Draft Technical Specifications for Multilevel Security Authentication Device

Size: px
Start display at page:

Download "Draft Technical Specifications for Multilevel Security Authentication Device"

Transcription

1 Proposed QRs/Tech Specification for Multilevel Security Authentication Device is given below for inviting valuable comments/suggestions from Vendors, suppliers and OEMs. Draft Technical Specifications for Multilevel Security Authentication Device Hard Token S.No Specifications Details Technical Directive 1 Indigenous Hard Token Client does a lot of work which is of critical importance to National Security. Keeping this in mind, we need to ensure that such an important component (Hard Token for Two factor Authentication) should be completely indigenous and manufactured in India Documents submitted by the company along with visit to the manufacturing unit of the company by Technical committee. Submission of Design documents 2 Dynamically generate a new password within every two 3 Hybrid Token (between Time Based One time Password and Challenge Response) 4 Time Sync with the Authentication The Token should generate a new password within every two In TOTP, the password changes after every specific duration of time and is shown on the screen. Not only does this waste battery life but is also a security hazard since a non authorized user may be able to see the password. Challenge response generates a new password when asked by the user. However, this can lead to token going out of sync if a user generates multiple passwords and not use them. The requirements is a Hybrid token which is in sync with the server based on time but only show the password when asked by the user. This ensures security and long battery life. A user will only be able to see the password when physically in possession of the token token should be in sync with the server based on time and no other Check for two consecutive passwords generated by the token. The gap between the two passwords generated should not be more than 120 seconds The Password should be generated by pressing a button and should disappear from the screen after a fixed interval The server should show the same password as the token. The vendor

2 Server 5 Six Digit Numerical Password parameter.i.e. at a given point of time, the server and the token should have the same password for a particular user token should be a six digit numerical password to ensure it cannot be guessed in a given time frame 6 Five Year life The token should have a five year battery life 7 Unique Identity Every token should have an unique identity and should be unique to the user 8 Multi Application Support 9 Small and convenient form factor It should be possible to integrate the same token with other applications if required The token should have a small form factor which can ensure ease of carrying. 10 Token Activation User should be able to activate the token on his own 11 Token bound with user and not user name A user may have two different user names for logging into different applications. The user should use the same token to log into all the applications instead of different tokens for different applications should provide a URL where the user can enter the One Time Password and validate whether the password is correct or incorrect The password generated should be of six numerical digits Data Sheet submitted by company The user should generate passwords on two different tokens. The tokens should show a difference sequence of password generated The same token should be used on two different applications Data Sheet The vendor should provide a URL wherein which the committee should be able to activate the token on its own The user should assign the same token to two different usernames belonging to the same user Draft Specifications for Mobile Token Mobile Token S.No Specifications Details Technical Directive 1 Indigenous Mobile Token Client does a lot of work which is of critical importance to National Security. Keeping this in mind, we need to ensure that such an important component (Mobile Token for Two factor Authentication) should be completely indigenous and developed in India Documents submitted by the company along with visit to the R&D unit of the company by Technical committee. Submission of source code in escrow account if asked for

3 2 Dynamically generate a new password within every two The Token should generate a new password within every two 3 PIN Protected The application should need a PIN to generate the password so as to ensure that device sharing should not automatically lead to sharing of One Time passwords 4 Time Sync with the Authentication Server 5 Six Digit Numerical Password 6 Multi OS Support token should be in sync with the server based on time and no other parameter.i.e. at a given point of time, the server and the token should have the same password for a particular user token should be a six digit numerical password to ensure it cannot be guessed in a given time frame The Mobile token should be available as a software form factor that can be installed on a Windows Mobile, ios, Android, Blackberry etc 7 Unique Identity Every token should have an unique identity and should be unique to the user 8 Multi Application Support 9 IMEI / UID Binding 10 Token bound with user and not user name It should be possible to integrate the same token with other applications if required The mobile token generator should be bound with the IMEI device. The application installed on one IMEI / UID should not be installed on another A user may have two different user names for logging into different applications. The user should use the same token to log into all the applications instead of different tokens for Check for two consecutive passwords generated by the token. The gap between the two passwords generated should not be more than 120 seconds The user should enter a PIN before he would be allowed to see the password The server should show the same password as the token. The vendor should provide a URL where the user can enter the One Time Password and validate whether the password is correct or incorrect The password generated should be of six numerical digits Mobile tokens should be demonstrated on Android, ios and windows platform The user should generate passwords on two different tokens. The tokens should show a difference sequence of password generated The same token should be used on two different applications The user should attempt to install a mobile token on two different handsets. He should not be able to install the same token on more than one handset The user should assign the same token to two different usernames belonging to the same user

