Integrated Approach to User Account Management
|
|
|
- Stuart Griffin
- 10 years ago
- Views:
Transcription
1 Mission Critical Enterprise Systems Symposium 2006 Integrated Approach to User Account Management Kesselman, Glenn and Smith, William Lockheed Martin Mission Services Quest Software Public Sector October 17, 2007
2 Agenda Background Analysis of Options Requirements Considered Architectures Architecture Evaluation Architecture Conclusions Benefits Then What? Proof-of of-concept (POC) POC Conclusions - Implementation Strategy - Results to Date - Conclusion MCES 2007 October Glenn Kesselman and William Smith Page 2
3 Background Multiple Operating Systems Systems configurations which will remain unchanged until the Orbiter retirement Users with the same or different user accounts in different domains Migration from Network Information System (NIS) style domains to the Active Directory (AD) styled domains How to deal with groups privileges - Using a Lockheed Martin provided tool known as become - Using organizational units and personalities - How to roll out» Roll out with new equipment» Phase in on existing equipment» Dealing with unchanged equipment MCES 2007 October Glenn Kesselman and William Smith Page 3
4 Analysis of Options Was it feasible to provide one user ID management system? - Yes, but What options were considered? - Reviewed Light Weight Directory Access Protocol (LDAP) vendor offerings and white papers - Reviewed LDAP newsgroups and blogs - Identified 5 candidate architectures - Industry current best practices said 2 architectures are consistent with industry approaches - Leverage our agreements with our vendors» Questions were posted to Microsoft, Red Hat, Sun, and Quest with respect to LDAP MCES 2007 October Glenn Kesselman and William Smith Page 4
5 Security Requirements User Passwords: - shall be protected / secured when sent over a network - shall be protected / secured as stored on the LDAP server - shall be defined by the user (within guidelines and constraints) - shall have a minimum and a maximum age - shall be checked against a password history record to prevent password reuse - shall generate warnings when the password nears expiration - shall be checked for triviality and ensure minimum standards (defined) are met (minimum number of characters, types, etc.) Accounts shall be locked out with warning messages upon successive login failures. Other System Entry Applications (FTP, Telnet, rsh) ) will continue to use the existing applications password policies. A follow-on on study should be conducted to mitigate application password policy risk acceptance ance MCES 2007 October Glenn Kesselman and William Smith Page 5
6 What Were the Considered Architectures? Parallel Authentication Servers - Both MS Windows and UNIX/Linux Common Authentication Server - Supports both MS Windows and UNIX/Linux from a common platform MCES 2007 October Glenn Kesselman and William Smith Page 6
7 Parallel Authentication Servers Architecture A Separate Management - UNIX/Linux clients authenticate with a UNIX/Linux LDAP server - Windows clients authenticate with a Windows 2003 server - Use the same user ID and password on the Windows and UNIX/Linux systems Architecture B Synchronized - Same as Separate Management, but the LDAP database on the Windows and UNIX/Linux servers are synchronized by external tools and processes MCES 2007 October Glenn Kesselman and William Smith Page 7
8 Common Authentication Server Architecture C Windows AD server - Serves both UNIX/Linux and Windows clients Architecture D UNIX/Linux LDAP server - Serves both UNIX/Linux and Windows clients Architecture E Vintela + Windows AD server - Serves both UNIX/Linux and Windows clients - Vintela option facilitates Kerberized authentication, simpler management, and strict password policy adherence MCES 2007 October Glenn Kesselman and William Smith Page 8
9 Parallel Architecture A PAM = Pluggable Authentication Module DUA = Directory User Agent UNIX/Linux Userid / password Login UNIX/Linux Client PAM DUA LDAP LDAP daemon Dir Svcs User DB A Userid / domain/ password MS Windows Client Login LSASS RFC 1510 MS Windows Server 2003 MS Kerberos V5 MS Active Directory LDAP Microsoft Windows copyrighted LSASS = Local Security Authority Sub-System User DB MCES 2007 October Glenn Kesselman and William Smith Page 9
