Computer Associates etrust Single Sign-On (SSO)

Size: px
Start display at page:

Download "Computer Associates etrust Single Sign-On (SSO)"

Transcription

1 Ant Allan Product Report 12 November 2002 Computer Associates etrust Single Sign-On (SSO) Summary CA s etrust SSO gives an organization s users a single password instead of multiple passwords to Web and enterprise systems. It uses Tcl scripting and supports strong authentication methods. Table of Contents Overview Analysis Pricing Competitors Strengths Limitations Insight List Of Tables Table 1: Comparison of Unicenter SSO and etrust SSO Table 2: Overview: Computer Associates etrust Single Sign-On (SSO) Table 3: Features and Functions: etrust SSO: Identity Management Table 4: Features and Functions: etrust SSO: Interfaces Table 5: Features and Functions: etrust SSO: Authentication Methods Table 6: Features and Functions: etrust SSO: Single Sign-On Table 7: Features and Functions: etrust SSO: Security Table 8: Features and Functions: etrust SSO: Administration Table 9: Features and Functions: etrust SSO: Auditing Table 10: Features and Functions: etrust SSO: System Requirements Table 11: Price List: etrust SSO Table 12: Competitors List Of Figures Figure 1: etrust SSO Network Diagram Gartner Entire contents 2002 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 Corporate Headquarters Computer Associates International Inc. One Computer Associates Plaza Islandia, NY 11749, U.S.A. Tel: , Fax: Internet: Overview Computer Associates offers two single sign-on (SSO) products, Unicenter SSO and etrust SSO. CA developed Unicenter SSO entirely in-house, whereas CA developed etrust SSO from the PLATINUM SSO product, formerly Memco s Proxima SSO. (CA acquired PLATINUM technology International, inc. in May 1999; PLATINUM had acquired Memco Software Ltd. in March 1999.) The following table summarizes the key differences between the two products. Table 1: Comparison of Unicenter SSO and etrust SSO Unicenter SSO Requires Unicenter framework Computer Associates Basic Language (CABL) scripting Limited authentication plug-ins Supports billing codes Supports client/server and mainframe-hosted applications etrust SSO Stand-alone product Tool Command Language (Tcl) scripting Flexible authentication options (public key infrastructure (PKI) and biometric.) PKI support Supports Web applications, client/server and mainframe-hosted applications While CA promotes etrust SSO as its flagship SSO product, its strategy is to migrate Unicenter SSO and etrust SSO into a superset which will retain the etrust SSO name. The superset etrust SSO will capitalize on the strengths of both products with general availability in late etrust SSO Components The components of etrust SSO include: The etrust SSO Server is the product s authorization engine, supporting a number of authentication methods to provide flexibility to all organizations using the product. The etrust SSO database stores all information about an organization s users, groups, resources, applications, login parameters and access control rules utilizing databases used by other etrust products. An organization can load this database with user and group information from existing databases, during or after product installation. User and group information can be imported by running an etrust SSO utility or by using the command line interface. 12 November

3 Login dialogues are filed on the same server host as the etrust SSO database, but in a separate directory (usually user/sso/scripts/ on a Unix server) rather than the database itself. These provide instructions that the etrust SSO Client executes to log an end user into an application. For client/server and mainframe SSO, a copy of the etrust SSO Client runs on every workstation using etrust SSO services. The etrust SSO Client software: Communicates with primary authentication agents to verify the user s identity for accessing etrust SSO. Displays applications that the end user is authorized to use. Communicates with the etrust SSO Server and retrieves login dialogues and login data from the server platform. Executes login dialogues and logs the user into authorized applications. Sends the results of the login attempt to the etrust SSO Server (if so instructed by the login dialogue). The etrust SSO Web Agent provides single sign-on, authentication, and authorization services to Web applications and resources for all of an organization s users. An organization must install the etrust SSO Web Agent on the Web server hosting the target application(s). No software needs to be installed at the user s desktop. No client software is required on the workstation for Web SSO where the etrust SSO Web Agent can be installed, but a Web Client is required for SSO to external Web applications. etrust SSO Primary Authentication Agents run on the enterprise s authentication hosts/platforms, such as Windows 2000 and third-party security servers, and facilitates primary authentication of the end user. The etrust SSO APIs are application-programming interfaces that allow an organization to customize existing applications for use with etrust SSO. The etrust SSO Application Agent resides on an application server and handles communications with the etrust SSO components to log an end user into an application. The etrust SSO Assistant is a Windows based graphical user interface (GUI) tool for managing etrust SSO and its database. It is installed on an administrator s Windows NT or Windows 95/98/2000 workstation with Transmission Control Protocol/Internet Protocol (TCP/IP) communication to the etrust SSO Server. An organization can use this GUI to communicate with both Unix and Windows NT etrust SSO servers. (The etrust SSO Web Assistant offers similar functionality as the etrust SSO Assistant through a Web browser.) The etrust SSO Broker is an optional component that provides load balancing and configuration control. Figure 1: etrust SSO Network Diagram 12 November

