Request for Proposals. Statewide Two Factor Authentication Solution. Addendum #2 October 5, Questions and Responses

Size: px
Start display at page:

Download "Request for Proposals. Statewide Two Factor Authentication Solution. Addendum #2 October 5, 2012. Questions and Responses"

Transcription

1 Request for Proposals Statewide Two Factor Authentication Solution Addendum #2 October 5, 2012 Questions and Responses NOTE: NYeC responses to the questions are in red. Licensing Entity 1. Will the Licensing Entity be in the name of New York ehealth Collaborative (NYeC) or New York State Department of Health? NYeC is the licensing entity. Annual Adoption Projection Target / Users 1. In Section L. Business Model and Pricing, under Solution Costs for Number of Users: Can you estimate, starting in year 2013, your annual adoption rate? Can NYeC provide an estimate for the monthly and annual volume of patients to be proofed? Can NYeC provide an estimate for the monthly and annual volume of providers / provideraffiliated individuals to be proofed? Please specify the number of estimated overall users, as well as the number of daily users you anticipate accessing the service. Do you have a staged user rollout plan and if so, please describe it and how the phases will be released? At this time, NYeC has planned based on annual projection targets. NYeC is currently estimating the following adoption rate by population - Providers : 50, : 100,000 (totaling 150,000) 2015+: 50,000 (totaling 200,000) Patients : 50,000 TFA RFP_Addendum #2_Q&A Page 1 of 14

2 2014: 100, , : 500, Can NYeC provide an estimate of the size of each community of users (patients, providers, administrators, etc.)? NYeC estimates the total provider population to be 200,000 (this includes providers, administrators, nurse administrators, etc.). NYeC estimates the total patient population to be a significant portion of the New York State population. NYeC is mindful of the adoption challenges within the patient community and is anticipating a slower ramp up within this community than with providers. 3. What types of users will have access to SHIN-NY data (provider, clinical staff, administrator, patient, etc.)? NYeC anticipates that authorized users will include providers, clinical staff, administrators, and patients. The authorization to access data will be based on roles defined in the Statewide Policy Guidance. Patients will be allowed access as a means of meeting Meaningful Use 2 (MU2) and engaging them in their healthcare. Proposed TFA Solution Pilot 1. In Section Proposal Evaluation Criteria, a pilot is referenced - can you please clarify? Will the pilot be conducted after the vendor selection or will that pilot be part of the evaluation criteria? From the RFP Page 19 Section 4.3, Demonstrated ability to provide a successful pilot of the vendor s proposed solution with key EMR/EHR systems please define the specific environment and criteria for successful pilot as understood by NYeC. Pilot in this context refers to the proposing vendor s efforts to date in integrating their solution with the EMR/EHR systems. Page Limit 1. NYeC has defined page limits to responses to Sections A through K, but not for Section L. Is there a limit to the number of pages NYS wishes vendors to provide in response to the Business Model and Pricing Section L? That was intentional. The table structure provided should provide sufficient structure to this section. Vendors should provide additional details to clarify the cost details and we believe the vendors will be able to do it in a concise manner. Budget 1. What is the budget for this project? It is up to the vendors to submit a proposed budget that aligns with its proposed solution. Please be reminded that cost is a proposal evaluation criterion. TFA RFP_Addendum #2_Q&A Page 2 of 14

3 EHR/EMR Vendors 1. Will you provide a list of the specific contacts for this project (phone # & ) at each of the vendors? How soon can we get this list? Not at this time. NYeC will share its contacts with the selected vendor. Any pre-work/project reconnaissance is the responsibility of those intending to respond. 2. Which vendors already support TFA options? Please specify. It is our understanding that most vendors (assuming that the reference to vendors means the EHR/EMR vendors) are in various lifecycles of incorporating TFA within their solutions. We believe that the primary impetus to date has been the e-prescribing of controlled substances (EPCS). NYeC expects the Statewide TFA Solution vendor to reach out to the EHR/EMR vendors to assess this in greater detail. 3. Based off of the vendor list in 1.2 to better answer question 3.1 d4, we will need contacts for the complete list of vendors. NYeC expects the Statewide TFA Solution vendors to make this outreach using publicly available information. Once an award has been made, NYeC will work in partnership with the selected vendor to work with EHR/EMR vendors. 4. Does each of the EHR and EMR vendor solutions support SAML integrations? That is NYeC s expectation. 5. How will EHR/EMR vendor integration of TFA solution provided by the responding vendor be enforced by NYeC? Statewide Policy is being changed to require a second factor for access to the SHIN-NY. 6. Are these vendors willing to make code modifications? If not, which ones specifically are not willing to change their code? Yes, that is NYeC s expectation. 7. In section 4.3 fourth bullet point, what are considered key EMR/EHR systems? This information will be shared with the selected vendor. Login 1. Can NYeC provide an estimate of the frequency of login for each community of users (patients, providers, administrators, etc.)? NYeC cannot estimate that with accuracy. However, any solution should factor in the NIST guidelines on persistence of the logon credentials versus the user communities desire for simplified workflow. RHIOs 1. Will all of the Service RHIOs currently managed by NYeC be required to use the new service? NYeC will not require any user group (including Service RHIOs) to utilize the Statewide TFA Solution. We do anticipate that the scale of the solution and the benefits of simplified integration will encourage a significant portion of the state to request these services through NYeC. It needs TFA RFP_Addendum #2_Q&A Page 3 of 14