10 Parallel Architecture B Userid / password Login UNIX/Linux Client PAM DUA LDAP LDAP daemon UNIX/Linux Dir Svcs User DB B Userid / domain/ password MS Windows Client Login LSASS RFC 1510 LDAP MS Windows Server 2003 MS Kerberos V5 MS Active Directory synchronization Microsoft Windows copyrighted User DB MCES 2007 October Glenn Kesselman and William Smith Page 10
11 Common Architecture C Windows LDAP Deployment Architecture Userid / password Login UNIX/Linux Client PAM DUA LDAP C Userid / domain/ password MS Windows Client Login LSASS RFC 1510 LDAP MS Windows Server 2003 MS Kerberos V5 MS Active Directory Microsoft Windows copyrighted User DB MS Windows Based Authentication MCES 2007 October Glenn Kesselman and William Smith Page 11
12 Common Architecture D Linux LDAP Deployment Architecture Userid / domain/ password MS Windows Client Login LSASS RFC 1510 (Kerberos V5) D Microsoft Windows copyrighted UNIX/Linux LDAP Server PADL/Samba/WinBind Userid / password Login UNIX/Linux Client PAM DUA LDAP MIT Athena Kerberos V5 LDAP daemon Dir Svcs User DB UNIX/Linux Based Authentication MCES 2007 October Glenn Kesselman and William Smith Page 12
13 Common Architecture E Windows LDAP Deployment Architecture Userid / password Login UNIX/Linux Client PAM Vintela Agent E MS Windows Server 2003 Userid / domain/ password MS Windows Client Login LSASS RFC 1510 Vintela MS Kerberos V5 MS Active Directory LDAP Microsoft Windows copyrighted MS Windows Based Authentication User DB MCES 2007 October Glenn Kesselman and William Smith Page 13
14 Candidate Architecture Evaluation Factors Highly Available Swingable (Ops to Test & back) Scalable Secure channel to protect authentication Supports customized login application Cross security level information exchange Password History & Aging Userid/Password database is secure User impacts GUI Legacy (non-compliant) Systems Support Product Support Custom Pluggable Authentication Module (PAM) development framework Administration tools are adequate Customizable System administration impacts Administration automation Interoperable Commercial-Off Off-The-Shelf COTS, COTS, COTS MCES 2007 October Glenn Kesselman and William Smith Page 14
15 Candidate Architecture Scorecard Scorecard Highly available Swingable Scalable Secure Channel POS login support Cross Sec Level Info Exchange Password History & Aging Userid/Password DB is secure User impact ACA interface Legacy systems support Product Support Custom PAM framework Adequate Tools Customizable Sysadmin impacts Automated admin Interoperable Estimated Engineering Effort A B C D E m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m m X N/A X m m m No Major Issues Issues With Mitigation Issues Have No Mitigation M X MCES 2007 October Glenn Kesselman and William Smith Page 15
16 Architecture Conclusions Using a single userid/password can be accomplished for a single domain user (i.e. OPS only or Development only) LDAP implementation is feasible with at least 2 defined domains (Operations & Development/Verification) The existing NASA Mission Control Center Systems (MCCS) and subsystems will be supported as part of a planned equipment replacement / upgrade, remain as-is until an equipment replacement occurs, or be migrated as part of an approved change direction Some existing subsystems can be supported with an upgrade The recommended architectures will meet the user password management requirements The candidate architecture D is not feasible and will not be pursued because the Linux LDAP server with samba and win bind cannot provide all the necessary services required by Windows MCES 2007 October Glenn Kesselman and William Smith Page 16
17 Benefits Users have 1 User Identity (ID) and fewer passwords for ALL of the MCCS and subsystems Password policy will be uniform and consistent across systems and subsystems Password change interval will be uniform based upon a NASA Johnson Space Center approved policy This is / was NOT Single Sign On (SSO) - Requesting access to another system or subsystem WILL require the user to provide their User ID and password - The candidate LDAP architectures do not preclude moving to SSO in the future MCES 2007 October Glenn Kesselman and William Smith Page 17