4 Table 2: Overview: Computer Associates etrust Single Sign-On (SSO) Version etrust SSO 6.5 SP2 Date Announced v6.5 released: 06/02/2000 SP2 released: 05/03/ November

5 Table 2: Overview: Computer Associates etrust Single Sign-On (SSO) Platforms Supported Installed Base Background authentication (PassTicket/AppTicket) support: IBM OS/390 & z/os with Resource Access Control Facility (RACF) or Computer Associates etrust CA-ACF2 or etrust CA-Top Secret Background authentication (One-Time Password) support: Unix OSs, via Pluggable Authentication Modules (PAMs) Password store-and-forward support: Pre-built scripts for many target systems, including: Microsoft Windows 32-bit applications Any Web-based application using forms-based or HTTP-header-based authentication IBM OS/390 & z/os via 3270 High-Level Language Application Programming Interface (HLLAPI) emulators IBM OS/400 via 5250 HLLAPI emulators Unix OSs via Telnet emulators Additional platforms can be supported through custom scripts, which can be created automatically or manually by the organization or CA. Over 2 million users in 408 organizations worldwide. By region: North America: 180 organizations Latin America: 20 Europe, Middle East, Africa (EMEA): 152 Asia/Pacific: 56 Table 3: Features and Functions: etrust SSO: Identity Management User Definition User Groups A record in the etrust SSO database defines each user. The user record contains information such as: The user s full name; The times the user is allowed to log in; The target systems that the user is allowed to access; The list of groups to which the user belongs. The user ID for a user in the etrust SSO database is the ID used for primary authentication and so must match the user ID in the primary authentication server for example, a MS Windows 2000 username. A user record also contains multiple instances of login info, one for each target system, comprising: User credentials for that target system: login name and password Statistical information: last login, first login, login count and last password change. etrust SSO administrators can also define user groups to simplify administration and maintenance. Access rights assigned to a group apply to all users in that group. Access rights assigned to specific users take precedence. 12 November

6 Table 3: Features and Functions: etrust SSO: Identity Management User Registration Target-System User Name Assignment An organization can populate the etrust SSO database from information already present in existing enterprise systems. etrust SSO provides a number of methods to extract this information and use it to load the etrust SSO database. User information is typically already present in: Operating systems, such as Windows NT/2000 and Novell NetWare; Groupware, such as Lotus Notes or SAP; Enterprise management tools; Computerized employee records. To use existing data for an initial load of the etrust SSO database, an organization can employ third-party management tools or build selang scripts (batch files) and load them into the etrust SSO database. Login info for a target system is created in one of two ways: An administrator enters the information in the user record before the user s first login to the system. An administrator must do this for ticket-based systems. The user creates the login info during the first login to the system via etrust SSO. Table 4: Features and Functions: etrust SSO: Interfaces Target System Interface Passwords Other User Credentials etrust SSO uses a ticket-based approach to effect SSO: After successfully verifying the user s identity, the Primary Authentication Agent creates an SSO ticket. This is a data object that includes user identification and a time stamp which is valid for a defined period. The Agent encrypts the ticket and sends it to the Client on the user s workstation. The Client caches the ticket and sends it to the Server. The Server retrieves from the database a list of target systems the user may use and sends this to the Client. (Depending on the workstation OS and configuration, the Client can display this list as application icons, a program group or as a part of the MS Windows Start menu.) When the user selects a target system, the Client sends the SSO ticket and the target system identifier to the Server. The Server validates the ticket and sends the Client the necessary login dialogue and login data. The Client then executes the login dialogue. The login dialogues, which are written in an extended set of the Tcl scripting language, provide the instructions for the Client to simulate the actions of a user logging into the target systems. The Client executes the login dialogue to enter the login data retrieved from the database into the proper fields in the target systems login window or screen. The Client communicates with an Application Agent on the target system. The Client receives the required ticket or one-time-password (OTP) from the Server and forwards it to the Agent. etrust SSO supports: OTPs on Unix operating systems; IBM PassTickets on RACF, etrust CA-ACF2 and etrust CA-Top Secret; Proprietary AppTickets on RACF or etrust CA-ACF2. 12 November

