Department Service Integration with e-pramaan
|
|
|
- Darleen Shaw
- 10 years ago
- Views:
Transcription
1 Department Service Integration with e-pramaan How to integrate a.net Application.NET specific integration details are provided in this document. Read e-pramaan Departments Integration Document before proceeding. CDAC Mumbai
2 Contents Revision History... 2 Abbreviations Introduction Process Flow Single Sign On... 3 A. Login (SSO) initiated from Department Service... 3 B. Login (SSO) Initiated at e-pramaan Single LogOut (SLO)... 5 A. Single LogOut (SLO) Initiated by Department service... 5 B. Single LogOut (SLO) Initiated by e-pramaan Required Steps for Integration... 7 A. Create Resources Folder in the Application root... 8 B. Implement Support for HTTP POST... 8 C. Modify authentication Login using e-pramaan... 8 D. Processing SAML Response... 9 E. Supporting Single LogOut (SLO) F. Processing SLO Response G. Web Service Handlers i. SLO Request Handler ii. ssofail handler iii. logoutfail handler H. Processing OneTimeVerification I. Session Management J. Modify SSO.Properties K. Register Department Service at e-pramaan Service Portal Centre for Development of Advanced Computing 1
3 Revision History Version Date Author Reason for Change 1.0 (Draft) e-pramaan Integration Team e-pramaan Integration Team e-pramaan Senior Project Manager e-pramaan Project Manager Abbreviations SAML SP SSO SLO Security Assertion Mark-up Language Service Provider (Department) Single Sign On Single LogOut Centre for Development of Advanced Computing 2
4 Intended Audience The recommended audience for this document is the enterprising person (system administrator/software developer) responsible for e-pramaan integration at Department end. This document may be useful for the project manager/department head to assess the effort required for integration with e-pramaan. Prerequisite The integrating person at Department end should be well versed in web application development using.net framework 4.5 and familiar with the work flow of the Department Service. 1. Introduction This document details the steps involved in integrating Department services developed in.net framework with e-pramaan. It explains the process flow and the step-by-step instructional guidance for integrating.net web application with e-pramaan to achieve Single Sign On (SSO) and Single LogOut (SLO) functionality provided by e-pramaan. 2. Process Flow 1. Single Sign On Single Sign On (SSO) is an access control mechanism across multiple independent software systems. This allows user to log in once and gain access to all services, without being prompted for log in again at each of them. e-pramaan allows the user to initiate SSO either from Department Service or from e-pramaan portal. Similarly Single LogOut session can also be initiated at Department Service or at e-pramaan portal. SAML 2.0 is used for SSO implementation. A. Login (SSO) initiated from Department Service Steps involved in SSO initiated by Department service are depicted in Figure User at Department Service initiates SSO by clicking the option to "Login Using e-pramaan". 2. Department Service then creates SAML SSO request and forwards the user to e-pramaan for authentication. 3. User is authenticated by e-pramaan using Challenge-Response mechanism. 4. User is authenticated successfully on e-pramaan. 5. The user is redirected back to the initiating Department Service. Since the user has been authenticated at e-pramaan, the Department Service accepts the user and allows him/her to login. Centre for Development of Advanced Computing 3
5 6. If the user fails to authenticate himself/ herself on e-pramaan, the SAML response returns authentication failure. Figure 2.1 : SSO initiated from SP Service B. Login (SSO) Initiated at e-pramaan Steps involved in SSO initiated by user at e-pramaan portal depicted in Figure The user directly comes to e-pramaan portal and logs in using Login and Password. 2. When the user selects a service, e-pramaan checks the authentication required by the service. 3. According to the requirement of the service, e-pramaan uses the challenge-response to complete the authentication. 4. The user completes the authentication by providing the appropriate response. 5. e-pramaan then initiates an SSO session between e-pramaan and the selected service. 6. The user is then redirected to the selected Department Service where (s)he will be allowed to log in without entering his(her) credentials again. Centre for Development of Advanced Computing 4