18 POC Scope Then What? DO Proof-Of Of-Concept (POC) - Validate security requirements password syntax, management, expiration, history, etc. - Explore mixed architecture to ensure that a consolidated single product type LDAP server implementation is viable, or prove that the parallel candidate architecture deployment is required. - Install client and server systems, using existing resources to evaluate the possible architectures and products. MCES 2007 October Glenn Kesselman and William Smith Page 18
19 Then What? POC Scope - Facilitate identifying products for the common approach. - Identifying a common PAM configuration to support / authenticate MCCS systems. - Determine if a common schema will support all intended targets. - Verify that emulated environment swings are supported. - Identify administration tools to support LDAP environment. - Report results of POC actions. MCES 2007 October Glenn Kesselman and William Smith Page 19
20 POC Conclusions Architecture B Parallel LDAP Servers (A & B collapsed)» Uses Windows Active Directory (AD) for Windows/2000 and Windows/XP logon clients.» Uses Red Hat Directory Services (RDS) for Linux, Solaris and AIX logon clients.» RDS interfaces with AD keep the userid/password database in synchronization over a secure link. Architecture E Shared LDAP Server (C a variant of E, D infeasible)» Uses Windows Active Directory (AD) for Windows/2000 and Windows/XP logon clients.» Linux/Unix Clients use the Vintela add-on package to authenticate using Active Directory.» No synchronization is required common Windows LDAP server provides one userid/password database. MCES 2007 October Glenn Kesselman and William Smith Page 20
21 POC Conclusions With Architecture B, we found RDS + AD, w/sync:» Did not support the custom operations satisfactorily;» Password strength lies in the individual client PAM s and can vary based on host type;» Installation of the client PAM was not straightforward, but rather error prone;» Some of the user logon messages are missing or very brief in duration. With Architecture E, we found Vintela + AD:» Was simple to install using Red Hat style RPM s;» Provides the messages needed during login processing;» Password policy was uniformly implemented by the Windows AD server;» Performed well during custom operations.» Most COTS oriented solution MCES 2007 October Glenn Kesselman and William Smith Page 21
22 Bottom Line: POC Conclusions Implement Architecture E MCES 2007 October Glenn Kesselman and William Smith Page 22
23 Implementation strategy POC Conclusions - Infrastructure is installed first, then subsystems are brought in i according to outside schedule factors - Common Userid Phase I: Development Systems and Subsystems» Install new AD cluster and migrate Windows 2000/XP clients first» Verify custom login on Linux workstations» Migrate Linux/Unix clients next» Support LDAP testing with early adopters - Common Userid Phase II: Operations Systems and Subsystems» Repeat installation pattern from the Development Systems domain» Support LDAP authentication in equipment replacement devices (Linux workstations and servers)» Implement Windows devices (current and new)» Implement on Unix clients and servers MCES 2007 October Glenn Kesselman and William Smith Page 23
24 Results to date All of the Development Domain s workstations and servers are converted to using the LDAP services based upon the Vintela agents - Caveat:» Some of the systems in the Development and Operations domain do not support PAM and therefore are still managed separately.» Root is managed locally (at the workstation or server). Some of the Operations Domain s workstations and servers are converted to using the LDAP services - Caveat:» Some of the systems in the Operations domain do not support PAM and therefore are still managed separately» Root is managed locally (at the workstation or server)» Roll-out out to the Operations Domain systems and subsystems are being achieved incrementally with equipment replacements or retrofits MCES 2007 October Glenn Kesselman and William Smith Page 24
25 Conclusion The implementation proceeds well with little problems. Quest has been instrumental in the successful implementation and problem resolution. - Problems were resolved at site in some instances with fixes being made in hours or days during the initial testing and roll out to the Development Domain For those systems that are being converted from a NIS based service to a PAM based service, develop a password testing system that user s can try-it before the use-it Educate the user about this service and why it is important MCES 2007 October Glenn Kesselman and William Smith Page 25