4 to be noted that given the demands from initiatives such as the Internet System for Tracking Over- Prescribing (I-STOP) Act, the need for TFA will be significant. Also as noted above, Statewide Policy is being changed to require a second factor for access to the SHIN-NY. 2. Does NYeC anticipate vendors supporting TFA for a provider who participates in more than 1 RHIO? 3. Does each Connect RHIO have its own user-store? Contract will be with NYeC for a single user-store. The RHIOs may choose to use the services provided by NYeC or use their own service. 4. Section 1.2 states that some TFA is currently in place, what is currently in place? Some RHIOs have implemented TFA solutions. 5. In the RFP, Page 5 Section 1.3 and Page 9 Section 2.1, the RHIO "Clinical Viewer" is referenced. Is this a single portal architecture accessed by all RHIOs or does each RHIO have a different portal architecture implemented for the Clinical Viewer? In the RFP, Page 9 Section 2.1, what is the number and application architecture for the Service RHIO systems? The system needs to be agile enough to connect to multiple systems. NYeC anticipate upwards of 200 systems that the selected vendor may need to connect with. 6. From the RFP Page 9 The note in Section 2.1of the PDF states The Statewide TFA Solution will NOT need to integrate or interact with systems and solutions that have a native TFA option and can pass a SAML assertion to NYeC Does this mean, the RHIO s or hospitals with a SAML Aware MFA solution in place are out of scope for this RFP and is it assumed that the identities in those RHIO s are in scope for Identity Proofing? Will these institutions become in scope for NYeC during the term of this RFP? 7. From the RFP Page 9 Section 2.1 Use Case #2 states: NYeC will be responsible for needed changes to Service RHIO systems for solution implementation. Can NYeC clarify this statement? Does this mean NYeC will develop software interfaces for interoperability with the EHR systems listed on page 5? NYeC will not be developing the software interfaces for interoperability. The selected vendor will have the responsibility to integrate the EHR systems. The statement was in reference to changes required at the HIE end to accept the assertions passed by the EMR (and other) systems. Ancillary Services 1. Can ancillary services be offered separately in the pricing? Yes Implementation Schedule 1 Can you be more specific about the implementation schedule of the RHIO s? TFA RFP_Addendum #2_Q&A Page 4 of 14

5 In the RFP, Page 13 Section 3.1.J, the RFP states that "The Project Implementation Timeline" should consider a strong desire at NYeC to complete the implementation by the end of 2013." What is meant by "complete the implementation"? -- Should the vendor have completed integration with all EHR/EMR vendors listed on Page 5 Section 1.2? Should the vendor have a solution for integrating with all EHR/EMR vendors listed on Page 5 Section 1.2? The implementation schedule is depended upon the solution selected and the vendor s ability to meet our sense of urgency. NYeC expects the core services to be available within 90 days of project initiation. 2 Is a patient TFA solution required for the initial implementation? 3 What is the plan for user-enrollment? Self-service, manually by admin, or notification to select users for self-serve enrollment? NYeC is expecting the vendors to provide details of the different options that they can offer for user-enrollment. 4 From the RFP Page 9 Section 2.1 Specific workflow and implementation steps will be dependent on the organization and systems involved. Will the Vendor be required to do work flow discovery and business process evaluation of organizations and systems? Please quantify this work effort if not done by NYeC or others. We expect vendors to provide the data flow and any modification that their system adds to the workflow at the organization s end. Contract Term 1. What is the length of the contract; what time period do you want quoted for continuing support such as help desk services and maintenance? While we don t anticipate a 5-year contract, NYeC does want a 5-year TCO. NYeC anticipates a 1- year contract with up to four 1-year renewals. Evaluation Criteria 1. Your evaluation criteria include, Demonstrated ability to provide a successful pilot of the vendor s proposed solution with key EMR/HER system. This criterion indicates a preference for vendors that have specific experience. Please confirm that you will evaluate equally vendors with proven experience delivering large scale identity proofing and credential management solutions. NYeC considers identify proofing and credential management as key components of the solution. Proposing Vendors Partnering/Collaborating 1. Is there a way that RFP respondents can get contact information for other companies who else are planning to respond to the RFP so that we can contact them and discuss forming a team? TFA RFP_Addendum #2_Q&A Page 5 of 14