6 Figure 2.2 : SSO initiated from e-pramaan 2. Single LogOut (SLO) During every user session at e-pramaan, user may log-in into multiple services. When the user is logged out from one service, The user is logged out from all active services. This is achieved by initiating Single LogOut (SLO) either from Department service or e-pramaan portal. SLO is triggered when the user selects the option to logout, either from the department Service or from e-pramaan. A. Single LogOut (SLO) Initiated by Department service SLO is initiated by the Department Service when the user decides to logout at the Department Service. The service will Log Out the user locally (or the service may logout the user locally after receiving the response from e-pramaan) and then creates the SAML SLO request to e-pramaan to initiate SLO broadcast. This will ensure that the user will be logged out from every service the user was logged in through SSO session. This is depicted in Figure 2.3. The service has an option not to accept the SLO token. Centre for Development of Advanced Computing 5
7 e-pramaan Integration Document.NET Specific v1. Figure 2. Centre for Development of Advanced Computing
8 B. Single LogOut (SLO) Initiated by e-pramaan Single LogOut (SLO) will be triggered from e-pramaan when the user selects the option to logout from e- Pramaan portal. e-pramaan portal will then broadcast the LogOut Request to all the services which are logged in through the current active session. On receiving the Single LogOut request (SLO request) may terminate the local session and notify e-pramaan the LogOut status via logout response message. The scenario is depicted in Figure 2.4. Figure 2.4 : SLO initiated from e-pramaan 3. Required Steps for Integration The steps involved in integrating a.net application with e-pramaan are listed below. Sample code for this is provided in the integration kit. Create a folder named Resources in the application root where the SamlConnector.dll and other configuration files for e-pramaan integration will be placed. Provide link Login using e-pramaan on the login page of Department Service. Modify OnClick event of Login using e-pramaan link to authenticate using e-pramaan. Modify/implement logic to consume SSO Token sent by e-pramaan. Modify the logout procedure to direct through e-pramaan. Modify/implement logic to consume logout response from e-pramaan. Centre for Development of Advanced Computing 7
9 Implement a RESTful Webservice using the template provided in the Integration Kit, to receive SLO broadcast request from e-pramaan. Implement logic for OneTimeVerification as detailed further. A. Create Resources Folder in the Application root.net web applications require a few DLLs for integrating with e-pramaan. Files given in the Integration Kit are detailed in Table 3.1. Create a folder named Resources inside your.net applications folder. Copy the following all these dlls & configuration file from integration kit to the Resources folder Table 3.1 : Integration kit contents Serial No Component Purpose 1 SamlConnector.dll This component manages communication between Department Service & e-pramaan 2 SSOToken-client.dll This component maps the json to SSO Token class 2 NewtonSoft.dll This component helps in de-serializing the SSO Token sent by e-pramaan on successful authentication 3 Saml2.0.dll This is the SAML library for creating SAML Requests/Response 4 SSO.properties This is the configuration file used by SamlConnector.dll. All the configuration information goes in this file. B. Implement Support for HTTP POST e-pramaan uses SAML request/response to communicate with Department Services. These requests most likely will be signed and encrypted, making them too big to send via browser GET method. Integrating the HttpHelper.cs class will helps the Department Service to easily send the SAML requests by HTTP POST method. C. Modify authentication Login using e-pramaan The authentication mechanism in the service application has to incorporate a link to Login using e-pramaan. In your application, add a button/link named Login through e-pramaan. Using the given DLLs create an authentication request for an event generated by onclick ()and send it to e-pramaan for authenticating the user. Sample code for authentication is given below. Refer AuthnRequest/Login.aspx.cs in the integration kit for complete source code. Centre for Development of Advanced Computing 8
