An Identity Management Survey. on Cloud Computing
|
|
|
- Kory Ball
- 10 years ago
- Views:
Transcription
1 Int. Journal of Computing and Optimization, Vol. 1, 2014, no. 2, HIKARI Ltd, An Identity Management Survey on Cloud Computing Ardi BENUSI Faculty of Natural Sciences, University of Tirana, Albania Copyright 2014 Ardi BENUSI. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract Identity Management has become a very important topic in the cloud computing environments, where cloud providers need to control usernames, passwords and other information used to identify, authenticate and authorize users for many different hosted applications. All the vulnerabilities seen on non-cloud solutions are now seen in the cloud, but other flavors and issues are introduced. One would be the ability to manage identities of users when sending data to the cloud. Second would be the identity management of users receiving data from the cloud. And third would be identity management when data is moved from cloud to cloud. In this paper some of the known identity management systems are investigated together with some known cloud providers and the effort to standardize their proprietary identity solutions using some of the relevant technologies like Security Assertion Markup Language (SAML), Simple Cloud Solution Management (SICM) etc. Keywords: cloud computing, identity management (IDM), personally identifiable information (PPI), authentication, authorization, single sign on (SSO), federated identity (FID), Software as a Service (SaaS), identity and access management (IAM). 1 Introduction With the cloud invention, information stored locally on a computer can be stored in the cloud, including spreadsheets, presentations, audio, photos, videos, financial statements etc. A cloud user provides sensitive personal information
2 64 Ardi BENUSI (e.g., name, phone number, credit card number, driver's license number, date of birth, etc.) while requesting services from the cloud. Managing the amount of information disclosed to any one party is something that has become increasingly important in terms of personal security. The PII left can be used to identify, contact, or locate a particular user, may be exploited and abused [12]. Handing sensitive data to cloud service provider (SP) is a serious concern. Cloud computing can increase the risks of security breaches. Knowing who has user s personal data, how they are being accessed, and the ability to maintain control over them prevents privacy breaches of PII, and can minimize the risk of identity theft and fraud. IDM is the key to cloud privacy and security but IDM in cloud is more complex than in traditional web-based systems since the users hold multiple accounts with different SPs or with a single SP [1]. In this paper different IDMs are analyzed together with various implementations from known cloud providers like Google, SalesForce, Amazon, Microsoft etc. 2 Digital identities solutions in the Cloud An identity is a set of unique characteristics of an entity: an individual, a subject, or an object. An identity used for identification purposes is called an identifier [14]. Just as in the real world, different digital identities are used in different contexts. It's common, for instance, to associate different information with each identity. An identity that is used in Amazon might allow access to credit card numbers, while one used with MySpace.com does not. The rules for getting each identity are also different. Getting a digital identity at Amazon is easy: just make up a username and password. Getting a digital identity at work is probably somewhat more difficult, since, at a minimum, it requires the approval of the administrators who run company's network. Entities may have multiple digital identities. An Identity Management System (IDM) supports the management of these multiple digital identities. It also decides how to best disclose PII to obtain a particular service [5]. Despite their diversity, digital identities all have one important thing in common: when transmitted on the network, every digital identity is represented by some kind of security token. A security token is just a set of bytes that expresses information about a digital identity. A simple security token might include only a claim containing a username, while a more complex one might include claims containing a user's first name, last name, home address, and more. Security tokens for some digital identities might also include claims that contain sensitive information such as credit card numbers. Some information is provided in order to prove that these claims really do belong to the user who's presenting them. One simple way to do this is to send a password along with the claims. A more powerful approach is to digitally sign all or part of the claims by using a private key, and then provide the corresponding public key, perhaps wrapped in a certificate. The security tokens that represent digital identities must provide some
3 An identity management survey on cloud computing 65 kind of proof that allows a receiver of the token to verify that this token really does represent the person or organization with that identity [9]. The interaction of users/entities with IDMs and SPs is shown in figure 1: 1) Identity provider (IdP). It issues digital identities. 2) Service provider (SP). It provides services to user/entities that have required identities. 3) User/Entity. Have to claim who they are prior of accessing services in the cloud. 4) Identity management. A third trusted party used to manage digital identities. Figure 1 Identity Management System Based on this general idea of a third party to trust when validating digital identities, many IDM solutions have come to play and some are discussed next. A. Windows CardSpace When a CardSpace-enabled application or website wishes to authenticate a user, it requests a particular set of claims from the user. The user selects an InfoCard to use among the ones visually presented to him, and the CardSpace software contacts an IdP to obtain a digitally signed XML security token that contains the requested information, which is communicated to the requesting application. A user might rely on an application that supports CardSpace, such as a Web browser, to access any of several relying parties. It might also be able to choose from a group of identity providers as the source of the digital identity presenting those relying parties. Whatever choice is made by the user, the basic exchange among these parties has three steps: First, the application gets the security token requirements of the relying party (RP) that the user wishes to access. This information is contained in the RP's policy, and it includes things such as what security token formats the relying party will accept, and exactly what claims those tokens must contain. Second, once it has the details of the security token this RP requires that the application passes this information to CardSpace, asking it to request a token from an appropriate IdP. And third, once this security token has been received, CardSpace gives it to the application, which passes it on to the RP.