6 NYeC will not provide this information. Vendors planning on partnering with other companies should identify them on their own. NYeC will consider proposals that include more than one company, but it is important for the applicants to demonstrate prior collaboration. Managed Security Service Providers 1 Is ehealth Collaborative looking at Managed Security Service Providers in order to manage the solution or will they be managing it in-house? NYeC will not be managing this in house. Helpdesk Services 1. Listed under Other services, what type of helpdesk services are you asking about? NYeC is interested in finding out the types of services that the vendor offers. NYeC expects this list to include services such as login failure support, lost token support, basic navigation support, etc. This should also include Tier 3 support that will be required by the technical troubleshooting staff at NYeC. We anticipate that users will make the first call to their local helpdesk or to NYeC (assuming they are using a NYeC HIE portal). The local helpdesk will ascertain whether it is a local issue or a TFA issue. If it is a TFA issue, they would redirect the client to call the selected vendor. Proposal Deadline 1 In the RFP, Page 17 Section 4.1, the "Timeline" requires a response by October 18. Given the complexity of the RFP and response, can NYeC provide two additional weeks to provide a comprehensive response -- extending the response deadline to November 1? Given that NYeC is looking to have a selected vendor in place in early January, extending the timeline is not feasible. ID Proofing and Authentication for Patients / Credentials 1 What level of ID proofing and authentication will be required of patients? Please refer to sections K and E of the RFP for this information. 2. Does NYeC have requirements for the process of issuing/delivering credentials to patients? We are expecting the vendor to provide details of the process for their solution. 3. Does NYeC intend for the vendor to issue credentials to organizations who in turn issue credentials to their members? NYeC anticipates large organizations to be part of the identity proofing process for their staff. As such we believe the organization would pass a list of identify proofed individuals in a format vendor requires and vendor would return that list with appropriate token data for each individual. 4. Does NYeC intend for the vendor to own the patient and/or provider identity across all of the federated identity stores? We anticipate one identity store for tokens. TFA RFP_Addendum #2_Q&A Page 6 of 14

7 5. Does NYeC want the vendor to authenticate the provider s licensure and sanctions as part of identity proofing (especially for e-prescribing)? No. 6. Is NYeC issuing and/or enforcing identity proofing requirements parties that already have a NIST L3 authentication solution? NYeC will validate existing NIST level 3 authentications in place. NYeC will also expect that the authentication solution will be passed in a SAML assertion. 7. Does NYeC intend to offer online/remote identity proofing as a service to interested parties that already have a NIST L3 authentication solution? No, it s not our intention to interfere with an entity s authentication solution. 8. Does NYeC have requirements for credential issuance to the EHR/EMR providers? We expect the vendor to provide the detail. 9. Does NYeC intend to require individual identity proofing for administrators and employees of providers? 10. Will NYeC permit or support the use of shared credentials by multiple individuals, such as administrators within a provider organization? No. 11. Does NYeC have a requirement to establish the validity of a relationship between individuals and organizations, such as an administrator of a provider organization? This is a requirement but the process will need to be defined. 12. Please provide more information about the desired phone support. Do you anticipate requiring a remote identity proofing redress process, user id and password reset, etc.? We anticipate that users will make the first call to their local helpdesk or to NYeC (assuming they are using a NYeC HIE portal). The local helpdesk will ascertain whether it is a local issue or a TFA issue. If it is a TFA issue, they would redirect the client to call the selected vendor. We are interested in finding out the types of services that the vendor offers such as login failure support, lost token support, basic navigation support, etc. 13. Is there a goal to have a single user credential work across organization boundary? Yes, a single second factor across organizational boundaries. IAM Services 1. Given the requirement (Ability to provide a complete enterprise IAM service for establishing and maintaining identities as per NIST ) is NYeC considering acquiring an Identity Management system in conjunction with this RFP? 2. Is NYeC proposing to implement and maintain their own identity management infrastructure (Identity Management, Federation, Directory Services etc.) and data store? We re not proposing to maintain our own IAM structure. TFA RFP_Addendum #2_Q&A Page 7 of 14

8 3. How will the Statewide 2 Factor Authentication environment interface with the NYS Enterprise Identity & Access Management initiative (provided by ITS)? This is to be determined. 4. Will the Statewide 2 Factor Authentication system be hosted at ITS or Dept. of Health? No. NYeC will not host it. NYeC wants the selected vendor to provide the hosting solution. However, NYeC expects to do a security review of the hosting solution. 5. Does NYeC prefer a managed IAM service or an on-site implementation? NYeC will not host on site. 6. Does NYeC expect user provisioning as part of the IAM services? Yes for TFA. 7. How many IAM environments does NYeC expect to be implemented as part of this effort? There will be one production and one test / quality assurance environment Could you please provide more detail on what is in scope within the Identity Access Management requirement? NYeC expect vendors to provide all options available in their solution. Please see section 3.1.e of the RFP. 9. Provide more detail on the scope of the IAM solution requested. For example, maximum number of users. NYeC is currently estimating the following adoption rate by population - Providers : 50, : 100,000 (totaling 150,000) 2015+: 50,000 (totaling 200,000) Patients : 50, : 100, , : 500,000+ Data Sources 1 What data sources will be used to vet/verify the user s identity? Will that be performed by a trusted data aggregator or leverage other authoritative sources? Any measures that satisfy the requirements for irrefutability of identity that meets NIST level 3 standards will be considered. Tokens 1 The RFP states the following requirement: Detail the types of tokens accepted by the proposed TFA solution. Proposed solutions should encompass at minimum one hard and one soft token. Preference will be given to proposed solutions with flexible token requirements. Given the TFA RFP_Addendum #2_Q&A Page 8 of 14