10 Table 3.2 : Code Sample for Authentication //Create Object of samlconnector SamlConnectorComp samlconnector = new SamlConnectorComp(); //Set destination URL //epramaanurl URL of the e-pramaan portal //SingleSignOnServiceURL URL which accepts SSO requests from Department Service string url = PropertiesManager.getProperty("ePramaanURL") + PropertiesManager.getProperty("SingleSignOnServiceURL"); //Generate Saml Auth Request and maintain a log of it string SamlAESEncrpytedRequest = samlconnector.getsamlauthnrequest(); LogAppend.Log("Encrypted Auth Request:" + SamlAESEncrpytedRequest); //Get seed & salt values from Property file //EncryptionSeed This is the Key used for encryption //EncryptionSalt This is the salt value used for encryption string seed = PropertiesManager.getProperty("EncryptionSeed") string salt = PropertiesManager.getProperty("EncryptionSalt"); //Decrypt the Auth Request string dec = AES.decryptAES(SamlAESEncrpytedRequest, seed, salt); LogAppend.Log("Decrypted Auth Request:" + dec); //Read Service ID from config file //Issuer This is the unique service Id of the SP Service string ServiceId = PropertiesManager.getProperty("Issuer"); //Add the SAMLRequest & Service ID to parameters list //SAMLRequest This is the encrypted SAML SSO Request which should be sent to e-pramaan //ServiceId This is the unique ID of the SP Service NameValueCollection parameters = new NameValueCollection(); parameters.add("samlrequest", SamlAESEncrpytedRequest); parameters.add("serviceid", ServiceId); //POST the request to e-pramaan HttpHelper.RedirectAndPOST(this.Page, url, parameters); D. Processing SAML Response After successful authentication at e-pramaan the user is redirected to the Department service for which SAML request was initiated. This will be a HTTP POST REDIRECT and the user credentials will be provided by e-pramaan in the SAML Response. The service has to consume the SAML Response and decide the further logic for allowing the user to access desired service. The SAML Response sent by e-pramaan will be received by an ASP page at the Department service end, which will be decoded and processed before allowing the user to login on the service. Sample code for Centre for Development of Advanced Computing 9
11 decoding/processing of the SAML Response is given ahead. Refer AuthnResponse/consume.aspx.cs in the integration kit for complete source code. Table 3.3 : Code sample for SSO response processing //Get the SAMLResponse from e-pramaan string epramaanresponse = Request["SamlResponse"]; //Log the received Response LogAppend.Log("epramaanAUTHResponse" + epramaanresponse); //Initialize the saml connector SamlConnectorComp samlconnector = new SamlConnectorComp(); //Get the SSO Object, which contains the SSO Token ssoobject = samlconnector.processsamlresponse(epramaanresponse); if (ssoobject.ssotoken!= null) { // Get the user details from SP Service database & Store details in //Session string Querycheck = "select * from tbl_persondetails where Active=1 and UserName = '" + ssoobject.ssotoken.userspservicedetail.serviceuserid + "'"; DataTable dtcheck = new DataTable(); dtcheck = dtu.getdatatable(querycheck, "Query"); if (dtcheck.rows.count!= 0) { //set the values in the session SessionManagement.state["Uid"] = enc.encrypt(dtcheck.rows[0]["personid"].tostring()); SessionManagement.state["Orgid"] = enc.encrypt(dtcheck.rows[0]["orgid"].tostring()); SessionManagement.state["UserName"] = enc.encrypt(dtcheck.rows[0]["username"].tostring()); if (dtcheck.rows[0]["utype"].tostring() == "True") { SessionManagement.state["UType"] = enc.encrypt("a"); } else { SessionManagement.state["UType"] = enc.encrypt("n"); } } //Set the SessionIndex value in session SessionManagement.state["SessionIndex"] = ssoobject.sessionindex; SessionManagement.state["AadhaarNumber"] = ssoobject.nameid; SessionManagement.state["Name"] = ssoobject.ssotoken.givenname; } Centre for Development of Advanced Computing 10
12 E. Supporting Single LogOut (SLO) A user logged in through e-pramaan will be able to log-out using Single LogOut (SLO) feature, which implies SLO request initiated will log out user from all the active services for that user. Whenever a user initiates a logout at service, a SAML SLO request will be sent to e-pramaan by the Service. The service will have to provide the "Logout" button to incorporate this feature. Sample code for creating SAML SLO request is given in Table 3.4. Refer Logout Request/Home.aspx.cs in the integration kit for complete source code. Table 3.4 : Code sample for creating SLO request //Initialize the saml connector SamlConnectorComp samlconnector = new SamlConnectorComp(); //Get the SessionIndex of current active session string SessionIndex = Convert.ToString(SessionManagement.state["SessionIndex"]); //create the SLO request string base64logoutrequest = samlconnector.getsamllogoutrequest(sessionindex, (string)sessionmanagement.state["aadhaarnumber"]); //Get the encryption seed & salt. Seed is the encryption Key string seed = PropertiesManager.getProperty("EncryptionSeed"); string salt = PropertiesManager.getProperty("EncryptionSalt"); //Get issuer id, e-pramaan URL and Logout URL from properties string serviceid = PropertiesManager.getProperty("Issuer"); string url = PropertiesManager.getProperty("ePramaanURL") + PropertiesManager.getProperty("SingleLogoutServiceURL"); //Add Logout Request & ServiceId to the parameters collection NameValueCollection parameters = new NameValueCollection(); parameters.add("samlrequest", base64logoutrequest); parameters.add("serviceid", serviceid); //Remove the local session. Service may chose to remove local session only after receiving SLO Response from e-pramaan. Service has the freedom to decide this SessionManagement.clearSession(SessionIndex); //POST SLO Request to e-pramaan LogAppend.Log("Redirecting to epramaan..."); HttpHelper.RedirectAndPOST(this.Page, url, parameters); Centre for Development of Advanced Computing 11
