Protocom Development Systems SecureLogin Single Sign-On (SSO)

Size: px
Start display at page:

Download "Protocom Development Systems SecureLogin Single Sign-On (SSO)"

Transcription

1 Ant Allan Product Report 18 October 2002 Protocom Development Systems SecureLogin Single Sign-On (SSO) Summary Protocom SecureLogin SSO addresses the problems of multiple target-system passwords through directory-based SSO with optional passtickets, a flexible scripting language and script-generating Wizards. Table of Contents Overview Analysis Pricing Competitors Strengths Limitations Insight List Of Tables Table 1: Overview: SecureLogin Table 2: Features and Functions: SecureLogin: Identity Management Table 3: Features and Functions: SecureLogin: Interfaces Table 4: Features and Functions: SecureLogin: Authentication Methods Table 5: Features and Functions: SecureLogin: Single Sign-On Table 6: Features and Functions: SecureLogin: Security Table 7: Features and Functions: SecureLogin: Administration Table 8: Features and Functions: SecureLogin: Auditing Table 9: Features and Functions: SecureLogin: System Requirements Table 10: Price List: SecureLogin Password Management Suite Table 11: Competitors List Of Figures Figure 1: SecureLogin SSO Network Diagram Figure 2: SecureLogin Advanced Authentication for LAN and Remote Access Gartner Entire contents 2002 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 Corporate Headquarters Protocom Development Systems Australia Street Address: 7 Phipps Close Deakin ACT 2600 Australia Postal Address: PO Box 1101 Tuggeranong Mail Centre ACT 2901 Australia Tel: Fax: [email protected] Internet: Overview Protocom s SecureLogin Single Sign-On (SSO), or SLSSO, provides SSO to virtually all Windows, Java, custom, midrange and mainframe target systems as well as intranet and Internet sites. It can detect password expiry and generate random replacements that conform to an organization s security policy. It is the main component of Protocom s SecureLogin Password Management Suite, which also includes: SecureLogin Advanced Authentication (AA) Provides a flexible authentication architecture that can support multiple strong authentication hardware and software products. SecureLogin Self-Service Password Reset Allows users to reset their own network passwords without calling the help desk. SecureLogin SSO SLSSO can leverage an organization s established directory Microsoft Windows 2000 Active Directory, Novell NDS/eDirectory, NT Domains, stand-alone or any LDAP-compliant directory, such as Sun ONE. SLSSO makes three schema extensions: the user, organization and organizational unit objects are assigned extra attributes that are used to store SecureLogin data. (Novell edirectory with SecretStore is handled somewhat differently.) SLSSO can also work with Microsoft Windows NT enterprisewide information is stored in a file location defined by the administrator, and user-specific information is stored ineachuser shomedrive. 18 October

3 SLSSO supports two methods of SSO to target systems: background authentication and password-storeand-forward. The first method, background authentication, operates with components on both the server and the client. During background authentication, when the user attempts to access the system, the client component communicates with the server component. The user is authenticated through a secure handshake process. The second, and more commonly used, method of SSO is the password store-and-forward method. The user s authentication credentials are stored securely and forwarded by SLSSO to the target system as required. The user is not prompted for a user ID or password. The user s log-in credentials are entered by SLSSO. It will appear to the user as though they are no longer required to log in to a target system. SLSSO allows administrators to define which target systems are to be enabled for single sign-on. This option gives the organization: Full control of which target systems can be used for single sign-on. The ability to update the entire directory database with a new target-system application definition by updating a single object. Figure 1: SecureLogin SSO Network Diagram 18 October

4 Administration SLSSO can be administered from the server or the workstation. A central administrator can create and store scripts in the directory, and set preferences on Container and User Objects, allowing all users in and beneath each container to inherit rights to the application definition. Scripts at the Container Object level are called Corporate Scripts. Corporate Scripts allow SSO to be enabled for all corporate target systems without touching them. An administrator can also administer SLSSO at the User Object level, to allow each user s SSO configuration to be customized to suit individual needs. Users themselves can, if permitted by an administrator, use the Workstation Administration Tool to manage log-ins. SecureLogin Advanced Authentication 18 October

5 SecureLogin Advanced Authentication (SLAA) is a suite of authentication modules for LANs (Microsoft Windows, Novell NetWare), Unix servers, IBM mainframes and RADIUS servers. Implementing SLAA enables support of additional authentication methods: Fingerprint Smart cards Onetime-password (OTP) hardware tokens OTP software tokens SLSSO client authentication SLAA supports hardware from most of the major vendors. SLAA also provides the same range of authentication methods for dial-in users via any RFC2138-compliant RADIUS server and a Dial-Up Networking (DUN) Dialer Replacement. Administrators manage users authentication information through integration with a directory and its associated management tool, as for SecureLogin SSO. SLAA can be deployed independently or in conjunction with SLSSO to provide primary authentication via a strong authentication method. Figure 2: SecureLogin Advanced Authentication for LAN and Remote Access 18 October