4 66 Ardi BENUSI RP can then use this token to authenticate the user or for some other purpose [6, 13]. Figure 2 Interaction between user, IdPs and RP in CardSpace IDM A drawback in CardSpace is that the user still needs to rely on an IdP providing that certificate to the RP, thus the user needs to trust the IdP. In case of a compromised IdP the digital identity is compromised too. Another drawback is the judgment of the user in trusting the RP certificate and sometimes, in the CardSpace framework RPs with no certificates at all are used. B. PRIME Privacy and Identity Management for Europe PRIME s approach uses private credentials which enable proving one s authorization (e.g., to be over 18 years old) without revealing information that may identify the individual. These private credentials are derived from certificates issued on different pseudonyms of the same person. Multiple private credentials can be created from a single certificate that are neither linkable to each other nor to the issuance interaction in which the master certificate was obtained. Private credentials provide accountability while protecting the anonymity of the user as long as there is no misuse in this case the user s anonymity can be revoked. The user-side component uses protocols for getting IdP endorsements for claims to RPs. Anonymous credentials are provided using an identity mixer protocol (based on the selective disclosure protocol) that allows users to selectively reveal any of their attributes in credentials obtained from IdP, without revealing any of their information. The credentials are then digitally signed using a public key infrastructure. Users in PRIME are used to intuitively decide what to tell whom according to the specific situation. As an example data required in professional life are different from what is needed in private life, and in a book store other data are relevant than in the sports club. Nobody gets to know the complete identity of a person, instead only specific partial identities can be perceived. The same drawback as in CardSpace is the trust in a third party (TTP) IdP [9].
5 An identity management survey on cloud computing 67 C. Open ID With Open ID multiple digital identities are controlled with a single username and password called OpenID. Receiving a user name and password from a TTP OpenID, the user interacts with an RP providing only OpenId credentials. Upon being discovered by the RP, the OpenID provider authenticates by prompting a password and asks the user whether the RP should be trusted to receive the necessary identity details for the service. After accepting, the user is redirected to the RP along with the credentials, which need to be confirmed by the RP to provide service. Verifying OpenID account, authentication is considered successful, and the user is considered logged in to the RP under the identity specified by the given OpenID [7]. As in many IDMs, phishing in OpenID is of great concern. Even if passwords may be not transmitted with the security token, an attacker may trick the user into accessing the phisher's site and that site might accept any security token the user provided asking for information such as a credit card number. The phisher wouldn't learn the user's password from the faked site, but he/she might learn other useful things. [11]. D. Entity Centric Approaches The traditional application-centric IDM model requires that each application keeps trace of entities that use it like for example, a tree of users together with a set of policies for user provisioning/de-provisioning. In cloud computing, entities may have multiple accounts associated with different SPs. Also, entities may use multiple services offered by the same SP. A cloud user has to provide his/her PII, which identifies him/her while requesting services from the cloud. Sharing PIIs of the same entity across services can lead to mapping of PIIs to the entity. The main issue is how to secure PII from being used by unauthorized parties in order to prevent serious crimes against privacy, such as identity theft. A story told in the PRIME movie, illustrates crucial privacy issues on the Internet and shows two simple rules explaining how people can protect themselves in the online world: 1. Separating contexts so that observers cannot accumulate sensitive data. 2. Being cautious when personal data are requested and keeping track of information disclosure [8]. An approach proposed in [1] eliminates the need for a TTP IdP and the need for a trusted host that holds the PPI. In this approach adaptation of Fiat and Shamir Zero Knowledge Proofing protocol, together with Active Bundle (AB) are used to anonymously authenticate entities to SPs. 3 Managing digital identities on cloud SP SAML (Security Assertion Markup Language) SAML is an open standard protocol used to exchange authentication and authorization data between two different security domains. SAML is a secure