7 Table 4: Features and Functions: etrust SSO: Interfaces User Desktop etrust SSO provides different types of SSO Client installation: Batch Installs all the etrust SSO Client components needed for normal operation on the end user s workstation. Custom Allows you to determine a number of installation parameters. The SSO Client can also be installed using a third-party software distribution tool, if a response file is prepared and distributed together with the standard SSO Client software. Table 5: Features and Functions: etrust SSO: Authentication Methods Operating System Password etrust SSO Password OTP Tokens Certificates and Smart Cards Biometrics Open Authentication Toolkit etrust SSO can check the user s login to Microsoft Windows NT/2000 or Novell NetWare, via an etrust SSO Primary Authentication Agent. etrust SSO can prompt a user for an SSO-specific username and password, via the Server component. Optionally, etrust can simultaneously sign the user to a Microsoft Windows NT/2000 or Novell NetWare network and authorize the user to use etrust SSO. etrust SSO can use third-party OTP security servers from Rivest-Shamir-Adelman (RSA) Security (with RSA SecurID tokens) and Secure Computing (with SafeWord tokens). Supports all X.509-compliant PKI systems. etrust SSO supports Iridian s iris recognition technologies. Also, via SAFLINK s SAF Module for Computer Associates etrust SSO (SAF/etrust) plug-in, other technologies (fingerprint, face and voice). This provides APIs and code modules to enable administrators, as well as systems integrators and authentication vendors, to develop etrust SSO Authentication Engines (AEs) that communicate between the Client and the authentication device or software and Primary Authentication Agents for the authentication server/host. Table 6: Features and Functions: etrust SSO: Single Sign-On Target-System Password Discovery Target-System Password Change Primary Password Timeout Desktop Locking With the Learn mode enabled, when a user logs in to a target system with etrust SSO for the first time, the Client prompts the user for the username and password for that system. These credentials are automatically saved to the database in the login info for that system in the user s record. etrust SSO automatically handles target system password change. The auto-gen utility can be used to automatically generate random target-system passwords based on password formation rules set by the administrators. etrust SSO limits the lifetime of the SSO ticket. When the ticket expires, the Client prompts the user to re-authenticate that is, to repeat the primary authentication process. etrust SSO Client has a ScreenLock option. When enabled, this locks the user out of the workstation if idle for a specific period. It displays an input box for username and password (or equivalent, depending on what primary authentication method is used) for re-authentication. If re-authentication is successful, the Client unlocks the workstation. 12 November

8 Table 7: Features and Functions: etrust SSO: Security Communications Server/Repository Resilience Scalability The communication between the client and the server is fully encrypted via Triple Data Encryption Standard [3DES] algorithm and El-Gamal key management. Web SSO uses Secure Sockets Layer (SSL) to encrypt the information transmitted between browsers and servers. etrust SSO contains a special version of etrust Access Control that controls access to applications and authentication hosts, updates to the database, and protects the etrust SSO components on the server host. An organization can implement a farm of etrust SSO Servers, each of which backs up and is backed up by all the others. A replication mechanism can be used to ensure that each server will simultaneously update the local database and the databases of all the other servers. A single etrust SSO can support a total population of approximately 65,000 users with concurrent SSO requests. Higher scalability can be achieved using etrust SSO Broker and server farms. Table 8: Features and Functions: etrust SSO: Administration Interface Reporting Local Administration Utilities Tools for administering etrust SSO include: etrust SSO Assistant a MS Windows-based tool that manages the etrust SSO database; selang a command language that controls etrust SSO from a command line interface (CLI) and batch programs; etrust Admin CA s user provisioning tool, which shares the etrust SSO database. CA recommends etrust Audit for full auditing of security events and alerts. An organization can delegate administration at the etrust SSO group level. Group administrators can have either full administration rights or the ability to change users passwords (on etrust SSO and target systems). Group administrators have authority over all users within that group and any levels of subgroups. API toolkit for supporting additional authentication mechanisms. Password enhancing mechanisms including password auto-generation, password enforcement policies and password exits for adding self-defined quality checks according to the needs of the security policy. Table 9: Features and Functions: etrust SSO: Auditing Event Logging Log Archiving Reporting Alerting etrust SSO provides audit capabilities to allow all user login activity to be recorded and stored for later retrieval. SSO auditing includes user logins, access to the etrust SSO Server, requests for application lists, failed login attempts and more. Audit logs may be forwarded to etrust Audit which provides for full reporting and archiving of log data. Audit log reports can be generated via the seaudit tool (part of the embedded etrust Access Control product). An organization can also create reports via CA s etrust Audit tool. etrust SSO provides alerting based on configurable criteria. 12 November