6 Table 1: Overview: SecureLogin Version SecureLogin v3 Date Announced GA June October

7 Table 1: Overview: SecureLogin Platforms Supported Backgound authentication (passticket) support: IBM OS/390 and z/os with either RACF or Computer Associates etrust CA-ACF2 Unix OSes, via Pluggable Authentication Modules (PAMs) Novell NetWare RADIUS Password store-and-forward (script) support: Prebuilt scripts for many target systems, including: Microsoft Windows 32-bit applications. Any Web-based application using forms-based or HTTP-header-based authentication. IBM OS/390 and z/os via 3270 HLLAPI emulators. IBM OS/400 via 5250 HLLAPI emulators. Unix OSes via VBA-enabled and non-vba emulators. Healthcare applications (including HBO StarNavigator, Lawson and Meditech). Microsoft Terminal Server. Citrix MetaFrame. NfuseElite. Lotus Notes (requires Lotus Notes SSO DLL). Additional platforms can be supported through the scripting Wizard provided with SLSSO which can automatically create corporate application definitions, or scripts can be manually customized by the organization or Protocom. Installed Base Over 1.1 million users worldwide: 1,050,000 users of SLSSO alone, with 50,000 users using both SLSSO and SLAA. By region: North America, Canada and Latin America: 200+ customers and over 500,000 users EMEA: 150+ customer and over 500,000 users Asia/Pacific: 20+ customers and over 100,000 users Table 2: Features and Functions: SecureLogin: Identity Management User Definition User Registration Target-System User Name Assignment SLSSO does not maintain its own user repository. Not applicable. SecureLogin discovers each user s IDs across all target systems as each one is accessed. Table 3: Features and Functions: SecureLogin: Interfaces Target System Interface SLSSO supports two methods of SSO to target systems: background authentication and password-store-and-forward. 18 October

8 Table 3: Features and Functions: SecureLogin: Interfaces Background Authentication Password Store-and- Forward SLSSO background authentication works through the use of passticket authentication that requires software components on client and target system server: When the user attempts to access the system, the client component communicates with the server component. The server responds with a request for a passticket rather than a request for a password. The client replies to the server s request by providing a passticket. SLSSO supports RACF, etrust CA-ACF2, Unix operating systems and RADIUS servers. For IBM mainframes with for IBM s RACF or CA s etrust CA-ACF2 background authentication requires an interface module. This comprises a Unix System Services application that synchronizes the directory data with the RACF database or ACF2 s InfoStorage and a System Authorization Facility (SAF) validation exit. SLSSO stores the user s authentication credentials in an established corporate directory. Workstation agents read the user s SSO information, interpret the scripts and perform the appropriate function for example, forward username and password to the target system. The user is not prompted for a user ID or password: it appears to the user as though the target system no longer requires a log-in. A user s credentials (and scripts) can also be encrypted and cached on the local workstation to provide fault tolerance and mobile user support and to reduce network traffic. The workstation cache is synchronized each time the user connects to the network. Any changes that are made on the workstation are sent to the directory, and any changes made in the directory are sent to the workstation. SLSSO provides three methods of configuring scripts: Automatically detecting password fields (as described above). After a password field is detected, SLSSO offers to launch its Wizard to configure the target system for SSO. Administrators can create scripts automatically, using the SecureLogin Wizards. The Wizards work with approximately 90 percent of all target systems. For more involved, or highly customized target system log-on processes, administrators can manually write or edit scripts. Protocom Development Systems offers a 24x7 Technical Support Department that can provide assistance to SLSSO customers. 18 October

9 Table 3: Features and Functions: SecureLogin: Interfaces User Desktop There are three SLSSO workstation agents: The Web browser agent provides SSO to Web sites accessed through Microsoft Internet or Netscape. The agent automatically detects a log-in or password field, sets the values for the fields and submits the form to log in to the site. This agent allows SSO with sites using Hypetext Transfer Protocol (HTTP) dialogue authentication. The Windows 32-bit agent provides SSO to the majority of 32-bit window applications running on the user s workstation, as well as Windows 16-bit applications and DOS applications running under Windows. This agent fully automates the log-in process. The Terminal Launcher agent provides SSO to mainframes and other terminal emulator sessions (such as telnet). Terminal Launcher is integrated with terminal emulators that support the HLLAPI interface, VBA, DDE and generic Windows support, and also those that have built-in scripting language support. Almost all terminal emulators can be SSO-enabled using Terminal Launcher. Agent software can be distributed via standard tools, such as Novell ZENworks, SMS, Tivoli, CA Unicenter, and is fully MSI compliant. Table 4: Features and Functions: SecureLogin: Authentication Methods Memorized Passwords Self-Service Password Reset Advanced Authentication Methods Onetime-Password (OTP) Tokens Smart Cards Biometrics SLSSO uses a person s established network OS password as the primary authentication method. In offline mode, it can use either the person s SLSSO passphrase or network OS password. SecureLogin Password Reset provides Web-based reset for established network OS passwords. A person can verify his or her identity using multiple passphrase questions and answers created when they first used SecureLogin. Optionally, a second person can use his or her established credentials to vouch for the requestor. This product can be used alone or in conjunction with SLSSO. SecureLogin Advanced Authentication (SLAA) alone allows the organization to use other authentication methods with LANs, Unix OSes, mainframes, etc. In conjunction with SecureLogin SSO, SLAA allows other primary authentication methods for SSO. VASCO Digipass Any PKSC#11 compliant smart cards Fingerprint devices, including: Precise Biometics. Secugen. 18 October