26 Conclusion Rolling out a one-size size-fits-all solution will be difficult, because the size will change - For example: If implementation of LDAP services with application authentication is required, then try that first before having the users change to the system. - Test the systems with many high-fidelity users as possible» If you have vocal users, get them to be some of those testers and hopefully advocates. We did not advertise this as a single sign-on solution We did not advertise this as a panacea, just a step forward MCES 2007 October Glenn Kesselman and William Smith Page 26
27 Diverse Systems & Directories Active Directory simplifies the situation for Windows systems, but for non-windows systems, directories and authentication must all be managed separately - Multiple directories - Multiple identities - Multiple logins - Not secure MCES 2007 October Glenn Kesselman and William Smith Page 27
28 Vintela Authentication Services Vintela integrates disparate Unix/Linux/Java identities into one secure Active Directory environment MCES 2007 October Glenn Kesselman and William Smith Page 28
29 Presentation MetaData Metadata Name Metadata Content Abstract Number Subject Additional Contributors Enter the names of people, besides the listed presenter/author, who contributed to the content Keywords Enter additional keywords to supplement search Legend In accordance with CPS-710 Coverage ABS-1559 Integrated Approach to User Account Management Smith, William MCES 2007, Identity Management, Account Management Leave blank or use a legend as specified in CPS Case Studies Audience Track Abstract All Attendees Enabling Infrastructure Agility IT environments consist of both Windows and other platforms. Providing user account management for this model has become increasingly difficult. If Microsoft s Active Directory could be enhanced to extend a Windows identity for authentication services for Unix, Linux, Java and Macintosh systems, then an integrated approach to user account management could be realized. MCES 2007 October Glenn Kesselman and William Smith Page 29
Red Hat Enterprise ipa
Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users
Integration with Active Directory. Jeremy Allison Samba Team
Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,
IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat
IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat What is IPA? A) India Pale Ale B) Identity, Policy, and Audit C) An open source project D) A Red Hat solution offering E) All of the
Integrating UNIX and Linux with Active Directory. John H Terpstra
Integrating UNIX and Linux with Active Directory John H Terpstra CTO, PrimaStasys Inc. [email protected] Slide 1 Agenda Definition of the Integration Problem Technical Background Review of Solution Choices
Active Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac 01.10.2008
Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments Dragos Manac 01.10.2008 Agenda The Need for Identity & Access Management Enterprise IPA Overview Pricing Questions to
Windows Security and Directory Services for UNIX using Centrify DirectControl
SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
identity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
Cross-Realm Trust Interoperability, MIT Kerberos and AD
Cross-Realm Trust Interoperability, MIT Kerberos and AD Dmitri Pal Sr. Engineering Manager Red Hat Inc. 10/27/2010 1 INTERNAL ONLY PRESENTER NAME What is our focus? Traditional view on Kerberos interoperability
Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation
Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation Agenda Overview Components Considerations Configurations Futures Summary What is needed? Thorough understanding components,
Virtualization Case Study
INDUSTRY Finance COMPANY PROFILE Major Financial Institution. BUSINESS SITUATION Internal security audits found that VMware ESX, Red Hat Linux, and Solaris systems lacked an efficient way to control access
Advancements in Linux Authentication and Authorisation using SSSD
Managing an Enterprise Series and Authorisation using SSSD Lawrence Kearney Enterprise Workgroup and Service Analyst e. [email protected] w. www.lawrencekearney.com How SSSD came to our infrastructure
Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
Single Sign-On for Kerberized Linux and UNIX Applications