9 Table 10: Features and Functions: etrust SSO: System Requirements Directory Server (etrust SSO Server) Unix: HP-UX 10.x or 11.x IBM AIX 4.1.x, 4.2, or 4.3 Sun Solaris 2.5.1, 2.6 (SPARC & X86), 2.7 (SPARC) Microsoft Windows NT4 SP3 or 2000 Server etrust SSO Primary Microsoft Windows NT Authentication Agent NT4.0 Novell NetWare NetWare 3.12 or 4.x Novell NetWare Client must be installed on the end-user workstation rather than standard NetWare client from Microsoft RSA Security RSA SecurID, Secure Computing SafeWord HP-UX 10.x IBM AIX 4.x Sun Solaris 2.x (SPARC or UltraSPARC) Entrust Sun Solaris 2.x (SPARC or UltraSPARC) etrust SSO Broker Unix: HP-UX 10.x IBM AIX 4.1.x or 4.2 Sun Solaris 2.5.1, 2.6 (SPARC & X86) Microsoft Windows NT4 SP3 or 2000 Server OTP Agents HP-UX 10.x IBM AIX 4.x SunSolaris2.x IBM PassTicket RACF Agents etrust CA-Top-Secret (TSS) 5+ CA etrust SSO RACF AppTicket Agents etrust CA-Top-Secret (TSS) 4.4+ Administrator Microsoft Windows 95, Windows 98, Windows NT 4.0 Workstation or Windows 2000 Workstation (etrust Professional SSO Assistant) Client Microsoft Windows 95, Windows 98, Windows NT 4.0 Workstation or Windows 2000 Professional Analysis While CA has sold more licenses for its Unicenter SSO product than for etrust SSO, etrust SSO is its flagship SSO product. CA plans to integrate the two products within the next year, so that the new etrust SSO product will benefit from the additional features (for example, support for billing codes) that Unicenter SSO offers. etrust SSO fits into CA s Identity Management portfolio that also includes the following products: etrust Admin CA s provisioning product, etrust Admin simplifies administration of users and resources across heterogeneous security systems and directories. etrust PKI Provides strong authentication of users and management of public-key certificates across the enterprise. 12 November

10 etrust Directory A multiprotocol solution for large-scale directory service applications. etrust SSO has a worldwide customer base, with many organizations supporting up to 20,000 users. Some of its largest implementations include a university (with 10,000 users), hospitals (5,000, with biometric primary authentication), a bank (14,500), a telco (13,500) and a government agency (about 10,000). Server-Based SSO etrust SSO s architecture is based on a dedicated etrust SSO Server and database. While this approach gives the organization another user repository to manage, where other leading SSO products can use an existing corporate directory, it can be shared by other etrust identity and access management (IAM) products. Once an organization loads information into the database, these products can all read and update the shared database for their separate and common purposes. An organization can use an etrust SSO utility or its CLI to load user and group information from existing databases and directories, but this is still an implementation step that is not required in v-go SSO or SecureLogin SSO. This approach requires a separate management regime, and etrust SSO includes several management tools, including a command line language, the etrust SSO Assistant (a graphical user interface), and the etrust SSO Web Assistant. An organization can also integrate etrust SSO with management tools such as CA s etrust Admin. etrust SSO also allows distributed management: certain users can be designated as group or password managers to reduce the administrative burden on central administrators. Nonproprietary Scripting Language etrust SSO login dialogues support login schemes ranging from target-systems native passwords to tickets. They are written in an established scripting language, Tcl, with some proprietary extensions, where SecureLogin SSO uses a proprietary language. CA s approach might reduce the organization s training requirement where Tcl is already in use. The login dialogues are designed to provide compatibility with almost all network environments and target systems. An organization can define SSO methods for almost any Windows, Terminal Server, mainframe, Unix, Internet or intranet target system. The dialogues are stored and secure filed on the same server host as the etrust SSO database, (but in a separate directory rather than the database itself) to ensure support for single-point administration and manageability. Range of Primary Authentication Options etrust SSO supports a range of primary authentication options, including strong authentication methods, out of the box. As with v-go SSO and SecureLogin SSO, an organization can use network operating system passwords for etrust SSO primary authentication; etrust SSO also offers its own, independent password mechanism. etrust SSO offers built-in support for strong authentication methods such as OTP tokens (from RSA Security and Security computing), public-key certificates and smart cards, and biometrics (Iridian s iris recognition). Further biometrics can be used via SAFLINK s SAF Module for Computer Associates etrust SSO (SAF/etrust) plug-in. etrust SSO also allows custom integration via its Open Authentication Toolkit. This provides APIs and code modules to enable organizations to use other authentication methods/devices. SSO Improves Security 12 November