10 Table 5: Features and Functions: SecureLogin: Single Sign-On Target-System Password Discovery Target-System Password Change Primary Password Timeout Desktop Locking Where password store-and-forward is in use, once an administrator publishes a target system for SSO the next time a user accesses that target systems, SLSSO sees the log-in panel and prompts the user to enter the username and password for that system. The user fills in the username and password and SLSSO encrypts them (with Triple DES) and stores them in the directory. (The next time the target system is accessed, SLSSO retrieves the stored credentials and transparently logs on to the target system.) Administrators can configure SLSSO scripts to detect a failed log-on attempt and display a dialogue box advising of an invalid username and/or password and allowing the user to reenter them. Optionally, SLSSO can display a message advising the user to contact the IT Helpdesk, send SNMP alerts or kill a session. SLSSO accommodates different password change rules and password policies. Administrators can customize password change periods and password policies to meet the organization s requirements for each target system. SecureLogin SSO s Password Policy feature allows administrators to create password policies with rules such as length of password; whether or not to use numerals; repeating, sequential and duplicate characters; number of upper and lowercase; and so on. Administrators can assign a policy to one or many target systems. When a target system requires a new password, SLSSO can either: Generate a random password that conforms to the appropriate password policy. Allow the user to enter a new password (SLSSO enters the user s old password into an old password field if required). Administrators can set time interval for password reauthentication, so that users will authenticate every log-on, once per session or as frequently as desired, to provide some protection against walk-away security breaches. Administrators can also configure sensitive target systems to demand reauthentication. SLSSO activates a screen saver after a period of inactivity, configurable for each user (or for groups of users at the Container Object level). There is a five-second delay between SecureLogin activating the screen saver and locking the desktop. There is an optional audible warning that plays a short tone through the system speaker when the screen saver is activated so that a user who may be looking away from the screen is alerted and can deactivate the screen saver before the screen is locked. Table 6: Features and Functions: SecureLogin: Security Communications Communications between SLSSO components and target systems are encrypted using OpenSSL and Novell International Cryptographic Infrastructure (NICI) for FIPS-140 compliance. 18 October

11 Table 6: Features and Functions: SecureLogin: Security Server/Repository Resilience Scalability SLSSO stores all user credentials target-system usernames and passwords and other SecureLogin information (for example, which target systems are SSOenabled) and other settings in the directory with Triple-DES (3DES). Optionally, SLSSO can also cache the user credentials in an encrypted format on the local workstation. On first use of SecureLogin SSO, the user is prompted to enter a passphrase question and answer combination. The primary use of this passphrase is when the directory is down or unavailable and the user cannot authenticate via a trusted network OS password. The user must supply the passphrase answer before the SLSSO client will unlock the user s data and enable SSO. This passphrase also protects the user s data if an administrator changes the user s network OS password. SecureLogin can detect that the password has been changed by someone other than the user and will prompt for the passphrase answer on the next network log-in, before enabling SSO to target systems. SLSSO employs multiple methods of fault tolerance. One method uses local encrypted caching to ensure that network downtime does not affect single sign-on performance. Even if the corporate network is down, caching enables target system log-ins to continue uninterrupted. A second method uses scripting to cater to different log-in conditions and errors during log-in. A third method is that SLSSO can be configured to replicate throughout the directory, thus eliminating single point of failure and WAN communications exposures. SLSSO leverages the corporate directory and scales to the maximum limit of the directory. (Protocom cites successful tests of SLSSO with more than one billion users.) Table 7: Features and Functions: SecureLogin: Administration Interface Reporting Local Administration Integrated management with Microsoft Management Console (MMC), Novell ConsoleOne, Novell NetWare Admin (NWADMIN), SL Manager for NT Domains and other LDAP-compliant directories, and Protocom s stand-alone tool. In addition, the Workstation Administration Tool is provided for self-service. SecureLogin can produce log files for error checking and SNMP traps to any management console. SecureLogin supports decentralized administration with security delegation. In addition, the Workstation Administration Tool allows a user to: View established target-systems that are single sign-on enabled. Add new target-systems for single sign-on. Modify passwords to established single sign-on enabled target-systems. Change control settings and preferences. Administrators can limit users access to the Workstation Administration Tool at the User or Container Object. 18 October