9 expense and logistical difficulties of securing and managing hardware tokens, what are the driving factors that require a hard token? Our analysis of the variety of user locations and systems that may be used for accessing data from the SHIN-NY leads us to believe that a subset of users will demand/require a hard token. We would like this group to be as small as possible given the operational and cost considerations. Preference will be given to vendors who have both. 2. Is NYeC differentiating between a hard token or a hardware token? Not applicable. 3. Would an OTP token on a Smartphone meet the business requirements for a hard token? No. 4 Are you primarily looking for a Soft Token 2 Factor Authentication solution that can integrate with and operate with Hard Token solutions that may already be in use across the architecture? No. NYeC expects the Statewide TFA Solution to provide both the hard and soft token options. 5. On token purchase and management, are you asking for all of our tokens available to be listed within this pricing model? Cloud Based Solution 1. Would NYeC consider the benefits and cost savings available for providing multi-factor authentication and identity management via a cloud based solution? Hosting 1. Does NYeC prefer a proposal for services hosted directly by the vendor, or an on-premise solution at NYeC? NYeC will not host the solution but expects to do a security review of the hosting solution. Data Centers 1. How many data centers do you have and where are they located? Not applicable. 2. Are you open to a turnkey or managed services solution outside your data centers? Others 1. Does NYeC have requirements for processes/standards/technologies for managing federated identities between the vendor, the state, and EHR/RHIO service providers? TFA RFP_Addendum #2_Q&A Page 9 of 14

10 By the time a vendor is selected and a contract is awarded, NYeC will have put in place a provider information system that harmonizes the provider identity across the state. 2. Do you require all selected solutions to be certified by a third party as meeting NIST SP (or any more recent versions to be released) at the point of contract award and/or production golive? Yes, it is preferred. 3. What are the differences in TFA type requirements between HIE access and those required by DEA? Both sources point to NIST as the guideline, so as it relates to this RFP, we don t see where there can be a difference. 4. Are there any specific requirements for e-prescribing, e-molst and Medicaid data access? Not to our knowledge. 5. Is there an existing Web Access Management solution in place that can be leveraged? No. 6 Section 1.2, Page #4, #5 - Describe the authentication mechanisms that are used by each of the named EHR products that are not integrated with current TFA solutions. NYeC expects the Statewide TFA Solution vendors to determine this using publicly available information. Once an award has been made, NYeC will work with the selected vendor in partnership to work with the EHR/EMR vendors. 7 Section 1.2, Page #4, #5 - For example list out the EHR applications and what interface they use to authenticate and the mechanisms they used. Not applicable. 8 Section 1.2, Page #4, #5 - Objective: To determine which applications use inbuilt application authentication or system user/password file for authentication rather than directory based authentication. Not applicable. 9 Section Do the existing TFA solutions SAML communications provide NIST compliance? All TFA solutions in place will be validated for NIST Level 3 compliance prior to being allowed for use once the policy deadline has been set. 10 Can you provide more detail on the Clinical View portal? For example, which Web server, application server, and operating systems, and versions of each are in use? The system needs to be agile enough to connect to multiple systems. 11 Section 1.2 states access via a Service or Connect Model, can you please explain what is meant here? The definitions are provided in Section 1.3: Terms used within the RFP. 12 Section 2.2, are all your application points web based, or client based, or both? Please refer to Section 2.1 of the RFP for details. 13 Section 2.2, what does your internal user network look like. (i.e. AD, Novell, LDAP, Oracle Access Manager)? This should not be relevant for the scope of this RFP. 14 Do you have an existing PKI Infrastructure, and if so, what is it? Yes, for internal support only. TFA RFP_Addendum #2_Q&A Page 10 of 14

11 15 Are you looking for Two Factor Authentication or Identity and Access Management, or both? Both. 16 Does NYeC have an existing/preferred Certificate Authority? NYeC is currently using DigiCert for NHIN Direct certificates. However, it does not imply that they will be leveraged for this. We don t have a preferred CA. 17 What VPN/portal hardware the 2-Factor authentication solution be tied into (Juniper SSL VPN, F5 APM, Citrix Netscaler ver. 10)? NYeC is expecting vendors to tell us their preferred model. 18 Will there be a 3rd party managing the 2-Factor & VPN solution? No, we expect vendor to manage. 19 If the solution supports standards like LDAP what userstore would NYeHealth be standardizing on? Not applicable. 20 Could we get clarification on this statement? (Note: The Statewide TFA Solution will NOT need to integrate or interact with systems and solutions that have a native TFA option and can pass a SAML assertion to NYeC. The use cases below apply only to those implementations where SHIN- NY is being accessed by a system that does not have a TFA solution that meets NIST Level 3 standards.) If someone has a second factor solution that meets NIST level 3 standards, the solution provider selected for this contract will not need to integrate with those systems. 21 In the RFP, Page 9 Section 2.1, "third party applications" are referenced, what are the top 20 common 3rd party applications and their corresponding architecture? The system needs to be agile enough to connect to multiple systems. We anticipate upwards of 200 systems that the selected vendor may need to connect with. 22 In the RFP, Page 9 Section 2.1, "HIE systems" are referenced, which HIE systems or HIEs may require user access to SHIN-NY? Should not matter for the purpose of this RFP. 23 In the RFP, Page 15 Section 3.1.L, does NYeC have enterprise license agreements with IDP, CSP or IAM vendors that may be leveraged? If so, what are the vendor solutions? No. 24 NYeC users may have multiple tokens and affiliation/roles. If so, do you have any requirements of the service provider to accommodate access control of applications and relying parties? No, role based access will be handled by applications. 25 From the RFP Page 9 Section 2.1 Use Cases #1 & 3 use the term widgets as an integration term for integration between the statewide TFA solution and a given EHR solution. What does NYeC mean by the term Widget? A widget can mean anything from a SOAP message to a restful API, to a hardwired connection back to the authentication facility. 26 From the RFP Page 13 Section 3.1.K.21 Ability to support records retention requirements. What specifically the records retention requirements: period, format, and access specifications for TFA that the vendor will provide to NYeC. TFA RFP_Addendum #2_Q&A Page 11 of 14