11 As with other SSO products, etrust SSO allows the organization to implement strict password policies across all target systems. An organization can use etrust SSO s auto-gen utility to automatically generate random target-system passwords based on password formation rules set by the administrators. These generated passwords are more complex, and hence more secure, than users would normally use or remember. Random passwords can create a big problem if the etrust SSO server is unavailable if users don t know their target system passwords, they cannot login directly. etrust SSO cannot provide a persistent local credentials cache. once the user logs off, the target system passwords are unavailable. Alternatively, etrust SSO can keep passwords for target applications synchronized with the primary authentication password, addressing such requirements as remote access with a single password. Organizations also have the option to designate mission-critical applications as sensitive, which requires users to re-authenticate themselves with their primary authentication method before they can access these applications. This can stall an opportunist attack on a sensitive application when the user has left his or her workstation unattended but is still signed on. SSO Reduces Costs CA estimates that by giving each user only one password to remember can eliminate up to 85 percent of password problems, as it will not be forgotten as often. This reduces both lost user productivity and calls to the organization s help desk (which Gartner Research estimates can account for upwards of 30 percent of all help desk calls). CA states that customers generally see 100 percent return on investment (ROI) in 12 to 18 months. Secure Credential Storage All users credentials are stored centrally in the etrust SSO database. But etrust SSO offers a higher level of security for the credentials repository than other SSO products through the use of dedicated server and a bundled version of CA s etrust Access Control product. Support for User Mobility etrust SSO stores all login information on the etrust SSO Server to centrally support roaming users. This means that several users can use the same PC and work well with SSO. In addition, the SSO Familiar Desktop provides re-login capabilities for shared PCs. etrust SSO does not, however, maintain local caches of SSO credentials to allow users to access target systems when disconnected from the corporate network. Ease of Deployment etrust SSO is a complex product, and CA estimates that a typical implementation project for 1,000 users will take three to six months, while a project for 50,000 users will take between six months to one year. CA offers service packages to streamline implementation and ensure rapid ROI. Pricing CA offers per user licensing with discounts for tiered quantities. Table 11: Price List: etrust SSO Product 100 users (US$) 1,000 users (US$) 10,000 users (US$) 100,000 users (US$) etrust SSO 75 per user 50 per user 35 per user 20 per user 12 November