12 Table 7: Features and Functions: SecureLogin: Administration Utilities Window Finder A component used to find out information about the window that a log-in box is on. Window Finder shows the name of control buttons (for example, OK or Next ) and reveals the button s control ID number. The Window Finder component works with all Windows applications that have generic username and password prompts and with most specialized applications that have very complex log-ins. Login Watcher A utility to assist administrators in gathering information about an target system that they want to enable for SSO. An administrator runs Login Watcher and the target system at the same time, and Login Watcher captures information about the target system and saves that information to a log file. Table 8: Features and Functions: SecureLogin: Auditing Event Logging Log Archiving Reporting Alerting SLSSO provides configurable audit logging of log-on and change password events and error messages. As for host system. As for host system. As for host system. Table 9: Features and Functions: SecureLogin: System Requirements Directory Server Administrator Client Client Novell Directory Services (NDS) on NetWare 4.12 or NetWare 5.1 or later Novell edirectory on NetWare or Windows NT: In the non-secretstore mode, SecureLogin runs against edirectory on any platform. Microsoft Windows 2000 Server or Advanced Server with Active Directory Microsoft Windows NT 4.0 Domains Microsoft Windows NT 4.0 Terminal Server Microsoft Windows XP Server Any server running an LDAP-compliant directory: For example, Sun ONE Identity Server Stand-alone directory OS: Microsoft Windows 95, 98, NT 4.0 Workstation, 2000 Professional or XP Snap-ins: Microsoft Management Console (MMC) Novell Console One or later Novell NetWare Admin (NWAdmin) OS: Microsoft Windows 95, 98, NT 4.0 Workstation, 2000 Professional or XP Browser: Microsoft Internet Explorer 5.01 or later Netscape 4.7.x or later Analysis Protocom Development Systems is a privately owned company with headquarters in Canberra, Australia, with regional offices in Portland, Oregon, U.S.A., and Oostvoorne, NL. Protocom was founded in 1989 and is now incorporated in the U.S., the Netherlands, the U.K., South Africa and Australia. Protocom s 18 October

13 flagship products are SecureLogin and SecureConsole (a secure console management tool for NetWare servers). With the SecureLogin Password Management Suite (SecureLogin), Protocom offers what it calls a holistic approach to password management. Typically, organizations are faced with a choice of single sign-on (SSO) or self-service password reset and/or password synchronization from one vendor. With the SecureLogin, an organization can combine SSO with strong authentication methods and, with the release of SecureLogin 3.03 announced for October 2002, self-service password reset. SLSSO is a stable, mature SSO product backed by partnerships with Novell, Microsoft and Citrix. It has one of the largest deployed user bases in the world, with British Telecom recently purchasing an enterprise license to allow deployment to its 140,000 users. Production implementations include many government offices and other leading private corporations with up to 26,000 users, the largest of which has been using SLSSO for six years. (Protocom can provide details of reference sites on request). Directory-Enabled Single Sign-On SLSSO is designed to work with an organization s established corporate directory, so the organization does not have another server and repository to implement and manage as they would with, say, CA etrust SSO. It supports the most common directory services Active Directory, NDS and Sun ONE and can work with any LDAP-compatible directory. It also supports directory-less Microsoft Windows NT environments. SLSSO data user credentials, target-system scripts, etc. is stored and protected in the directory. When used with Novell s NDS edirectory, SecureLogin can use SecretStore technology to provide an additional level of security. SLSSO stores corporate scripts in a Container Object rather than individual User Objects, so reducing complexity and increasing manageability. Powerful, Flexible Scripting Protocom s proprietary scripting language is another feature of SecureLogin SSO. This simple language is designed to provide compatibility with almost all network environments and target systems. An organization can define SSO methods for almost any Windows, Terminal Server, mainframe, Unix, Internet or intranet target system. SLSSO can handle several versions of one target system, especially important during system upgrades. SLSSO includes a scripting Wizard that can automatically configure new applications, effectively hiding the scripting language from the user. The Wizard has been set up to support a large range of target systems (applications, terminal emulators, etc.) and provides an efficient configuration tool for both administrators and individual users. The scripting language is used in individual target-system scripts to retrieve and enter the correct log-in details. These scripts are stored and secured within the directory to ensure support for single-point administration, manageability and maximum security. Administrators can write and define single sign-on scripts once for the whole organization while still allowing for customized subordinate Container Objects and User Objects. If a subordinate object has a different script for the same target system defined locally, the local copy will be used instead of the version on the higher object. The organization can use the scripting language to automate many log-in processes, such as multipage log-ins and log-in panels requiring other information such as surname and telephone number that can be stored in the directory. The scripting language also contains the commands required to automate password changes on behalf of users and request user input when it is required. The scripting language can also be used to provide transaction verification. SLSSO can watch a target system, recognize transaction screens and prompt the user to reauthenticate before a transaction is 18 October