Likewise Enterprise Single Sign-On for Kerberized Linux and UNIX Applications AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise facilitates the
Likewise Security Benefits
Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers
The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory
W H I T E P A P E R C E N T R I F Y C O R P. M A Y 2008 Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory The Active Directory-Based Single Sign-On Solution
Integrating Linux systems with Active Directory
Integrating Linux systems with Active Directory Dmitri Pal Engineering Director, Red Hat, Inc. Security Camp at BU Agenda Problem statement Aspects of integration Integration options Recommendations Security
ICANWK504A Design and implement an integrated server solution
ICANWK504A Design and implement an integrated server solution Release: 1 ICANWK504A Design and implement an integrated server solution Modification History Release Release 1 Comments This Unit first released
Vintela Authentication Services
Vintela Authentication Services Using One Time Passwords with VAS and RSA SecurID written by Quest Software, Inc. John Bowers White Paper Copyright Microsoft, MS, MS-DOS, MS-Mail, MS-Proxy, Exchange, Microsoft
Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite
WHITE PAPER CENTRIFY CORP. MARCH 2009 Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite Securing and auditing administrative access to the Virtual Infrastructure
Centrify Server Suite Management Tools
SERVER SUITE TECHNICAL BRIEF Centrify Server Suite Management Tools Centrify Server Suite includes - at no extra charge - a powerful set of management tools in all editions: Centrify Identity Risk Assessor
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Active Directory Compatibility with ExtremeZ-IP
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices White Paper Group Logic White Paper October 2010 About This Document The purpose of this technical paper is to discuss how ExtremeZ-IP
OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration
OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration Instructor-Led Training For versions 9.0, 9.01, & 9.10 OVERVIEW This 5-day instructor-led course focuses on advanced administration topics
Red Hat Identity Management
Red Hat Identity Management Overview Thorsten Scherf Senior Consultant Red Hat Global Professional Services Agenda What is Red Hat Identity Management? Main values Architecture Features Active Directory
BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO)
BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO) An introduction Vincent Lasfargues Atrium Customer Engineering Contributors: John Stamps, Murali Balijepally, Karl Miller, Rahul Vedak, Volodymyr
Enabling Active Directory Authentication with ESX Server 1
1 Enabling Active Directory Authentication with ESX Server 1 This document provides information about how to configure ESX Server to use Active Directory for authentication. ESX Server system includes
Enterprise Security: Building On All Your Assets
Covariant Inc. Enterprise Security: Building On All Your Assets Neil Beesley Covariant Inc [email protected] Friday August 10 th 2012 Session: 11369 Part 1: Introduction Security requirements
Choose an IBM WebSphere Application Server configuration to suit your business needs
IBM is the industry s market leading foundation for building, deploying, reusing, integrating and managing applications and services Choose an IBM configuration to suit your business needs Highlights Unparalleled
Recommended Practices for Deploying & Using Kerberos in Mixed Environments
Recommended Practices for Deploying & Using Kerberos in Mixed Environments Introduction This document explores some of the many issues that emerge when deploying and using Kerberos in mixed environments,
Password Policy Enforcer
Password Policy Enforcer Evaluator s Guide V7.6 Copyright 1998-2013 ANIXIS. All rights reserved. ANIXIS, ANIXIS Password Reset, Password Policy Enforcer, PPE/Web, Password Policy Client, Password Policy
Designing a Windows Server 2008 Active Directory Infrastructure and Services
Course Code: M6436 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing a Windows Server 2008 Active Directory Infrastructure and Services Overview During this five-day course, delegates
Extending Native Active Directory Capabilities to Unix and Linux.