12 In accordance with our data governance model, the records for positive token authentication must be held for auditing and purposes as specified by law. 27 From the RFP Page 13 Section 3.1.K.18 Ability to support centralized accumulation and management of audit data. What are the specific reporting requirements for TFA that the vendor will provide to NYeC? Upon request, the selected vendor will provide to NYeC the date and time of all successful and unsuccessful authentication events that should include user name, facility, vendor and user details associated with the event. NYeC want vendors to tell us what out-of-the-box reporting options are available within their solution. 28 From the RFP Page 10 Section 2.2 Identify Proofing does NYeC require LOA2 or LOA3 compliant Credentials (per NIST) for Identity Proofing of each individual or does NYeC require basic identity verification to pair with a given MFA credential? Is it possible to receive a breakdown of the LOA2 vs LOA3 populations? (Section 2 Page 8 of the PDF) All users will need NIST LoA3. 29 Are these vendor solutions on premise, in the cloud or a combination of both? Please specify. NYeC will not host on its site. 30 Is there a single patient portal for the entire state? If not, how do each of the vendors map to the patient portals? We expect your solution to be agile enough to support multiple interoperability scenarios. 31 Do all statewide systems and solutions authenticate against a centralized directory? If not, then describe the current process for authentication. No. NYeC expects them all to be able to integrate with a centralized second factor authentication solution. 32 For centralized authentications, what directories and protocols (e.g. active directory, radius, LDAP) are used? We would expect the TFA solution to work with multiple protocols. 33 Are there any NIST FIPS requirements? If so, at what level? We cannot mandate FIPS requirements to the connected clients. It is out of our realm of authority. That being said, FIPS Security level 1 must be met for the use of hard tokens since we anticipate these being used for EPCS. 34 What are the options for deployment for the statewide solution (e.g. cloud, datacenter for the state, private cloud instance? Vendor is responsible for hosting statewide solution. NYeC doesn t have a preference but expects to do a security review of the hosting solution. 35 Certificate authentication is it browser and operating system independent? NYeC has no control over browsers/operating system deployed. 36 Expectation of administrative rights on PC? No expectation of administrative rights. 37 RHIO - expectation that solution can create and consume SAML assertion? No. NYeC expects that if we pass SAML assertions, we could validate certificate and also parse XML to validate that individual was validated using token. 38 Phasing to roll outs? Interim solution during adoption? Up against MU2 timelines. Statewide Policy Guidance will eventually say that you must have TFA in place by a specific date. Not really a phased approach. TFA RFP_Addendum #2_Q&A Page 12 of 14

13 39 Both patients and providers are intended to use this - is there a provision for IDP of patients? Patients are important and it is an integral part of it. Yes, everyone who gets a second factor has to be ID proofed. 40 Are there extra precautions that need to be taken with the general public? Does initial solution have to embrace additional workflow mechanisms that patient IDP would entail or can this be accomplished once the initial rollouts are completed? This is an evolving area for both the vendors and NYeC. We are looking at developing processes, and would like to hear ideas about how the different processes might work. 41 TFA for mobile and other devices - are there additional constraints for mobile and remote devices? What about soft tokens? Latest version of NIST speaks to use of soft tokens. We have not put constraints on soft tokens at this time. 42 What is the anticipated process for syncing the ID management with the provider directories within the SHIN-NY? We are in the process of creating a provider management system that will coordinate data. It is the expectation that there will be some key matching that matches up providers between systems, but weren't planning on doing a direct link because of security. Systems have a way of knowing about each other but not direct knowledge or access of direct data is how it would work. 43 TFA solution requirements table in section 3.1 K references a few items related to single factor. Vendors can disregard items 5 and 6 in the table. 44 TFA solution requirements table in section 3.1.K item 2 has references to both HIE and DEA requirements. Could NYeC clarify the reference? DEA requirements are a bit more stringent and the actual requirements depend upon your solution. For example; HARD TOKENS must comply with FIPS Security Level1, and Biometrics must comply with section of 21CFR. All respondents will need to assert that they can credential for EPCS and should ensure that they are in compliance. Vendors should pay particular attention to their responsibilities in certificate issuance as outlined in 21CFR. 45. Deployment - RHIOs are expected to use centrally deployed or locally deployed? NYeC anticipates that the RHIOs will use the statewide solution. Their hospitals/providers may choose to integrate at different points. 46. What is mission for which NYeC is being granted ARRA funds? What reporting requirements relating to vendor (ARRA) will flow down? To establish the State Health Information Network of New York (SHIN-NY). NYeC s mission is described in greater detail in the RFP and on its website ( It is possible that ARRA funds will also be used to support this contract in which case ARRA-required reporting may need to be passed on the selected vendor. Whether or not this will be required will be discussed with the selected vendor. 47. ID proofing and TFA separately or together? NYeC will not disqualify anyone who bids on a portion of the project. However, NYeC would prefer that they strategically partner with someone who provides the balance of the scope of work. NYeC will first look at those vendors who provide the whole solution and if they are lacking we will then look at those vendors who proposed individual pieces. 48. Hosting: not looking to host any of it - please elaborate: TFA RFP_Addendum #2_Q&A Page 13 of 14