14 entered. Reauthentication can be driven by data values for example, it can be invoked only for monetary values over a certain value. This approach is easier to implement than an API-based intra-session authentication, but it does not allow the reauthentication event to be recorded with the transaction that is, there s no electronic signature. Range of Primary Authentication Options SLSSO alone supports only memorized passwords. In this case, the password is that normally used to log in to the network OS. By using SLAA in conjunction with SLSSO, an organization can use stronger primary authentication methods, such as VASCO Digipass OTP tokens, smart cards and fingerprint biometrics. This does, however, incur an additional cost. Single Sign-On Improves Security SLSSO allows the organization to transparently implement strict password policies across all target systems. SLSSO can generate more complex, and hence more secure, passwords than users would normally use or remember. In addition, an administrator can change the frequency of password changes to any desired interval, from weeks to every session, with no additional burden on the users. Where target-system passwords are not revealed to the user, security is further increased as users must have access to a system with SLSSO installed to get into the systems. This can be a big problem if the directory is unavailable if user s do not know their target system passwords, they cannot log-in directly. An organization can, however, address this with SLSSO as it can cache the users credentials on their workstations. If memorized passwords are used as the primary authentication mechanism, each user has only one to remember. This password can be made more complex and changed more often (for example, every month) to improve security, without it becoming to onerous for the user to remember. Single Sign-On and Password Reset Reduce Costs If each user has only one password to remember, it will not be forgotten so often, and Protocom and other vendors estimate that this can eliminated up to 80 percent of password problems. This reduces both lost user productivity and calls to the organization s help desk (which Gartner Research estimates can account for upwards of 30 percent of all help-desk calls). With the addition of SecureLogin Password Reset (at an additional cost), an organization can gain the further benefits of self-service password reset other vendors experience shows that about 65 percent of users can resolve their own problems via self-service reset. Protocom is the first vendor to offer selfservice password reset as well as SSO. Secure Credential Storage All users credentials are stored centrally in a corporate directory. In addition to the access control afforded by the host system, SLSSO encrypts all data with Triple-DES (3DES), keyed by a passphrase for each user, which is set when the user first uses SecureLogin SSO. This ensures that systems administrators cannot retrieve the users passwords to any target systems. To prevent systems administrators and help-desk operators from changing a user s primary network OS password, SLSSO users each have a passphrase. SLSSO can identify when someone other than the user has changed the password and will prompt the user for the passphrase before allowing access to any target system. 18 October

15 Support for Roaming and Mobile Users Because SLSSO is directory enabled, users can log in from anywhere on the corporate network and get the same capabilities as if they were at their own desks; roam the enterprise, logging into several different machines during the day; or securely use a shared kiosk-type workstation that is, in healthcare environments, where many people log in temporarily for quick work and then log out. The use of a locally encrypted cache allows all mobile and remote users to use SLSSO regardless of network connectivity. If granted by the administrator, mobile users can update their single sign-on credentials when disconnected from the network and update the directory with these details when they are next attached. Ease of Deployment SecureLogin SSO s use of an established corporate directory makes it easy to deploy. Protocom asserts that a typical implementation project for 1,000 users will take three to six months, while a project for up to 50,000 users with a large number of applications will take between six months and one year. Relationship With Novell Protocom has an OEM relationship with Novell for SecureLogin SSO, which it offers as Novell SecureLogin. The other components of the SecureLogin Password Management Suite are not included. In Novell s deployment, Novell Modular Authentication Service works with SLAA to provide integrated authentication via OTP token, smart card or biometric device. Pricing Protocom offers per-user licensing with discounts for tiered quantities. Table 10: Price List: SecureLogin Password Management Suite Product Price per User (US$) SecureLogin Single Sign-On (AD, NT and LDAP) v SecureLogin transfer from Novell version to other 20 versions SecureLogin AA (Advanced Authentication) when bundled with SecureLogin SSO v1.8 SecureLogin Advanced Authentication Stand-alone Version v1.8 SecureLogin AA for Unix (Solaris/Linux) with background authentication support v2.0 SecureLogin ACF2 and RACF background Authentication modules v1.5 SecureLogin for RADIUS v Included with SLAA Maintenance: Protocom has a standard maintenance contract of 20 percent of the current RRP minus quantity discount price per year. The maintenance agreement provides software upgrades as well as 24- hour technical support. Three months maintenance is included in the initial purchase price of all products. GSA Pricing No. 18 October

16 Competitors SLSSO competes directly with other SSO products. When combined with SecureLogin Advanced Authentication, it competes with authentication management infrastructure (AMI) products. (AMI products typically offer centralized management of multiple authentication methods and flexible authentication policies, sometimes with SSO.) Table 11: Competitors ActivCard Inc. Trinity Internet: BioNetrix Systems Corp. BioNetrix Authentication Suite (BAS) and BioNetrix SSO Internet: Computer Associates, Inc. etrust SSO Internet: Passlogix, Inc. v- GO SSO Internet: Ankari s Trinity AMI product supports multiple authentication schemes, including memorized passwords, RSA SecurID, smart cards and biometrics (fingerprint only). It also supports a wide range of platforms including Unix and IBM mainframe operating systems, and groupware such as Lotus Notes. SSO functionality is integrated with the core product. BioNetrix s BAS supports multiple authentication schemes, including memorized passwords, smart cards and various biometrics, but no onetime password tokens. It also supports a wide range of platforms but not Unix or IBM mainframe operating systems. It allows user reauthentication to be built into workflow applications for transaction security. A separately licensed product, BioNetrix SSO adds SSO functionality, but by itself the only supported primary authentication method is memorized passwords. CA s etrust SSO developed from Memco/Platinum s Proxima provides SSO via a directory-base architecture. It supports a range of primary authentication methods that includes an independent SSO password, network OS passwords, onetime password tokens, smart cards and various biometrics. It supports a wide range of Windows, Web and terminal-emulated target systems via pre-built and custom Tool Command Language (Tcl) scripts. Passlogix s v-go provides SSO via a client-oriented architecture that supports roaming and offline access. Its modular primary authentication allows an organization to use Windows network passwords, PKI (Entrust, RSA Keon) passwords, graphical user passwords, and provides an API to allow the integration of other strong authentication methods, such as smart cards and biometrics. It supports a wide range of Windows, Web and terminal-emulated target systems via Wizards. Novell used to offer this product under license as Novell Single Sign-On (NSSO) with v-go bundle, but this has been discontinued. SecureLogin Password Reset will compete with password management products from Blockade (ManageID Selfserv), Courion (PasswordCourier), M-Tech (P-Synch) and others. While it is not a fully featured stand-alone product, SecureLogin Password Reset will be the first self-service password reset product to be integrated with an SSO product. Strengths Works With Any Corporate Directory SLSSO works with an established corporate directory Microsoft Windows Active Directory, Novell NDS or edirectory, Sun ONE or any other LDAP-compliant directory. An organization does not have an SSOspecific server and repository to manage. Furthermore, there is no lock in to any one directory an organization can easily migrate SLSSO from, say, Active Directory to complete user transparency. Directory-Based Architecture Eases Manageability and Customization 18 October