13 F. Processing SLO Response SLO Response will be sent bye-pramaan to the initiating Department service in response to the SLO Request. It contains the status whether SLO was success/failure at e-pramaan. This SLO Response will be sent via "POST Redirect" to the initiating Department service. To consume the SLO Response, the Service has to implement a listener to receive and process the SLO Response. The SLO Response will have a status success if the logout was successful & status as Request failed if the logout was not successful. This listener will receive SLO Response, process it & alert the user whether the LogOut operation was successful at e-pramaan or not. Sample code for creating Logout Response is given in Table 3.5. Refer Logout Response/consumeLogout.cs in the Integration kit for complete source code. Table 3.5 : Code sample for SLO Respose //Get the SLO Response from the POST data string epramaanresponse = Request["SamlResponse"]; LogAppend.Log("Epramaan Logout Response" + epramaanresponse); //Initialize the saml connector SamlConnectorComp samlprovider = new SamlConnectorComp(); //get the SLO Response Object from SLO Response given by e-pramaan LogoutResponse logoutresponse = samlprovider.processlogoutresponse(epramaanresponse); //Check the SLO Response status and redirect accordingly. if (logoutresponse == null (logoutresponse.status.statuscode.value!= SAML2.Saml20Constants.StatusCodes.Success)) { Response.Redirect("SLOfailed.as;px"); } else { SessionManagement.state.Remove("SessionIndex"); SessionManagement.state.Remove("AadhaarNumber"); SessionManagement.state.Remove("Name"); SessionManagement.state.Remove("UserName"); SessionManagement.state.Clear(); SessionManagement.state.Abandon(); Response.Redirect("LoggedOut.aspx"); } Centre for Development of Advanced Computing 12
14 G. Web Service Handlers i. SLO Request Handler e-pramaan allows user to log in to multiple services through e-pramaan in a single user session. Suppose that the user is logging out at the e-pramaan website, the user should logout from all the associated services for Single LogOut. This is e-pramaan initiated Single Logout Service (SLO). e- Pramaan initiated SLO is implemented using RESTful web services. In e-pramaan initiated SLO, Department Service will receive a Logout Request from e-pramaan. The service has to process and validate the request. On successful processing of the request, the service has to logout the user and terminates user session at SP Service. After this, the service has to send the status of the logout in a synchronous REST service response. The integrating a service has to implement the RESTful web service for receiving the SLO request, process it and send the SLO Response back to e-pramaan. Sample code for "SLO Request consumer" WebService is given in Table 3.6. Table 3.6 : Code sample for receiving SLO Broadcast //Get SLORequest string from the stream string StringReq = SamlConnectorComp.StreamToString(SamlRequest); string seed = PropertiesManager.getProperty("EncryptionSeed"); string salt = PropertiesManager.getProperty("EncryptionSalt"); //decrypt the request and log it. string decryptedreq = AES.decryptAES(StringReq, seed, salt); LogAppend.Log("SLODECREQ:" + decryptedreq); //initialize the SamlConnector component SamlConnectorComp connector = new SamlConnectorComp(); //Get the LogoutRequest object from the request received LogoutRequest logoutrequest = connector.processslologoutrequest(stringreq); //logout the user here. session management also done here string[] sessionindex = logoutrequest.sessionindex; if (sessionindex.length == 1) sessiondeleted = SessionManagement.clearSession(sessionIndex[0]); if (sessiondeleted == true) logoutstatus = SamlConnectorComp.responseStatusCode.Success; else logoutstatus = SamlConnectorComp.responseStatusCode.Denied; //end of session management. //create LogoutResponse to send back to e-pramaan string encryptedresponse = connector.createslologoutresponse(logoutrequest, logoutstatus); LogAppend.Log("encryptedSLOResponse Rest Service:" + encryptedresponse); //To send the LogoutResponse to e-pramaan, write the created LogoutRequest string to the stream nwstream = new MemoryStream(Encoding.UTF8.GetBytes(encryptedResponse)); return nwstream; Centre for Development of Advanced Computing 13