Extending Native Active Directory Capabilities to Unix and Linux. Quest Vintela Authentication Services is the Foundation for an Enterprise-wide, Active Directory-based, Identity Management Strategy Written
Integrating Unix and Linux Systems with Active Directory
Integrating Unix and Linux Systems with Active Directory Technical Brief written by Jackson Shaw Senior Director, Product Management - Active Directory Infrastructure Management Quest Software, Inc. Copyright
Implementing a Kerberos Single Sign-on Infrastructure
Implementing a Kerberos Single Sign-on Infrastructure Gary Tagg IT Security Consultant, Tagg Consulting Ltd [email protected] Abstract Kerberos provides secure authentication, single sign-on
Authentication in a Heterogeneous Environment
Authentication in a Heterogeneous Environment Integrating Linux (and UNIX and Mac) Identity Management in Microsoft Active Directory Mike Patnode VP of Technology Centrify Corporation [email protected]
Active Directory Integration Manual
Active Directory Integration Manual Fast and easy roll-out of BackupAgent platforms using Active Directory and web-panels 1. Online Backup for hosters This whitepaper describes the unique and valuable
Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services
Univention Corporate Server Operation of a Samba domain based on Windows NT domain services 2 Table of Contents 1. Components of a Samba domain... 4 2. Installation... 5 3. Services of a Samba domain...
Active Directory and Linux Identity Management
Active Directory and Linux Identity Management Published by the Open Source Software Lab at Microsoft. December 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab.
Vintela Authentication from SCO Release 2.2. Installation Guide
Vintela Authentication from SCO Release 2.2 Installation Guide November 19, 2003 COPYRIGHT (c) Copyright 2003 Vintela, Inc. All Rights Reserved. (c) Copyright 2003 The SCO Group, Inc. Vintela documents
Identity Management: The authentic & authoritative guide for the modern enterprise
Identity Management: The authentic & authoritative guide for the modern enterprise Ellen Newlands, Product Manager Dmitri Pal, Director, Engineering 06-26-15 Goals of the Presentation Introduce Identity
CA SiteMinder. Implementation Guide. r12.0 SP2
CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only
MQ Authenticate User Security Exit Overview
MQ Authenticate User Security Exit Overview Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada [email protected] http://www.capitalware.com Table of Contents 1INTRODUCTION...1
Framework 8.1. External Authentication. Reference Manual
Framework 8.1 External Authentication Reference Manual The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
CAC AND KERBEROS FROM VISION TO REALITY
CAC AND KERBEROS FROM VISION TO REALITY Mil OSS Conference 2011 Dmitri Pal Sr. Engineering Manager Red Hat Inc. Aug 31, 2011 Outline Setting up context... Card authentication now Open issues Pieces of
Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure
Technical White Paper DESKTOP www.novell.com Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure * Using SUSE Linux Enterprise Desktop with Microsoft Active Directory Infrastructure
Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific
Q: Is the challenge required or can pass through authentication be used with regard to automatic login after you login to your corporate domain? A: You can configure the system to pass on the challenge
IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide
IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide Note Before using this
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows
Interoperability Update: Red Hat Enterprise 7 beta and Microsoft Windows Mark Heslin Principal Systems Engineer Red Hat Systems Engineering Dmitri Pal Senior Engineering Manager Red Hat Software Engineering
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA
Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA Alexander Bokovoy May 21th, 2015 Samba Team / Red Hat 0 A crisis of identity (solved?) FreeIPA What is
automates system administration for homogeneous and heterogeneous networks
IT SERVICES SOLUTIONS SOFTWARE IT Services CONSULTING Operational Concepts Security Solutions Linux Cluster Computing automates system administration for homogeneous and heterogeneous networks System Management
Mac OS X and Directory Services Integration
Mac OS X and Directory Services Integration Neha Setia 1 and Tarun Dalal 2 1 M.Tech Scholor, CBS Group of Institutions, CSE Department, MDU Rohtak, India [email protected] 2 Assistant Professor, CBS
WirelessOffice Administrator LDAP/Active Directory Support
Emergin, Inc. WirelessOffice Administrator LDAP/Active Directory Support Document Version 6.0R02 Product Version 6.0 DATE: 08-09-2004 Table of Contents Objective:... 3 Overview:... 4 User Interface Changes...