6 68 Ardi BENUSI based XML communication mechanism that shares identities between multiple organizations and applications. It has the ability to eliminate most passwords in the cloud and enable SSO, a desired feature since it does not require passwords or logins to each application. Instead of password, application that use SAML, accepts secure tokens which only reveal what is needed to gain access to applications. Since no password exists there is nothing for customers, partners or employees to forget loose or have their passwords stolen. A users signs into his/her company network with corporate credentials and when clicks a link to access applications or secure content at the SP, the IdP generates a secure token to be sent to SP. The token grants accesses to applications and content, but does not pass any information that can be used by anyone else to access them [10]. SSO Service for Google Apps IDM in Google is an entity-centric model that provides partner companies with full control over the authorization and authentication of hosted user accounts that can access web-based Google applications. The SAML model is used making Google partners act as IdPs controlling usernames, passwords and other information used to identify, authenticate and authorize users for web applications hosted on Google. Here is how the SAML model works on Google [4]: 1. The user attempts to reach a hosted Google application or service. 2. Google generates a SAML authentication request. The SAML request is encoded and embedded into the URL for the partner's SSO service. 3. Google sends a redirect to the user's browser. The redirect URL includes the encoded SAML authentication request that should be submitted to the partner's SSO service. 4. The partner decodes the SAML request and extracts the URL for both Google's ACS (Assertion Consumer Service) and the user's destination URL. The partner then authenticates the user. Partners could authenticate users by either asking for valid login credentials or by checking for valid session cookies. 5. The partner generates a SAML response that contains the authenticated user's username. This response is digitally signed with the partner's public and private DSA/RSA keys. 6. The partner encodes the SAML response and returns that information to the user's browser. The partner provides a mechanism so that the browser can forward that information to Google's ACS. For example, the partner might embed the SAML response and destination URL in a form and provide a button that the user can click to submit the form to Google. 7. Google's ACS verifies the SAML response using the partner's public key. If the response is successfully verified, ACS redirects the user to the destination URL. 8. The user has been redirected to the destination URL and is logged in to Google Apps.
7 An identity management survey on cloud computing 69 Force.com User Management and Sign-on Two primary mechanisms control user access to resources on the Force.com platform: profiles and sharing rules. A profile is a template containing a collection of pre-defined settings that determine what a user can see and do within the platform. Profiles set the basic rules for whether a given user can see and use each application as well as each tab within the application. By default, web access to Force.com is granted by requiring users to provide a username and password that match values stored within Salesforce database. Users are directed to a single form-based sign-in page to enter their credentials. Once users sign in, they can access any Force.com property that is authorized by their profile, including their own applications, Salesforce CRM, Portals, etc. without re-authenticating. When users interact with software that is not running directly on the Force.com platform, the software creates a session on behalf of the user, and uses that session to communicate with the platform. In order to do this, the software usually prompts the user for their login credentials and stores those credentials. The platform also requires that any external application connecting to the platform sends a security token on behalf of the user. In order to control the risk of password compromise, the Force.com platform provides two alternatives for user sign-on [2]. 1. Delegated authentication where an organization sets up a client web service called a delegated authority (DA) that replaces the mechanism for all sign-in. Users must first authenticate to their enterprise and the enterprise must then create a session to SalesForce by sending in the URL the username and a token to Salesforce for validation by the DA. Once this has occurred, the user may travel between cloud and the company without re-authentication. 2. Federated Authentication. The Force.com platform is able to natively validate SAML assertions and create a session for the users when appropriate. Compared to delegated authentication, which requires the organization to host a service which makes proprietary API calls, SAML can securely send PPI without proprietary coding. In Federated Authentication the company must implement or trust a SAML IdP before using cloud service. Federation to Amazon Web Services (AWS) AWS added support for SAML. This feature enables federated SSO which lets users sign in to AWS console or make programmatic calls to AWS API-s by using assertion from a SAML compliance IdP like Active Directory Federation Services (ADFS). By using AWS IAM role, instead of creating AWS accounts for all corporate users, AWS roles may be created and mapped to roles in Active Directory. The AWS IAM role may have various policies that control access to AWS resources like for example EC2 or S3 and these policies may be mapped to an IdP that the company trusts. The authentication process is then invisible to user since SSO is implemented together with IAM role [3].