12 CA can offer additional discounts for 1 million or more users. Maintenance: 20 percent of the license cost is charged annually for a minimum of three years. Support includes unlimited telephone and incidents and software upgrades. GSA Pricing Yes. Competitors CA s etrust SSO competes directly with other SSO products, and, more broadly, with authentication management infrastructure (AMI) products that offer SSO alongside centralized management of multiple authentication methods and flexible authentication policies. Table 12: Competitors ActivCard Inc. Trinity Internet: BioNetrix Systems Corp. BioNetrix Authentication Suite (BAS) and BioNetrix SSO Internet: Passlogix, Inc. v- GO SSO Internet: Protocom Development Systems SecureLogin Internet: Ankari s Trinity AMI product supports multiple authentication schemes, including memorized passwords, RSA SecurID, smart cards and biometrics (fingerprint only). It also supports a wide range of platforms including Unix and IBM mainframe operating systems and groupware such as Lotus Notes. SSO functionality is integrated with the core product. BioNetrix s BAS supports multiple authentication schemes, including memorized passwords, smart cards and various biometrics, but no one-time password tokens. It also supports a wide range of platforms but not Unix or IBM mainframe operating systems. It allows user re-authentication to be built into workflow applications for transaction security. A separately licensed product, BioNetrix SSO, adds SSO functionality, but by itself the only supported primary authentication method is memorized passwords. Passlogix s v-go provides SSO via a client-oriented architecture that supports roaming and offline access. Its modular primary authentication allows an organization to use Windows network passwords, PKI (Entrust, RSA Keon) passwords, graphical user passwords, or strong authentication methods such as smart cards and biometrics. It supports a wide range of Windows, Web and terminal-emulated target systems via Wizards. Novell used to offer this product under license as Novell Single Sign-On (NSSO). Protocom s SecureLogin provides SSO via a directory-oriented architecture that supports roaming and offline access via local caching. It supports a range of primary authentication methods including Windows or NetWare network passwords and strong authentication methods such as smart cards and biometrics. It supports a wide range of Windows, Web and terminal-emulated target systems via pre-built and custom scripts. Novell offers this product under license as Novell SecureLogin. Strengths Server-Based Architecture Eases Manageability and Improves Security etrust SSO s architecture provides easy manageability. Administrators can manage everything centrally on etrust SSO Server via a range of administration tools. CA also supports levels of distributed administration. 12 November

13 etrust SSO also benefits from the additional security provided by the version of etrust Access Control bundled with it. Built-In Support for Strong Authentication Methods etrust SSO provides out of the box support for OTP password tokens and smart cards. It also supports Iridian s iris recognition technology, but other biometric technologies (fingerprint, face and voice) require an additional third-party product (SAF/etrust) or custom integration via etrust SSO s Open Authentication Toolkit. Non-Proprietary Scripting Language etrust SSO s use of login dialogues scripting language maximizes its versatility. Dialogues can be used to keep software implementation at the client level so backend servers don t have to be touched, and the target system code doesn t have to be changed. (Agents can be used for a more secure interface for example, OTPs, PassTickets.) etrust SSO dialogues are written in Tcl (with some extensions) which, especially if they already use Tcl, may make it easier for an organization s technical staff to use than a proprietary scripting language. Limitations Requires a Dedicated Server and Database etrust SSO requires its own dedicated server and database, rather than leveraging an existing corporate directory (or MS Windows NT domains). While this has some advantages in improved security and interoperability with other etrust IAM products, and CA offers a range of good management tools, it does impose a management overhead on an organization that is looking for a stand-alone SSO product. Scripting May Be a Barrier for Some Organizations Although etrust SSO s login dialogues provide a flexible target-system interface using an industrystandard scripting language, and CA offers many pre-built scripts, some organizations may be averse to a scripting approach. etrust SSO doesn t offer script-generating tools to address this limitation. Insight CA etrust SSO is a robust server-based SSO product, and CA claims over 400 production implementations, many of 5,000 to 20,000 users. Its requirement for a dedicated server and database, and the consequent management overhead will deter some organizations, but it does give benefits in both manageability especially when used in conjunction with CA s other IAM tools such as etrust Admin and security via an embedded version of etrust Access Control. etrust SSO supports password storeand-forward via Tcl scripts with no need for software on the target system as well as more robust (but technically more challenging) OTP and ticket-based mechanisms. It provides out of the box support for a variety of primary authentication methods including OTP tokens, smart cards and biometrics. CA etrust SSO will be a good choice for some medium-to-large enterprises, especially those looking to use strong authentication. 12 November

Protocom Development Systems SecureLogin Single Sign-On (SSO)

Protocom Development Systems SecureLogin Single Sign-On (SSO) Ant Allan Product Report 18 October 2002 Protocom Development Systems SecureLogin Single Sign-On (SSO) Summary Protocom SecureLogin SSO addresses the problems of multiple target-system passwords through

More information

Passlogix v-go Single Sign-On (SSO)

Passlogix v-go Single Sign-On (SSO) Ant Allan Product Report 3 October 2002 Passlogix v-go Single Sign-On (SSO) Summary Passlogix v-go SSO supports many enterprise and Web target systems via script-less client software. Its simple architecture