17 SecureLogin SSO s architecture provides easy manageability and customization. Administrators can manage everything centrally and using simple extensions to established directory management tools. As scripts and configurations can be stored at Container Object and User Object levels, administrators can easily create enterprisewide settings, with more specific settings taking precedence at the organizational unit (OU) and user level. This approach also makes it easy to disable SSO for some applications for individual OUs and users by creating null (that is, do nothing ) scripts. SecureLogin Wizard and Versatile Scripting Language The SecureLogin Wizard allows automatic generation of log-in scripts and guides administrators or users through a series of steps to create or modify a new log-in script. If desired, administrators can also use SLSSO s proprietary scripting language to maximize the versatility of the SLSSO deployment. Although it is a proprietary language, it will be easily grasped by anyone familiar with Tcl, Perl or Rexx. SLSSO documentation includes a full Command Reference Guide, and Protocom s Technical Support can provide further guidance. Scripting keeps all software implementation at the client level: an organization does not need to install software on target-system servers or change target-system code. It also gives administrators the flexibility to identify some target systems for advanced authentication, to bring up message boxes that users must respond to, to redirect the user to another URL and so on. Limitations Strong Authentication Methods Require Additional Components SecureLogin Advance Authentication provides out of the box support for strong authentication methods, but at an additional cost. While most organizations will continue to rely on memorized passwords as the primary authentication method, this additional cost (about 25 percent of the SLSSO cost when licensed together) may deter organizations looking to move toward strong authentication. As most organizations will be happy to use only network OS passwords, however, a separate license for the advanced authentication option keeps down the cost of the SSO product. Scripting May Be a Barrier for Some Organizations Although SLSSO s scripting language makes SLSSO extremely versatile and Protocom provides many pre-built scripts, some organizations may be averse to this approach. The SecureLogin Wizard goes a long way toward addressing this problem, however, and an organization should recognize that it can deploy SLSSO effectively in many environments without the need to use the scripting language directly. Insight Protocom s SecureLogin SSO is a flexible, scalable SSO product with many long-term, large (more than 5,000 users) deployments. Its directory-centric architecture can integrate easily with any corporate directory (as well as Windows NT domains), with easy management through snap in components, and provides easy manageability and customization. Its target-system interfaces use a proprietary scripting language. Some organizations may be averse to this approach, but Protocom supplies many pre-built scripts and SecureLogin Wizards that allow administrators to generate additional log-in scripts without having to edit code. An organization can customize scripts to achieve a high degree of tailoring say, to allow organization-specific error handling. SecureLogin Advanced Authentication allows an organization to use smart cards and biometrics with SSO across the whole enterprise or with selected target systems, but this adds about 25 percent to the licensing cost. For many medium to large enterprises, SLSSO will be a sound choice. 18 October

Computer Associates etrust Single Sign-On (SSO)

Computer Associates etrust Single Sign-On (SSO) Ant Allan Product Report 12 November 2002 Computer Associates etrust Single Sign-On (SSO) Summary CA s etrust SSO gives an organization s users a single password instead of multiple passwords to Web and

More information

Passlogix v-go Single Sign-On (SSO)

Passlogix v-go Single Sign-On (SSO) Ant Allan Product Report 3 October 2002 Passlogix v-go Single Sign-On (SSO) Summary Passlogix v-go SSO supports many enterprise and Web target systems via script-less client software. Its simple architecture

More information

Administration Guide. SecureLogin 8.0. October, 2013

Administration Guide. SecureLogin 8.0. October, 2013 Administration Guide SecureLogin 8.0 October, 2013 Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

Passlogix Sign-On Platform

Passlogix Sign-On Platform Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure

More information

IBM Tivoli Access Manager for Enterprise Single Sign-On

IBM Tivoli Access Manager for Enterprise Single Sign-On Deliver seamless access to applications with an easy-to-deploy solution IBM Single Sign-On Highlights Help simplify the employee experience by eliminating the need to remember and manage user names and