14 We do not want in our data center anything related to the information around the tokens or keys associated with individuals. We will have a lot of data on these individuals and want to keep the information separate. 49. Will there be a user store provided or is that part of the service you are looking for? We are expecting that you will provide the entire solution. When you come to us- the only thing that we have to worry about is our partners having an API that they can reach out to data with. 50. Are you looking for vendor to provide access management or provisioning? No. NYeC is not looking for provisioning. 51. What about web access management? No. They would have their own access management piece that would communicate with authentication for second factor. 52. Timeline: When referring to core services what do you mean? Core services refer to the availability of the widgets that will be required for integration with the systems as described in the use cases in section 2.1 of the RFP. 53. Can an assumption be made that all applications will support RADIUS? No. That cannot be assumed given the landscape of 200 or more systems that need to be supported. 54. Services: once solution is up and running who will manage. What about rollout? NYeC expects the vendor to provide details of their maintenance options along with the associated cost details. Rollout will be a vendor responsibility adhering with the NYeC implementation plan. 55. What about EHR/EMR systems, etc.? Would they host anything? There would be integration but we are expecting a central store. We are not going to put a hardware client in every doctor's office. 56. What if there isn't a central data store? They will have their first factor on premise? That is why we want the second factor centralized. We want a single system that everyone could integrate to. TFA RFP_Addendum #2_Q&A Page 14 of 14

VASCO: Compliant Digital Identity Protection for Healthcare

VASCO: Compliant Digital Identity Protection for Healthcare VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are

More information

Request for Proposals Statewide Two Factor Authentication Solution

Request for Proposals Statewide Two Factor Authentication Solution Request for Proposals Statewide Two Factor Authentication Solution Issued: September 17, 2012 Proposals Due: October 18, 2012 A Letter of Intent to Respond (LOI) to this RFP is required (See Section 4.1)

More information

Request for Proposal (RFP) Supporting Efficient Care Coordination for New Yorkers: Bulk Purchase of EHR Interfaces for Health Information

Request for Proposal (RFP) Supporting Efficient Care Coordination for New Yorkers: Bulk Purchase of EHR Interfaces for Health Information Request for Proposal (RFP) Supporting Efficient Care Coordination for New Yorkers: Bulk Purchase of EHR Interfaces for Health Information ISSUE DATE: April 10, 2013 RESPONSE DUE DATE: May 3, 2013 Region:

More information

SAML for EPCS (Electronic Prescription of Controlled Substances)

SAML for EPCS (Electronic Prescription of Controlled Substances) SAML for EPCS (Electronic Prescription of Controlled Substances) Discussion Slides for review in the OASIS Security Services (SAML) TC August, 2014 DEA Regulation Compliance with New York s istop law-

More information

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with

More information

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com

More information

Qualified Entity (QE) Member Facing Services Requirements

Qualified Entity (QE) Member Facing Services Requirements Qualified Entity (QE) Member Facing Services Requirements Version 1.2 REVISED June 2014 AS DEVELOPED THROUGH THE STATEWIDE HEALTH INFORMATION NETWORK OF NEW YORK (SHIN-NY) POLICY STANDARDS Table of Contents

More information

Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)

Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1) Microsoft Azure Multi-Factor authentication (Concept Overview Part 1) In this Document we will discuss the concept of Azure Multifactor Authentication (MFA) concept, when and how you can use it and what

More information

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Q # 1 RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Under Technical Requirements the following requirement is listed: 2. The solution is cloud-based softwareas-a-service, requiring

More information

A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS)

A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS) A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS) The Federal Drug Enforcement Administration (DEA) regulates prescriptions of controlled substances that have risks for abuse.

More information

RFP 95200, City-Wide Electronic/Digital Signature Solution. Vendor Questions (AFTER Pre-Proposal Conference on March 17, 2015) and Answers (in bold)

RFP 95200, City-Wide Electronic/Digital Signature Solution. Vendor Questions (AFTER Pre-Proposal Conference on March 17, 2015) and Answers (in bold) RFP 95200, City-Wide Electronic/Digital Signature Solution Vendor Questions (AFTER Pre-Proposal Conference on March 17, 2015) and Answers (in bold) Proposal Due Date: Monday, April 6, 2015 1. Per the RFP,

More information

SAML SSO Configuration

SAML SSO Configuration SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting

More information

HIE Services & Pricing

HIE Services & Pricing Services Available at No Cost Health Information Exchange Services & Pricing Package Effective: December 11, 2015 0 Interface Connection Details Services Available at No Cost HealthlinkNY Web Portal The

More information

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA

More information

HIE Services & Pricing

HIE Services & Pricing Services Available at No Cost Health Information Exchange Services & Pricing Package Services Available at No Cost Services Available at No Cost HealthlinkNY Web Portal The HealthlinkNY Web Portal is available

More information

Proposal Document TitleDocument Version 1.0 TitleDocument

Proposal Document TitleDocument Version 1.0 TitleDocument G-Cloud - Strong Authentication Service - Service Definition Proposal Document Author TitleDocument Version 1.0 TitleDocument Document publication date - 02/12/2014 Title Document Classification - Public

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

AT&T Healthcare Community Online - Enabling Greater Access with Stronger Security