More information

Research. Identity and Access Management Defined

Research. Identity and Access Management Defined Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

Authentication: Password Madness

Authentication: Password Madness Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

CA SiteMinder SSO Agents for ERP Systems

CA SiteMinder SSO Agents for ERP Systems PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security

More information

Passlogix Sign-On Platform

Passlogix Sign-On Platform Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

NetIQ Chariot and Application Scanner for Application Performance Management

NetIQ Chariot and Application Scanner for Application Performance Management John Inverso Product Report 29 September 2003 NetIQ Chariot and Application Scanner for Application Performance Management Summary NetIQ Chariot tests network equipment by generating application-layer

More information

The Four "A's" of Information Security

The Four A's of Information Security Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also

More information

IBM Tivoli Access Manager for Enterprise Single Sign-On

IBM Tivoli Access Manager for Enterprise Single Sign-On Deliver seamless access to applications with an easy-to-deploy solution IBM Single Sign-On Highlights Help simplify the employee experience by eliminating the need to remember and manage user names and

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Security solutions Executive brief. Understand the varieties and business value of single sign-on. Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies

More information

Unicenter Remote Control r11

Unicenter Remote Control r11 Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

Administration Guide. SecureLogin 8.0. October, 2013

Administration Guide. SecureLogin 8.0. October, 2013 Administration Guide SecureLogin 8.0 October, 2013 Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN

More information

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing

More information

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Benefits of an Industry Standard Platform for Enterprise Sign-On white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed

More information

Citrix MetaFrame Password Manager 2.5

Citrix MetaFrame Password Manager 2.5 F E A T U R E S O V E R V I E W Citrix MetaFrame Password Manager 2.5 Citrix access infrastructure provides on-demand access to information, and Citrix MetaFrame Password Manager makes that information

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

etoken TMS (Token Management System) Frequently Asked Questions

etoken TMS (Token Management System) Frequently Asked Questions etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution

More information

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309

More information

TFS ApplicationControl White Paper

TFS ApplicationControl White Paper White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory W H I T E P A P E R C E N T R I F Y C O R P. M A Y 2008 Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory The Active Directory-Based Single Sign-On Solution

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

Single Sign-On Access Management A Technical Framework on Access Management Systems

Single Sign-On Access Management A Technical Framework on Access Management Systems Single Sign-On Access Management A Technical Framework on Access Management Systems Polaris Software Lab Ltd., 766, Anna Salai, Chennai, INDIA 600 006 Single Sign-On Access Management Service This paper

More information

Mobile Admin Security

Mobile Admin Security Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing

More information

Oracle Desktop Virtualization

Oracle Desktop Virtualization Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on

More information

ProtectID. for Financial Services

ProtectID. for Financial Services ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2

More information

Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.

Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved. ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

Web Express Logon Reference

Web Express Logon Reference IBM WebSphere Host On-Demand Version 10 Web Express Logon Reference SC31-6377-01 IBM WebSphere Host On-Demand Version 10 Web Express Logon Reference SC31-6377-01 Note Before using this information and

More information

Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016

Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016 Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016 The World s Changed What is my account balance? The World s Changed Internal Security Standards

More information

Advanced Authentication

Advanced Authentication Architecture Overview Authasas Advanced Authentication Strong Authenticating to Novell edirectory using Domain Services for Windows November, 2011 Authasas Advanced Authentication Asterweg 19D12 1031 HL

More information

RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide

RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

Directory-enabled Lights-Out Management

Directory-enabled Lights-Out Management Directory-enabled Lights-Out Management white paper Abstract... 2 Remote management products... 2 Business needs... 3 Customer environment... 3 Benefits... 3 Directory architecture... 4 Overview... 4 Objects...