8 70 Ardi BENUSI 4 Conclusions Cloud identity management may be viewed as having three different aspects. One would be IDM to the cloud being able to send something from the enterprise to the cloud. The second would be IDM from the cloud being able to send something that exists somewhere else back to the enterprise. And the third would be identity management within the cloud to cloud. Regarding IDM, cloud does add its own set of issues. Almost every cloud SP has its own proprietary identification management system. The identification component has been an afterthought and as such carries a lot of vulnerabilities. There is no clear answer that if IDM is rights in one context, it will be right in another. The term identity and access management has come to play to describe the challenge and many SaaS providers have begun reinventing IAM functions, for instance applying APIs for federation and authentication to achieve something resembling single sign on. The other trend is the emerging market of IAMaaS or IAM as a service, where SPs offer core IAM function to the cloud or from the cloud. On the authentication side, Security Assertion Markup Language (SAML) has been the major winner in terms of federation because it provides for single sign on capability. OpenID Connect (based on the OAuth 2.0 protocol) is also emerging and could be useful. OpenID Connect is a suite of lightweight specifications that provide a framework for identity interactions via APIs. Simple Cloud Identity Management (SCIM) is a protocol that will build upon authentication, authorization, and privacy models with the goal of reducing the cost and complexity of user management operations. References [1] P. Angin, B. Bhargava, R. Ranchal, N. Singh, L. Ben Othmane, L. Lilien, M. Linderman, An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing, 29th IEEE Symposium on Reliable Distributed Systems, (2010). [2] P. Harding, P. Dingle, An Overview of Force.com User Management and Sign-on, SalesForce Developers Technical Library, (2014). anagement_and_sign-on [3] AWS Identity and Access Management, Amazon Web Services, Inc. or its affiliates, (2014). [4] Google Apps Platform, Google Developers, (2013). on
9 An identity management survey on cloud computing 71 [5] S. Clauß, M. Köhntopp, Identity management and its support of multilateral security, Computer Security, 37 (2011). [6] W. Alrodhan, C. Mitchell, Improving the Security of CardSpace, EURASIP Journal on Information Security, (2009). [7] D. Recordon, D. Reed, OpenID 2.0: A platform for user-centric identity management, Proc. of the second ACM workshop on Digital identity management, (2006), [8] R. Leenes, J. Schallaböck, M. Hansen, PRIME white paper, (2008), df [9] M. Hansen, A. Schwartz, A. Cooper, Privacy and Identity Management, Security & Privacy IEEE, 6 (2008). [10] J. Hughes, E. Maler, Security Assertion Markup Language (SAML) V2.0 Technical Overview, (2005). [11] S. Sun, K. Hawkey, K. Beznosov, Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures, Computers & Security, 31 (2012). [12] S. Pearson, Taking account of privacy when designing cloud computing services, Proc. CLOUD '09 of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, IEEE Computer Society, (2009). [13] V. Bertocci, G.Serack, C. Baker Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities, Addison-Wesley, US, [14] S. Rieger, User-Centric Identity Management in Heterogeneous Federations, Fourth International Conference on Internet and Web Applications and Services, (2009). Received: May 1, 2014
Privacy in Cloud Computing Through Identity Management
Privacy in Cloud Computing Through Identity Management Bharat Bhargava 1, Noopur Singh 2, Asher Sinclair 3 1 Computer Science, Purdue University 2 Electrical and Computer Engineering, Purdue University
Digital Identity Management
Digital Identity Management Roohul Halim Syed Atif Shaharyar Email: {rooha433, syesh740}@student.liu.se Supervisor: Anna Vapen, {[email protected]} Project Report for Information Security Course Linköpings
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT. How to Create a Frictionless, Secure Customer Identity Management Strategy
SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT How to Create a Frictionless, Secure Customer Identity Management Strategy PART 1: WHAT IS SAML? SAML in Context Security Assertion Markup Language
An Efficient Windows Cardspace identity Management Technique in Cloud Computing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 61-66 An Efficient Windows Cardspace identity Management Technique
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
An Anti-Phishing mechanism for Single Sign-On based on QR-Code
An Anti-Phishing mechanism for Single Sign-On based on QR-Code Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David
SWIFT: Advanced identity management
SWIFT: Advanced identity management Elena Torroglosa, Alejandro Pérez, Gabriel López, Antonio F. Gómez-Skarmeta and Oscar Cánovas Department of Information and Communications Engineering University of
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK
Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Centrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
Samsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
Microsoft Office 365 Using SAML Integration Guide
Microsoft Office 365 Using SAML Integration Guide Revision A Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
Centrify Mobile Authentication Services for Samsung KNOX
Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under
Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)
w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS) To set up ADFS so that your employees can access Egnyte using their ADFS credentials,
Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth
Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth Marcos A. P. Leandro, Tiago J. Nascimento, Daniel R. dos Santos, Carla M. Westphall, Carlos B. Westphall
Cloud Authentication. Getting Started Guide. Version 2.1.0.06
Cloud Authentication Getting Started Guide Version 2.1.0.06 ii Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
QR-SSO : Towards a QR-Code based Single Sign-On system
QR-SSO : Towards a QR-Code based Single Sign-On system Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David Argles School
OpenID and identity management in consumer services on the Internet
OpenID and identity management in consumer services on the Internet Kari Helenius Helsinki University of Technology [email protected] Abstract With new services emerging on the Internet daily, users need
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management
Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540
Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...