AT&T Healthcare Community Online - Enabling Greater Access with Stronger Security AT&T Healthcare Community Online: Enabling Greater Access with Stronger Security Overview/Executive Summary With a nationwide move to electronic health record (EHR) systems, healthcare organizations and

More information

How To Write A Grant For A Health Information Technology Program

How To Write A Grant For A Health Information Technology Program HealthInfoNet s Maine State Innovation Model Testing Model Grant Request for Proposals (RFP) for Behavioral Health Information Technology (HIT) Reimbursement Date of call: February 7, 2014 Questions are

More information

CHAN Health Information Exchange (MPI/HIE) RFP

CHAN Health Information Exchange (MPI/HIE) RFP RESPONSE TO QUESTIONS CHAN Health Information Exchange (MPI/HIE) RFP Question 1 Does CHAN have an interest in Secure Messaging? Yes Answer 2 It appears that you want an on premise solution (hosted) or

More information

CoSign by ARX for PIV Cards

CoSign by ARX for PIV Cards The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response

More information

Proposal No. P16/9921 Records Management Platform

Proposal No. P16/9921 Records Management Platform Answers to Vendor Questions Questions are in black, Answers are in red 1. Please expand on the types of restrictions PCCCD is interested in. Provide what kinds of restrictions your system has the ability

More information

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

YubiRADIUS Deployment Guide for corporate remote access. How to Guide YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult. Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

Use Cases for Argonaut Project. Version 1.1

Use Cases for Argonaut Project. Version 1.1 Page 1 Use Cases for Argonaut Project Version 1.1 July 31, 2015 Page 2 Revision History Date Version Number Summary of Changes 7/31/15 V 1.1 Modifications to use case 5, responsive to needs for clarification

More information

New York ehealth Collaborative. Health Information Exchange and Interoperability April 2012

New York ehealth Collaborative. Health Information Exchange and Interoperability April 2012 New York ehealth Collaborative Health Information Exchange and Interoperability April 2012 1 Introductions Information exchange patient, information, care team How is Health information exchanged Value

More information

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Case Study: Leveraging TPM for Authentication and Key Security

Case Study: Leveraging TPM for Authentication and Key Security Case Study: Leveraging TPM for Authentication and Key Security 09/20/2011 Gautam Muralidharan Manager, Advisory Services PwC Speaker Introduction Gautam is a manager in the Advisory Technology practice

More information

Coordination of Care in the Hudson Valley: Shared Problems and Shared Solutions. CHCANYS Annual Conference October 27, 2013

Coordination of Care in the Hudson Valley: Shared Problems and Shared Solutions. CHCANYS Annual Conference October 27, 2013 Coordination of Care in the Hudson Valley: Shared Problems and Shared Solutions CHCANYS Annual Conference October 27, 2013 1 Agenda What is a Health Home? Technology Charge Care Plan Development: A Collaborative

More information

SINGLE SIGN ON FOR HEALTHCARE PROVIDERS AND CONSUMERS

SINGLE SIGN ON FOR HEALTHCARE PROVIDERS AND CONSUMERS Use Case Summary NAME OF UC: SINGLE SIGN ON FOR HEALTHCARE PROVIDERS AND CONSUMERS Sponsor(s): Michigan Department of Community Health Date: 12/18/14 The purpose of this Use Case Summary is to allow Sponsors,

More information

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly

More information

Identity. Provide. ...to Office 365 & Beyond

Identity. Provide. ...to Office 365 & Beyond Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

McKesson Practice Choice TM Electronic Prescribing of Controlled Substances (EPCS) Frequently Asked Questions

McKesson Practice Choice TM Electronic Prescribing of Controlled Substances (EPCS) Frequently Asked Questions Overview McKesson Practice Choice TM Electronic Prescribing of Controlled Substances (EPCS) Frequently Asked Questions What is EPCS? EPCS stands for Electronic Prescribing of Controlled Substances. Our

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign

More information

HEAL NY Phase 5 Health IT RGA Section 7.1: HEAL NY Phase 5 Health IT Candidate Use Cases Interoperable EHR Use Case for Medicaid

HEAL NY Phase 5 Health IT RGA Section 7.1: HEAL NY Phase 5 Health IT Candidate Use Cases Interoperable EHR Use Case for Medicaid HEAL NY Phase 5 Health IT RGA Section 7.1: HEAL NY Phase 5 Health IT Candidate Use Cases Interoperable EHR Use Case for Medicaid Interoperable Electronic Health Records (EHRs) Use Case for Medicaid (Medication

More information

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including

More information

Use Case Summary NAME OF UC: SINGLE SIGN ON FOR HEALTHCARE PROVIDERS AND PATIENTS. Sponsor(s): Michigan Department of Health and Human Services

Use Case Summary NAME OF UC: SINGLE SIGN ON FOR HEALTHCARE PROVIDERS AND PATIENTS. Sponsor(s): Michigan Department of Health and Human Services Use Case Summary NAME OF UC: SINGLE SIGN ON FOR HEALTHCARE PROVIDERS AND PATIENTS Sponsor(s): Michigan Department of Health and Human Services Date: 02 03 16 The purpose of this Use Case Summary is to

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

Identity: The Key to the Future of Healthcare

Identity: The Key to the Future of Healthcare Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