More information

An Oracle White Paper Sep 2009. Buyer s Guide for Enterprise Single Sign On

An Oracle White Paper Sep 2009. Buyer s Guide for Enterprise Single Sign On An Oracle White Paper Sep 2009 Buyer s Guide for Enterprise Single Sign On Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

Choosing an SSO Solution Ten Smart Questions

Choosing an SSO Solution Ten Smart Questions Choosing an SSO Solution Ten Smart Questions Looking for the best SSO solution? Asking these ten questions first can give your users the simple, secure access they need, save time and money, and improve

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

IBM Tivoli Identity Manager

IBM Tivoli Identity Manager Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces

More information

identity management in Linux and UNIX environments

identity management in Linux and UNIX environments Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual

More information

MQ Authenticate User Security Exit Overview

MQ Authenticate User Security Exit Overview MQ Authenticate User Security Exit Overview Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada [email protected] http://www.capitalware.com Table of Contents 1INTRODUCTION...1

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white

More information

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines

More information

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is intended

More information

Server-based Password Synchronization: Managing Multiple Passwords

Server-based Password Synchronization: Managing Multiple Passwords Server-based Password Synchronization: Managing Multiple Passwords Self-service Password Reset Layer v.3.2-004 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax:

More information

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1

More information

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

Mobile Admin Architecture

Mobile Admin Architecture Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile

More information

Citrix Password Manager Using the Account Self-Service Feature. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition

Citrix Password Manager Using the Account Self-Service Feature. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition Citrix Password Manager Using the Account Self-Service Feature Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition 2 Citrix Password Manager - Account Self-Service Copyright

More information

Deriving a Trusted Mobile Identity from an Existing Credential

Deriving a Trusted Mobile Identity from an Existing Credential Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile

More information

www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013

www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013 www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Troux Configuration Management Software

Troux Configuration Management Software Sharon Fisher Product Report 5 December 2003 Troux Configuration Management Software Summary With the Troux Blueprinting System, Troux hopes to help create a new market with software to map an information

More information

CA SiteMinder. Implementation Guide. r12.0 SP2

CA SiteMinder. Implementation Guide. r12.0 SP2 CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com

More information

Oracle Access Manager. An Oracle White Paper

Oracle Access Manager. An Oracle White Paper Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any

More information

BMC CONTROL-M Agentless Tips & Tricks TECHNICAL WHITE PAPER

BMC CONTROL-M Agentless Tips & Tricks TECHNICAL WHITE PAPER BMC CONTROL-M Agentless Tips & Tricks TECHNICAL WHITE PAPER Table of Contents BMC CONTROL-M An IT workload automation platform... 1 Using standard agent-based scheduling... 1 Agentless scheduling... 1

More information

Strong Authentication for Microsoft TS Web / RD Web

Strong Authentication for Microsoft TS Web / RD Web Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Exploiting the Web with Tivoli Storage Manager

Exploiting the Web with Tivoli Storage Manager Exploiting the Web with Tivoli Storage Manager Oxford University ADSM Symposium 29th Sept. - 1st Oct. 1999 Roland Leins, IBM ITSO Center - San Jose [email protected] Agenda The Web Client Concept Tivoli

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

Single Sign-On. Security and comfort can be friend. Arnd Langguth. [email protected]. September, 2006

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006 Single Sign-On Security and comfort can be friend. Arnd Langguth [email protected] September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate

More information

Citrix Password Manager Evaluator s Guide. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition

Citrix Password Manager Evaluator s Guide. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition Citrix Password Manager Evaluator s Guide Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition 2 Citrix Password Manager Evaluator's Guide Copyright and Trademark Notice

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003 Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

IBM Lotus Domino Document Manager 6.5.1

IBM Lotus Domino Document Manager 6.5.1 Collaborative document management for the enterprise IBM 6.5.1 Highlights Provides high-value, low-cost Manages documents for document management for IBM Lotus Notes, Microsoft organization-wide applicability

More information

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,

More information

Citrix and Terminal Services Guide SecureLogin 8.1

Citrix and Terminal Services Guide SecureLogin 8.1 Citrix and Terminal Services Guide SecureLogin 8.1 September, 2015 www.netiq.com/documentation Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn.

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

An Introduction to Entrust PKI. Last updated: September 14, 2004

An Introduction to Entrust PKI. Last updated: September 14, 2004 An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In

More information

Citrix Password Manager Administrator s Guide. Citrix Password Manager Citrix Password Manager 4.5 Citrix Access Suite

Citrix Password Manager Administrator s Guide. Citrix Password Manager Citrix Password Manager 4.5 Citrix Access Suite Citrix Password Manager Administrator s Guide Citrix Password Manager Citrix Password Manager 4.5 Citrix Access Suite Copyright and Trademark Notice Use of the product documented in this guide is subject

More information

CA Harvest Software Change Manager

CA Harvest Software Change Manager CA Harvest Software Change Manager Implementation Guide Release 12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information