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for
University of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01
QUESTIONS 1. On page 12 of the RFP, it mentions the use of a Custom Identity Management (IdM) solution. Could you please share with us the platform and nature of the IdM System or any other relevant details,
Implementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley
Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,
Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015
Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is intended
Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist
Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication
Red Hat Enterprise Identity (IPA) Centralized of Identities & Authentication Dmitri Pal Sr. Engineering Manager, Red Hat Inc. Robert Crittenden Sr. Engineer, Red Hat Inc. 05/06/11 Agenda What is IPA? Main
Setting up a DNS MX Record for mail.corp.com p. 327 Installing Fedora on the Front-End Mail Server with the Postfix and SpamAssassin Packages
Introduction Installation and Getting Around p. 1 The Story and the Roadmap p. 2 Installing Windows p. 5 p. xvi Windows Server 2003 + SP1 and Windows XP + SP2: The Right Windows (at Least for This p. 6Book)
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Installation and Configuration Guide. Version 2.6.47
Installation and Configuration Guide Version 2.6.47 Copyright c 2003-2005 Vintela, Inc. All Rights Reserved. Legal Notice Vintela documents are protected by the copyright laws of the United States and
Vintela Authentication from SCO Release 2.2. System Administration Guide
Vintela Authentication from SCO Release 2.2 System Administration Guide November 19, 2003 COPYRIGHT (c) Copyright 2003 Vintela, Inc. All Rights Reserved. (c) Copyright 2003 The SCO Group, Inc. Vintela
Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
Password Management Before User Provisioning
Password Management Before User Provisioning 2015 Hitachi ID Systems, Inc. All rights reserved. Identity management spans technologies including password management, user profile management, user provisioning
LDAP Authentication Configuration Appendix
1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard
Rational Rational ClearQuest
Rational Rational ClearQuest Version 7.0 Windows Using Project Tracker GI11-6377-00 Rational Rational ClearQuest Version 7.0 Windows Using Project Tracker GI11-6377-00 Before using this information, be
Kerberos: Single Sign On for BS2000
Kerberos: Single Sign On for BS2000 Issue April 2011 Pages 6 Overview A Single Sign On system (SSO system) is a system which permits an automatic and convenient, i.e. nonrecurring, logon to various resources
How Cisco IT Migrated to Microsoft Active Directory
How Cisco IT Migrated to Microsoft Active Directory Automated migration and provisioning tools reduce cost of migrating to Active Directory and simplify training and troubleshooting. Cisco IT Case Study
NetIQ Identity Manager Setup Guide
NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
HOBCOM and HOBLink J-Term
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Germany Tel: +49 09103 / 715-0 Fax: +49 09103 / 715-271 E-Mail: [email protected] Internet: www.hobsoft.com HOBCOM and HOBLink J-Term Single Sign-On
Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol
Samba Samba Interoperating with Windows Nick Urbanik Copyright Conditions: GNU FDL (seehttp://www.gnu.org/licenses/fdl.html) A computing department Implements Microsoft s SMB protocol
Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
NT4 PDC Migration to Samba 3
NT4 PDC Migration to Samba 3 John (Jan) H Terpstra, Samba Team [email protected] SambaXP Conference 2003, Göttingen, Germany http: // samba.org/~jht/nt4migration 1 Agenda Understanding Site Objectives Know
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
Mac OS X Directory Services
Mac OS X Directory Services Agenda Open Directory Mac OS X client access Directory services in Mac OS X Server Redundancy and replication Mac OS X access to other directory services Active Directory support
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive
User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources)
User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources) Nature of Document: Guideline Product(s): IBM Cognos 8 BI Area of Interest: Security Version: 1.2 2 Copyright and Trademarks Licensed