Swivel Secure and the Cloud
Swivel Secure and the Cloud Authentication for Cloud Application Abstract This document describes the issues relating to authenticating to cloud applications and how the Swivel authentication platform
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
SAM Context-Based Authentication Using Juniper SA Integration Guide
SAM Context-Based Authentication Using Juniper SA Integration Guide Revision A Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
Addressing threats to real-world identity management systems
Addressing threats to real-world identity management systems Wanpeng Li and Chris J Mitchell Information Security Group Royal Holloway, University of London Agenda Single sign-on and identity management
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
Securing WebFOCUS A Primer. Bob Hoffman Information Builders
Securing WebFOCUS A Primer Bob Hoffman Information Builders 1 Agenda Gain an understanding of the WebFOCUS Architecture Where can security be implemented? Review the internal WebFOCUS repository and resource
SAML Authentication with BlackShield Cloud
SAML Authentication with BlackShield Cloud Powerful Authentication Management for Service Providers and Enterprises Version 3.1 Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCARD
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
WHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO)
WHITEPAPER NAPPS: A Game-Changer for Mobile Single Sign-On (SSO) INTRODUCTION The proliferation of mobile applications, including mobile apps custom to an organization, makes the need for an SSO solution
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Identity Implementation Guide
Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report
KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Security Assertion Markup Language (SAML) Site Manager Setup
Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and
CLAIMS-BASED IDENTITY FOR WINDOWS
CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services
1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
DIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
PingFederate. SSO Integration Overview
PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server This blog will explain how to use Microsoft Azure as a Federated Authenticator for WSO2 Identity Server 5.0.0. In this example
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House
Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006
Siebel CRM On Demand Single Sign-On An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On Introduction... 3 Single Sign-On with Siebel CRM On Demand... 4 Customer Requirements... 4 SSO
Configuring user provisioning for Amazon Web Services (Amazon Specific)
Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re
SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service
Document Version: 1.0 2014-09-01 Content 1....4 1.1 Release s....4 1.2 Product Overview....8 Product Details.... 9 Supported Browser Versions....10 Supported Languages....12 1.3 Getting Started....13 1.4
Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites
Single Sign On (SSO) Implementation Manual For Connect 5 & MyConnect Sites Version 6 Release 5.7 September 2013 1 What is Blackboard Connect Single Sign On?... 3 How it Works... 3 Drawbacks to Using Single
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Configuring Single Sign-on from the VMware Identity Manager Service to Amazon Web Services
Configuring Single Sign-on from the VMware Identity Manager Service to Amazon Web Services VMware Identity Manager OCTOBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Amazon Web
SAML 2.0 SSO Deployment with Okta
SAML 2.0 SSO Deployment with Okta Simplify Network Authentication by Using Thunder ADC as an Authentication Proxy DEPLOYMENT GUIDE Table of Contents Overview...3 The A10 Networks SAML 2.0 SSO Deployment
Copyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
Fairsail. Implementer. Single Sign-On with Fairsail and Microsoft Active Directory Federation Services 2.0. Version 1.92 FS-SSO-XXX-IG-201406--R001.
Fairsail Implementer Microsoft Active Directory Federation Services 2.0 Version 1.92 FS-SSO-XXX-IG-201406--R001.92 Fairsail 2014. All rights reserved. This document contains information proprietary to
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Persona-aware Identity Management (PIdM): Towards a framework for managing persona identity
Persona-aware Identity Management (PIdM): Towards a framework for managing persona identity Sejin (Eva) Choi Supervised by Professor Clark Thomborson A dissertation for the partial fulfilment of Bachelor
Egnyte Single Sign-On (SSO) Installation for Okta
w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Installation for Okta To set up Egnyte so employees can log in using SSO, follow the steps below to configure Okta and Egnyte to work with each other.
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode Haojiang Gao 1 Beijing Northking Technology Co.,Ltd Zhongguancun Haidian Science Park Postdoctoral