15 ii. ssofail handler When a user tries to log-in using e-pramaan from service end but fails to get authenticated on e- Pramaan, a SAML Response is initiated by e-pramaan. This saml Response will be send via RESTful Web service. The service has to implement a RESTful web service for this. Web service may be used by the SP Service for logging/auditing purpose. Sample code for this is given in Table 3.7. Refer SLORestService.cs in the integration kit for the complete source code. Table 3.7 : Code sample for SSO failure handling try{ SSOObject ssoobject = null; //Get the SAML Response string from stream string StringException = SamlConnectorComp.StreamToString(AuthException); //initialize the SamlConnector component SamlConnectorComp samlconnector = new SamlConnectorComp(); //Get the Response object from SAML Response string ssoobject = samlconnector.processsamlresponse(stringexception); //Log the reason why SSO failed at e-pramaan LogAppend.Log("Status" + ssoobject.status.statuscode.value); } catch (Exception ex) { System.Diagnostics.Debug.WriteLine(ex.ToString());} iii. logoutfail handler When the user clicks LogOut button at the Service, it redirects the user to e-pramaan due to implemented SLO facility. When LogOut attempt is successful, the user is redirected back to the initiating Service. But, when LogOut fails at e-pramaan, the user is not redirected back. The LogOut failure, in this case, is intimated via RESTful web service logoutfail Web Service. The service has to implement the RESTful web service handlers as mentioned above. Sample code is given in Table 3.8. Refer WebService/SLORestService.cs in the integration kit for the complete source code. Centre for Development of Advanced Computing 14
16 Table 3.8 : Code sample for SLO failure handling try{ SSOObject ssoobject = null; //Get the SAML Response string from stream string StringException =SamlConnectorComp.StreamToString(LogoutException); //Initialize the SamlConnector component SamlConnectorComp samlconnector = new SamlConnectorComp(); //Get LogoutResponse object from the response received LogoutResponse logoutresponse = samlconnector.processlogoutresponse(stringexception); LogAppend.Log("Status = " + logoutresponse.status.statuscode.value); } catch (Exception ex){ System.Diagnostics.Debug.WriteLine(ex.ToString()); } H. Processing OneTimeVerification User mapping between e-pramaan and Department Service can be done by either of the two methods explained below. 1. Adhaaar Number based when the user is uniquely identified at the Department Service using Adhaar Number this mapping will be used. On successful authentication at e-pramaan, the user will be redirected to the Department Service along with his Adhaar Number. Service then checks whether an existing account for this Adhaar number exists. If found, user is allowed to login & access the service. Otherwise user will have to register at the SP Service before he is allowed to login using e-pramaan. 2. Service UserID Seeding at e-pramaan - Service UserID is the UserID used at the Department Service, using which the user logs into the Department Service. If at the service end, Aadhaar seeding is not done for all the users of the service, the service will go for the option SP UserID seeding at e-pramaan. If the user is mapped at e-pramaan using Service User-ID Seeding at e-pramaan, then at the first login attempt the user will be prompted to do the OneTimeVerification. On successful completion of OneTimeVerification existing Service User-ID will be linked to his e-pramaan account. It is mandatory for the service to provide OneTimeVerification URL at the time of adding a service on portal of e-pramaan. The logic of OneTimeVerification will validate the user for the first time at the Service end, and push the verification status along with the ServiceUserID to e-pramaan REST WebService and complete the Service UserId e-pramaan account mapping. Centre for Development of Advanced Computing 15
17 When a user tries to access a Service for the first time then e-pramaan HTTP POST redirects the user to Department service s OneTimeVerification URL with three request parameters. Request parameters are defined in Table 3.9 below: Table 3.9 : Code sample for SSO failure handling Sr. No. Parameter name Parameter value 1 ssotoken AES encrypted JSON object of ssotoken 2 transactionid Id to uniquely identify the transaction 3 source Constant Value i.e. epramaan Once redirected to the service, the service will ask the user to enter his login credentials. The Service will verify these credentials and the status is pushed back to epramaan via WebService. The code for this OneTimeVerification push back is provided in