebFOCUS Architecture Where can security be implemented? Review the internal WebFOCUS repository and resource
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
SAP HANA Cloud Portal Overview and Scenarios
SAP HANA Cloud Portal Overview and Scenarios HERUG 2014 Conference - Montevideo April 2014 Twitter: @portal_sap / #hanacloudportal HERUG 2014 Conference Event Website Event overview Information and Agenda
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management
Flexible Identity Federation
Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos
Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website:
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs Executive Overview A key technical underpinning of the Cloud is the Application Programming Interface (API). APIs provide consistent
Extend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple how-to whitepapers will
DOVECOT Overview. Timo Sirainen Chief Architect Co-Founder
DOVECOT Overview Timo Sirainen, the Author of DOVECOT, started development in 2002 DOVECOT OY, the company behind Dovecot was established by Timo and his founder team with offices in Helsinki and Stuttgart.
Using SAP Logon Tickets for Single Sign on to Microsoft based web applications
Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
Globus Auth. Steve Tuecke. The University of Chicago
Globus Auth Enabling an extensible, integrated ecosystem of services and applications for the research and education community. Steve Tuecke The University of Chicago Cloud has transformed how platforms
From centralized to single sign on
The LemonLDAP::NG project Abstract LemonLDAP::NG is a modular WebSSO (Web Single Sign On) software based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
Product Training Services. Training Options and Procedures for JobScheduler and YADE
Product Services Product Services Options and Procedures for JobScheduler and YADE 2 Contents Product Services JobScheduler Levels Level: JobScheduler Operations Level: JobScheduler Installation Level:
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
MICROSOFT OFFICE 365 MIGRATION 2013/05/13
MICROSOFT OFFICE 365 MIGRATION 2013/05/13 WHAT IS OFFICE 365 Office 365 provides virtually anywhere access to familiar Office tools Word WEB App Excel WEB App PowerPoint WEB App Enterprise-grade email
Connecting Users with Identity as a Service
Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service
CLAIMS-BASED IDENTITY FOR WINDOWS
CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with
Open-Xchange Server High availability 2010-11-06 Daniel Halbe, Holger Achtziger
Open-Xchange Server High availability 2010-11-06 Daniel Halbe, Holger Achtziger Agenda Open-Xchange High availability» Overview» Load Balancing and Web Service» Open-Xchange Server» Filestore» Database»
TrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
Implementing CAS. Adam Rybicki. 2010 Jasig Conference, San Diego, CA March 7, 2010
Implementing CAS Adam Rybicki 2010 Jasig Conference, San Diego, CA March 7, 2010 Copyright Unicon, Inc., 2009. This work is the intellectual property of Unicon, Inc. Permission is granted for this material
OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010
OpenID Single Sign On and OAuth Data Access for Google Apps Ryan Boyd @ryguyrg Dave Primmer May 2010 Why? View live notes and questions about this session on Google Wave: http://bit.ly/magicwave Agenda
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite
Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite Vladislav Mladenov, Tim Guenther, Christian Mainka, Horst-Görtz Institut für IT-Sicherheit, Ruhr-Universität
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
High Availability CAS
High Availability CAS Adam Rybicki, Scott Battaglia 2009 Jasig Conference, Dallas, TX March 4, 2009 Copyright Unicon, Inc., 2009. This work is the intellectual property of Unicon, Inc. Permission is granted
SINGLE & SAME SIGN-ON ASPECTS
SINGLE & SAME SIGN-ON ASPECTS OF AZURE ACTIVE DIRECTORY Harold Baele Senior ICT Trainer JULY 2, 2015 SLIDE 1 TRAINER INFO Harold Baele MCT at RealDolmen Education [email protected] - @hbaele
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
Outsource the hosting of Luminis and have it hosted elsewhere
Hardware Background Luminis is the premier portal application in use today by school and organizations that use SunGard HE's Banner system. A significant amount of hardware is required in order to run
IBM Cloud Manager with OpenStack
IBM Cloud Manager with OpenStack Download Trial Guide Cloud Solutions Team: Cloud Solutions Beta [email protected] Page 1 Table of Contents Chapter 1: Introduction...3 Development cycle release scope...3
Securing ArcGIS Server Services: First Steps
Federal GIS Conference February 9 10, 2015 Washington, DC Securing ArcGIS Server Services: First Steps Michael Sarhan Esri [email protected] Agenda Review Basic Security Workflow ArcGIS Server Roles and