Total Cost of Ownership Overview ADFS vs OneLogin WHITEPAPER

Total Cost of Ownership Overview ADFS vs OneLogin WHITEPAPER Total Cost of Ownership Overview vs OneLogin WHITEPAPER Are you really going to double down on machines, software and professional services to extend Active Directory (AD)? Executive Summary Are you planning

More information

How to Optimize Epic Clinical Workflows with Imprivata

How to Optimize Epic Clinical Workflows with Imprivata How to Optimize Epic Clinical Workflows with Imprivata Imprivata OneSign gives care providers fast, secure access to patient information by combining single sign-on with strong authentication enabling

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

Statewide Health Information Network of New York. Darryl Hollar Director, Product Management

Statewide Health Information Network of New York. Darryl Hollar Director, Product Management Statewide Health Information Network of New York Darryl Hollar Director, Product Management 40 New York ehealth Collaborative Overview NYeC is a not-for-profit organization, working to improve healthcare

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as

More information

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations

More information

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service

More information

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9 CA Adapter Installation and Configuration Guide for Windows r2.2.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access

More information

Leveraging SAML for Federated Single Sign-on:

Leveraging SAML for Federated Single Sign-on: Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.

More information

Protect Everything: Networks, Applications and Cloud Services

Protect Everything: Networks, Applications and Cloud Services Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

Health Home Implementation Series: Vendor Selection. 24 January 2012

Health Home Implementation Series: Vendor Selection. 24 January 2012 Health Home Implementation Series: Vendor Selection 24 January 2012 Agenda Background on the New York ehealth Collaborative (NYeC) What is a Health Home? Key steps to Effective Vendor Selection Resources

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate

More information

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning

More information

Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority

Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority copyright of British Telecommunications plc 2006 Abstract As a large organisation with many partners BT has been

More information

Executive Summary P 1. ActivIdentity

Executive Summary P 1. ActivIdentity WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they

More information

White Paper. Support for the HIPAA Security Rule PowerScribe 360

White Paper. Support for the HIPAA Security Rule PowerScribe 360 White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as

More information

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

I D C V E N D O R S P O T L I G H T

I D C V E N D O R S P O T L I G H T I D C V E N D O R S P O T L I G H T E n f o r c i n g I dentity a nd Access Management i n C l o u d a n d Mobile Envi r o n m e n t s November 2012 Adapted from Worldwide Identity and Access Management

More information

Pick Your Identity Bridge

Pick Your Identity Bridge Pick Your Identity Bridge Options for connecting users and resources across the hybrid cloud Executive Overview Enterprises are increasing their use of software as a service (SaaS) for two principal reasons:

More information

Top 5 Reasons to Choose User-Friendly Strong Authentication

Top 5 Reasons to Choose User-Friendly Strong Authentication SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts

More information

New York ehealth Collaborative

New York ehealth Collaborative New York ehealth Collaborative Policy and Governance Structure January 2012 0 Table of Contents Executive Summary 2-4 Introduction 5-6 Achieving Statewide Interoperability Goals 7-8 SHIN-NY Governance

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?

More information

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services 1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

How To Make A Multi-Tenant Platform Secure And Secure

How To Make A Multi-Tenant Platform Secure And Secure Authentication As A Service Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Jason Hart CISSP CISM VP Cloud Solutions What a great world Today's World

More information

Oracle WebCenter Content

Oracle WebCenter Content Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: khutchings@usdatamanagement.com Introduction In May 2011, US Data Management (USDM) was

More information

Deploying Single-sign On with RDC 46 OnSite: An examination of methods to allow Single-Sign-On for existing RDC 46 OnSite environments

Deploying Single-sign On with RDC 46 OnSite: An examination of methods to allow Single-Sign-On for existing RDC 46 OnSite environments Deploying Single-sign On with RDC 46 OnSite: An examination of methods to allow Single-Sign-On for existing RDC 46 OnSite environments Sunil G. Singh, Ahila Selveraj DBMS Consulting 12 October 2010 Systems

More information

Cloud Services Catalog with Epsilon

Cloud Services Catalog with Epsilon Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

How to Implement Enterprise SAML SSO

How to Implement Enterprise SAML SSO How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0 WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

emipp Extending Medicaid Connectivity for Managing EHR Incentive Payments Overview

emipp Extending Medicaid Connectivity for Managing EHR Incentive Payments Overview Extending Medicaid Connectivity for Managing EHR Incentive Payments JANUARY 2011 Registration for EHR Incentive Program begins APRIL 2011 Attestation for the Medicare EHR Incentive Program begins NOVEMBER

More information

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to

More information

3Si Managed Authentication Services Service Description

3Si Managed Authentication Services Service Description 3Si Managed Authentication Services Service Description [Pick the date] 3Si Managed Authentication Services Service Description [Type the document subtitle] JT www.3sicloud.com www.3sicloud.com enquiry@3sicloud.com

More information

TrustedX - PKI Authentication. Whitepaper

TrustedX - PKI Authentication. Whitepaper TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...

More information

Deriving a Trusted Mobile Identity from an Existing Credential

Deriving a Trusted Mobile Identity from an Existing Credential Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment WHITEPAPER How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment www.onelogin.com 150 Spear Street, Suite 1400, San Francisco, CA 94105 855.426.7272 EXECUTIVE SUMMARY

More information

Building Secure Applications. James Tedrick

Building Secure Applications. James Tedrick Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS

More information