OneTimeVerification/OneTimeVerification.cs. I. Session Management We have created a class for session management, which is given in the Integration kit (Session Management/SessionManager.cs). Kindly refer AuthnResponse/consume.cs for code sample on session handling. J. Modify SSO.Properties SSO.properties is the key configuration file used by the SAML Connector for integrating with e-pramaan. The entries in the SSO.properties file are explained as given in Table 3.10 below. Table 3.10 : SSO.properties file Sr. # Parameter in SSO.properties Expected Value Explanation 1* epramaanurl e-pramaan specific 2* SingleLogoutServiceURL /processslorequest.do e-pramaan specific 3* SingleSignOnServiceURL /processssorequest.do e-pramaan specific 4 AssertionIssuer e-pramaan For validation. This value will be string compared to validate the issuer is e-pramaan 5 Issuer ServiceId (Numeric value) given to the service by e-pramaan when the service is registered at sp.epramaan.in Every service registered with e- Pramaan will be given a unique id called ServiceId. 6 SPServiceHomePageURL SP has to enter this value Base URL of the SP. Eg: dummysp.in /localdemo1 Centre for Development of Advanced Computing 16
18 7 SPAssertionConsumerService URL /consume.aspx Page which will receive SSO Response from e- Pramaan 8 SPLogoutConsumerURL /consumelogoutresponse.aspx Page which will receive LogoutResponse from e-pramaan 9 SLOURL /SLORestService.svc/ConsumeLogoutRequest URL of the SLO RESTful Web service. Used to validate SLO Request from e-pramaan. 10* EncryptionSeed * This value will be shared with you by e- Pramaan e-pramaan mandates all request and responses be encrypted. This value will be given by e- Pramaan 11* EncryptionSalt *Service ID of the service This is the ServiceId of the service. Refer item (5) above. 12 SamlSigning True To enable/disable signing of SAML Request. 13 SPCertificateFilePath Path to the private certificate of SP Private certificate of SP will be used for signing the SAML Request. 14 SPCertificatePassword The private key of SP certificate is protected using this. * Marked values will be shared to the service by e-pramaan administrator This password is required for signing the SAML request/responses using SP s private key. K. Register Department Service at e-pramaan Service Portal For integration with e-pramaan, the URLs at Department Service have to be registered with e-pramaan. The steps for service registration are as follows. Departments Admin registers the department as a Service Provider(SP) on Service Portal of e- Pramaan. e-pramaan admin gets notification of new SP registered on e-pramaan. After receiving the request through proper channel, e-pramaan admin activates the registered Department. SP admin log in to e-pramaan and adds new service. While adding service, (s)he enters the required URLs according to Table 3.11 given below. e-pramaan admin activates the newly registered service after testing of integration is completed. Now, the Department Service is integrated with e-pramaan & users can login using e-pramaan to access the service Centre for Development of Advanced Computing 17
19 Table 3.11 : URL Mapping at e-pramaan Sr. # Field name at sp.epramaan.in Value at SP portal 1 Service Url Home page of SP Ex: ( demo1) 2 Logout Url URL of the Servlet at SP which consumes logout response sent by e-pramaan Ex: ( demo1/logoutresponsecons umer) 3 SSO Url URL of the Servlet at SP which consumes logout response sent by e-pramaan Ex: ( demo1/ssoresponseconsume r) 4 SLO Url URL of the REST Web Service at SP which consumes SLO request sent by e-pramaan Ex: ( demo1/ws/saml/slo) 5 Logout Failure URL URL of the REST Web Service at SP Which will receive Logout Response if Logout operation failed at e- Pramaan 6 SSO Failure URL URL of the REST Web Service at SP Which will receive SAML Response if SSO operation failed at e- Pramaan 7 One time verification URL The one time verification URL must validate the user at SP Service end and push the verification status to e-pramaan REST WebService to complete the e-pramaan User > Service User Id mapping. Value in SSO.properties [SPServiceHomePageURL] [SPServiceHomePageURL]+[S PLogoutConsumerURL] [SPServiceHomePageURL]+[S PAssertionConsumerService URL] Not mapped Not mapped Not mapped Not Mapped Centre for Development of Advanced Computing 18
20 Contact us Centre for Development of Advanced Computing (C-DAC), Mumbai, Gulmohar Crossroad 9, Juhu, Mumbai Tel: /1574 Fax: / [email protected] Centre for Development of Advanced Computing 19
Department Service Integration with e-pramaan
Department Service Integration with e-pramaan How to integrate a PHP Application PHP specific integration details are provided in this document. Read e-pramaan Departments Integration Document before proceeding.