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

Choosing an SSO Solution Ten Smart Questions

Choosing an SSO Solution Ten Smart Questions Choosing an SSO Solution Ten Smart Questions Looking for the best SSO solution? Asking these ten questions first can give your users the simple, secure access they need, save time and money, and improve

More information

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016

Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016 Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016 The World s Changed What is my account balance? The World s Changed Internal Security Standards

More information

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing

More information

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines

More information

Research. Identity and Access Management Defined

Research. Identity and Access Management Defined Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from

More information

Server-based Password Synchronization: Managing Multiple Passwords

Server-based Password Synchronization: Managing Multiple Passwords Server-based Password Synchronization: Managing Multiple Passwords Self-service Password Reset Layer v.3.2-004 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax:

More information

Authentication: Password Madness

Authentication: Password Madness Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Benefits of an Industry Standard Platform for Enterprise Sign-On white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed

More information

Centralized Self-service Password Reset: From the Web and Windows Desktop

Centralized Self-service Password Reset: From the Web and Windows Desktop Centralized Self-service Password Reset: From the Web and Windows Desktop Self-service Password Reset Layer v.3.2-007 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200

More information

An Oracle White Paper Sep 2009. Buyer s Guide for Enterprise Single Sign On

An Oracle White Paper Sep 2009. Buyer s Guide for Enterprise Single Sign On An Oracle White Paper Sep 2009 Buyer s Guide for Enterprise Single Sign On Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Citrix Password Manager 4.1

Citrix Password Manager 4.1 F E A T U R E S O V E R V I E W Password Manager 4.1 The access platform provides on-demand access to information, and Password Manager makes that information available with a single logon. Password Manager

More information

Windows Server 2003 Active Directory: Perspective

Windows Server 2003 Active Directory: Perspective Mary I. Hubley, MaryAnn Richardson Technology Overview 25 September 2003 Windows Server 2003 Active Directory: Perspective Summary The Windows Server 2003 Active Directory lies at the core of the Windows

More information

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

Citrix and Terminal Services Guide SecureLogin 8.1

Citrix and Terminal Services Guide SecureLogin 8.1 Citrix and Terminal Services Guide SecureLogin 8.1 September, 2015 www.netiq.com/documentation Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn.

More information

VMware AlwaysOn Point of Care Desktop. with Indigo Identityware software for Fast Access & Strong Authentication with Roaming Desktops

VMware AlwaysOn Point of Care Desktop. with Indigo Identityware software for Fast Access & Strong Authentication with Roaming Desktops VMware AlwaysOn Point of Care Desktop with Indigo Identityware software for with Roaming Desktops Indigo Identityware provides clinical users fast and secure access to their VMware desktop through a fluid,

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

Enhancing Password Management by Adding Security, Flexibility, and Agility IBM Redbooks Solution Guide

Enhancing Password Management by Adding Security, Flexibility, and Agility IBM Redbooks Solution Guide Enhancing Password Management by Adding Security, Flexibility, and Agility IBM Redbooks Solution Guide The number of logins and passwords that employees must manage on a daily basis continues to be a source

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Citrix MetaFrame Password Manager 2.5

Citrix MetaFrame Password Manager 2.5 F E A T U R E S O V E R V I E W Citrix MetaFrame Password Manager 2.5 Citrix access infrastructure provides on-demand access to information, and Citrix MetaFrame Password Manager makes that information

More information

The Encryption Anywhere Data Protection Platform

The Encryption Anywhere Data Protection Platform The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,

More information

Oracle Enterprise Single Sign-on Logon Manager. Installation and Setup Guide Release 11.1.1.2.0 E15720-02

Oracle Enterprise Single Sign-on Logon Manager. Installation and Setup Guide Release 11.1.1.2.0 E15720-02 Oracle Enterprise Single Sign-on Logon Manager Installation and Setup Guide Release 11.1.1.2.0 E15720-02 November 2010 Oracle Enterprise Single Sign-on Logon Manager, Installation and Setup Guide, Release

More information

Directory-enabled Lights-Out Management

Directory-enabled Lights-Out Management Directory-enabled Lights-Out Management white paper Abstract... 2 Remote management products... 2 Business needs... 3 Customer environment... 3 Benefits... 3 Directory architecture... 4 Overview... 4 Objects...

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

Installation Guide SecureLogin 8.1

Installation Guide SecureLogin 8.1 Installation Guide SecureLogin 8.1 November, 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

TFS ApplicationControl White Paper

TFS ApplicationControl White Paper White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets

More information

etoken TMS (Token Management System) Frequently Asked Questions

etoken TMS (Token Management System) Frequently Asked Questions etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution

More information

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7 Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 4 Overview... 7 About SonicWALL Single Sign-On

More information

Citrix Password Manager Administrator s Guide. Citrix Password Manager Citrix Password Manager 4.5 Citrix Access Suite

Citrix Password Manager Administrator s Guide. Citrix Password Manager Citrix Password Manager 4.5 Citrix Access Suite Citrix Password Manager Administrator s Guide Citrix Password Manager Citrix Password Manager 4.5 Citrix Access Suite Copyright and Trademark Notice Use of the product documented in this guide is subject

More information

Single Sign-On. Security and comfort can be friend. Arnd Langguth. [email protected]. September, 2006

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006 Single Sign-On Security and comfort can be friend. Arnd Langguth [email protected] September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved.

CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved. CRYPTOLogon Agent for Windows Domain Logon Authentication Deployment Guide Table of Contents 1. OVERVIEW... 1 1.1 SINGLE AUTHENTICATION MODE (MS-GINA REPLACEMENT)... 1 1.2 DUAL AUTHENTICATION MODE (MS-GINA

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Enterprise Single Sign-on (ESSO)

Enterprise Single Sign-on (ESSO) Reference Code: TA001301SEC Publication Date: August 2007 Author: Alan Rodger TECHNOLOGY AUDIT Enterprise Single Sign-on (ESSO) ActivIdentity BUTLER GROUP VIEW ABSTRACT Enterprise Single Sign On (ESSO),

More information

Citrix Password Manager Using the Account Self-Service Feature. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition

Citrix Password Manager Using the Account Self-Service Feature. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition Citrix Password Manager Using the Account Self-Service Feature Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition 2 Citrix Password Manager - Account Self-Service Copyright

More information

Citrix Password Manager 4.5 Partner and Sales FAQ

Citrix Password Manager 4.5 Partner and Sales FAQ Citrix Password Manager 4.5 Partner and Sales FAQ I. Messaging and Positioning... 2 What is Password Manager?... 2 What is Citrix announcing with the availability of Password Manager 4.5?... 3 Why is Password

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

The Four "A's" of Information Security

The Four A's of Information Security Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also

More information

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including

More information

NetIQ Identity Manager Setup Guide

NetIQ Identity Manager Setup Guide NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

Strong Authentication for Microsoft TS Web / RD Web

Strong Authentication for Microsoft TS Web / RD Web Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Advanced Authentication

Advanced Authentication Architecture Overview Authasas Advanced Authentication Strong Authenticating to Novell edirectory using Domain Services for Windows November, 2011 Authasas Advanced Authentication Asterweg 19D12 1031 HL

More information

5 Day Imprivata Certification Course Agenda

5 Day Imprivata Certification Course Agenda Class time consists of a break in the morning and afternoon as well as an allotted time for lunch. Lengths of breaks are at the discretion of the instructor based on the time to cover material. 5 Day Imprivata

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007

INTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007 INTEGRATION GUIDE DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Citrix Password Manager Evaluator s Guide. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition

Citrix Password Manager Evaluator s Guide. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition Citrix Password Manager Evaluator s Guide Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition 2 Citrix Password Manager Evaluator's Guide Copyright and Trademark Notice

More information

Enterprise Single Sign-On City Hospital Cures Password Pain. Stephen Furstenau Operations and Support Director Imprivata, Inc. www.imprivata.

Enterprise Single Sign-On City Hospital Cures Password Pain. Stephen Furstenau Operations and Support Director Imprivata, Inc. www.imprivata. Enterprise Single Sign-On City Hospital Cures Password Pain Stephen Furstenau Operations and Support Director Imprivata, Inc. www.imprivata.com Application Security Most organizations could completely

More information

Apache Server Implementation Guide

Apache Server Implementation Guide Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Getting Started Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

Unicenter Remote Control r11

Unicenter Remote Control r11 Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features

More information

How To Get A Single Sign On (Sso)

How To Get A Single Sign On (Sso) Single Sign-On Vijay Kumar, CISSP Agenda What is Single Sign-On (SSO) Advantages of SSO Types of SSO Examples Case Study Summary What is SSO Single sign-on is a user/session authentication process that

More information

OVERVIEW. DIGIPASS Authentication for Office 365

OVERVIEW. DIGIPASS Authentication for Office 365 OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility

More information

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05

More information

ID Director for Windows

ID Director for Windows 2016 ID Director for Windows FINGERPRINT AUTHENTICATION FOR MICROSOFT NETWORKS BIO-key International www.bio-key.com Introduction Fingerprint biometrics are commonly deployed by organizations seeking to

More information

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

IBM Aspera Add-in for Microsoft Outlook 1.3.2

IBM Aspera Add-in for Microsoft Outlook 1.3.2 IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Identikey Server Windows Installation Guide 3.1

Identikey Server Windows Installation Guide 3.1 Identikey Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Advanced Functionality Basic Functionality Feature MANAGEMENT Microsoft Management Console Enhanced Connection

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013

www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013 www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Security solutions Executive brief. Understand the varieties and business value of single sign-on. Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies

More information

DIGIPASS Authentication for Windows Logon Product Guide 1.1

DIGIPASS Authentication for Windows Logon Product Guide 1.1 DIGIPASS Authentication for Windows Logon Product Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions,

More information

IBM Security Access Manager for Enterprise Single Sign-On

IBM Security Access Manager for Enterprise Single Sign-On IBM Security Access Manager for Enterprise Single Sign-On Simplify password management, strengthen access security and demonstrate compliance Highlights Achieve faster time to value and higher ROI with

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com

More information

RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide

RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security

More information

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1

More information