End-User Manual. for. e-pramaan: A National e-authentication Service. Submitted to
e-pramaan: A National e-authentication Service End User Manual version 0.1 1 End-User Manual for e-pramaan: A National e-authentication Service Submitted to Department of Electronics & Information Technology
How to create a SP and a IDP which are visible across tenant space via Config files in IS
How to create a SP and a IDP which are visible across tenant space via Config files in IS This Documentation is explaining the way to create a SP and IDP which works are visible to all the tenant domains.
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
SAML Single-Sign-On (SSO)
C O L A B O R A T I V E I N N O V A T I O N M A N A G E M E N T Complete Feature Guide SAML Single-Sign-On (SSO) 1. Features This feature allows administrators to setup Single Sign-on (SSO) integration
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
Software Design Document SAMLv2 IDP Proxying
Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: [email protected] This document is subject to the following license: COMMON DEVELOPMENT AND
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
Configuration Guide - OneDesk to SalesForce Connector
Configuration Guide - OneDesk to SalesForce Connector Introduction The OneDesk to SalesForce Connector allows users to capture customer feedback and issues in OneDesk without leaving their familiar SalesForce
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
SAML application scripting guide
Chapter 151 SAML application scripting guide You can use the generic SAML application template (described in Creating a custom SAML application profile) to add a SAML-enabled web application to the app
PHP Integration Kit. Version 2.5.1. User Guide
PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001
Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites
Single Sign On (SSO) Implementation Manual For Connect 5 & MyConnect Sites Version 6 Release 5.7 September 2013 1 What is Blackboard Connect Single Sign On?... 3 How it Works... 3 Drawbacks to Using Single
Configuring. Moodle. Chapter 82
Chapter 82 Configuring Moodle The following is an overview of the steps required to configure the Moodle Web application for single sign-on (SSO) via SAML. Moodle offers SP-initiated SAML SSO only. 1 Prepare
ADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
Microsoft Office 365 Using SAML Integration Guide
Microsoft Office 365 Using SAML Integration Guide Revision A Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server This blog will explain how to use Microsoft Azure as a Federated Authenticator for WSO2 Identity Server 5.0.0. In this example
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Alfresco Share SAML. 2. Assert user is an IDP user (solution for the Security concern mentioned in v1.0)
Alfresco Share SAML Version 1.1 Revisions 1.1 1.1.1 IDP & Alfresco user logs in using saml login page (Added info about saving the username and IDP login date as a solution for the Security concern mentioned
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
SAML 2.0 SSO Deployment with Okta
SAML 2.0 SSO Deployment with Okta Simplify Network Authentication by Using Thunder ADC as an Authentication Proxy DEPLOYMENT GUIDE Table of Contents Overview...3 The A10 Networks SAML 2.0 SSO Deployment
Configuring Salesforce
Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
Connected Data. Connected Data requirements for SSO
Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS
White Paper TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS Abstract This white paper explains how to diagnose and troubleshoot issues in the RSA Access Manager single sign-on
E-Authentication Federation Adopted Schemes
E-Authentication Federation Adopted Schemes Version 1.0.0 Final May 4, 2007 Document History Status Release Date Comment Audience Template 0.0.0 1/18/06 Outline PMO Draft 0.0.1 1/19/07 Initial draft Internal
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.
Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents
Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0
1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.2.2 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to
Integration Overview. Web Services and Single Sign On
Integration Overview Web Services and Single Sign On Table of Contents Overview...3 Quick Start 1-2-3...4 Single Sign-On...6 Background... 6 Setup... 6 Programming SSO... 7 Web Services API...8 What is
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Single Sign On Integration Guide. Document version: 20.01.12
Single Sign On Integration Guide Document version: 20.01.12 Table of Contents About this document... 3 Purpose... 3 Target... 3 Support... 3 Overview... 4 SAML... 5 SAML in general... 5 How SAML is used
T his feature is add-on service available to Enterprise accounts.
SAML Single Sign-On T his feature is add-on service available to Enterprise accounts. Are you already using an Identity Provider (IdP) to manage logins and access to the various systems your users need
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
7. In the boxed unlabeled field, enter the last 4 digits of your Social Security number.
CREATE YOUR MYVIEW LOGIN To access myview while ensuring security, you will be given an encrypted access key token. You will use this token the first time you log into myview. Once you have successfully
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Centrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
Configuring SuccessFactors
Chapter 117 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors
esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD
esoc European Space Operations Centre Robert-Bosch-Strasse 5 64293 Darmstadt Germany Tel: (49)615190-0 Fax: (49)615190485 www.esa.int SSA DC-I Part 1 - Single Sign-On and Access Management ICD Prepared
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
SAML Authentication within Secret Server
SAML Authentication within Secret Server Secret Server allows the use of SAML Identity Provider (IdP) authentication instead of the normal authentication process for single sign-on (SSO). To do this, Secret
Installation and Administration Guide
Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features
Your Gateway to Electronic Payments & Financial Services. Getting Started Guide - English
Your Gateway to Electronic Payments & Financial Services Getting Started Guide - English Contents Introduction Register online for noqodi How to fund? How to execute Transactions and Payments? Conclusion
Configuring. SugarCRM. Chapter 121
Chapter 121 Configuring SugarCRM The following is an overview of the steps required to configure the SugarCRM Web application for single sign-on (SSO) via SAML. SugarCRM offers both IdP-initiated SAML
Protected Trust Directory Sync Guide
Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
Logout Support on SP and Application
Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team [email protected] Single Logout: Is it possible? Single Logout will work only in some
Qualtrics Single Sign-On Specification
Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
Single Log-Out. Andreas Åkre Solberg Malaga, June 2009
Single Log-Out Andreas Åkre Solberg Malaga, June 2009 Sessions On Web HTTP originally stateless Using Cookies to keep state Cookies in RFC2965 Set a session ID first time user visits, sent back to site
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
SmartConnect User Credentials 2012
User Credentials Used When The SmartConnect client connects to Microsoft Dynamics GP When connecting to the Microsoft Dynamics GP the credentials of the current AD user are used to connect to Dynamics
Single Sign On for ShareFile with NetScaler. Deployment Guide
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Configuring user provisioning for Amazon Web Services (Amazon Specific)
Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re
SAML Authentication with BlackShield Cloud
SAML Authentication with BlackShield Cloud Powerful Authentication Management for Service Providers and Enterprises Version 3.1 Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCARD
Setting up single signon with Zendesk Remote Authentication
Setting up single signon with Zendesk Remote Authentication Zendesk Inc. 2 Zendesk Developer Library Introduction Notice Copyright and trademark notice Copyright 2009 2013 Zendesk, Inc. All rights reserved.
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
SAM Context-Based Authentication Using Juniper SA Integration Guide
SAM Context-Based Authentication Using Juniper SA Integration Guide Revision A Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
CTSU SSO (Java) Installation and Integration Guide
Cancer Trials Support Unit CTSU A Service of the National Cancer Institute CTSU SSO (Java) Installation and Integration Guide Revision 1.0 18 October 2011 Introduction Document Information Revision Information
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net 3.5.1 (Net 2) On A Gmaalto.Com Web Server
Application Note: Integrate Juniper SSL VPN with Gemalto SA Server [email protected] October 2007 www.gemalto.com Table of contents Table of contents... 2 Overview... 3 Architecture... 5 Configure
itds OAuth Integration Paterva itds OAuth Integration Building and re-using OAuth providers within Maltego 2014/09/22
Paterva itds OAuth Integration itds OAuth Integration Building and re-using OAuth providers within Maltego AM 2014/09/22 Contents Maltego OAuth Integration... 3 Introduction... 3 OAuth within the Maltego
HarePoint Workflow Extensions for Office 365. Quick Start Guide
HarePoint Workflow Extensions for Office 365 Quick Start Guide Product version 0.91 November 09, 2015 ( This Page Intentionally Left Blank ) HarePoint.Com Table of Contents 2 Table of Contents Table of
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
SSO Plugin. Case study: Integrating with Ping Federate. J System Solutions. http://www.javasystemsolutions.com. Version 4.0
SSO Plugin Case study: Integrating with Ping Federate J System Solutions Version 4.0 JSS SSO Plugin v4.0 Release notes Introduction... 3 Ping Federate Service Provider configuration... 4 Assertion Consumer
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
Configuring. SuccessFactors. Chapter 67
Chapter 67 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors
Safewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.
Znode Multifront - Installation Guide Version 6.2 1 System Requirements To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server