4 different applications Draft Specifications for Desktop Token Desktop Token S.No Specifications Details Technical Directive 1 Indigenous Desktop Token Client does a lot of work which is of critical importance to National Security. Keeping this in mind, we need to ensure that such an important component (Software Token for Two factor Authentication) should be completely indigenous and developed in India Documents submitted by the company along with visit to the R&D unit of the company by Technical committee. Submission of source code in escrow account if asked for 2 Dynamically generate a new password within every two The Token should generate a new password within every two 3 PIN Protected The application should need a PIN to generate the password so as to ensure that device sharing should not automatically lead to sharing of One Time passwords 4 Time Sync with the Authentication Server 5 Six Digit Numerical Password token should be in sync with the server based on time and no other parameter.i.e. at a given point of time, the server and the token should have the same password for a particular user token should be a six digit numerical password to ensure it cannot be guessed in a given time frame 6 Multi OS Support The Desktop token should be available as a software form factor that can be installed on a windows / Linux 7 Unique Identity Every token should have an unique identity and should be Check for two consecutive passwords generated by the token. The gap between the two passwords generated should not be more than 120 seconds The user should enter a PIN before he would be allowed to see the password The server should show the same password as the token. The vendor should provide a URL where the user can enter the One Time Password and validate whether the password is correct or incorrect The password generated should be of six numerical digits Desktop tokens should be demonstrated on windows and Linux platform The user should generate passwords on two different

5 8 Multi Application Support 9 IMEI / UID Binding 10 Token bound with user and not user name unique to the user It should be possible to integrate the same token with other applications if required The desktop token generator should be bound with the Mac ID device. The application installed on one Mac ID should not be installed on another A user may have two different user names for logging into different applications. The user should use the same token to log into all the applications instead of different tokens for different applications tokens. The tokens should show a difference sequence of password generated The same token should be used on two different applications The user should attempt to install a Desktop token on two different Desktops / Laptops. He should not be able to install the same token on more than one handset The user should assign the same token to two different usernames belonging to the same user Draft Specifications for Authentication Appliance S.No Specifications Details Technical Directive 1 Same Authentication Server for Hard Token, Mobile Token, Desktop Token and SMS Token The same authentication server should be used to authenticate both the Hard Token user as well as SMS token user Using the same server, user should be able to assign different types of tokens 2 Ease of Integration The authentication server should be easily integrated to the current running VPN 3 No access to user password The authentication server should not have any access to regular (static) password of the user. It should only be used to validate the OTP of the user 4 Custom Plug Ins It should be possible to integrate the Token with applications such as Microsoft Outlook, where the OTP should be valid for a specific duration of time 5 Sync users and user details It should be possible to sync all the users from the current LDAP server being used by client. The server should regularly sync with LDAP and make auto modifications where necessary 6 Lock / Unlock a user The system should have provision to lock a particular user on numerous wrong attempts or unlock a particular user Date sheet and Architectural diagram. A Proof of concept if required Data Sheet and Technical Specifications. Data Sheet and technical specifications. A proof of concept if required Data Sheet. A proof of concept if required The user should be log onto the server and lock / unlock a user

6 7 Associate users to Token 8 Multi-Tenant Architecture 9 Policy set for different tokens and users 10 Authenticate different applications with the same server The authentication server should have provision to assign a Hard Token / SMS Token to a user The authentication server should have provision to create separate logical groups and if required create separate administrator(s) for these groups The authentication server should allow the administrator freedom to create his own policies and assign them to different set of users It should be possible to integrate multiple applications with the same server including web as well as desktop mail client login. It should be possible to assign different set of policies for each 11 Manage Tokens The server should allow the administrator to manage tokens, block lost tokens, assign new tokens etc 12 GUI The software should have an easy to use GUI 13 Back Up It should be possible to schedule a backup of the server 14 High Availability The solution should be provided with High Availability and automatic failover between each system. 15 Logs The access logs generated by the OTP system should provide the following audit trails - An easy to use GUI where the user should be able to assign tokens on his own using the authentication server create different admins for different applications create different set of policies for different users on same server create authentication modules for different applications on same server assign, lock / unlock a token from the server All functionality defined should be done via GUI schedule a backup using the GUI Data Sheet and technical specifications see the logs on the GUI 1. Time stamped 2. IP address of the calling system (client system requesting for authentication) 3. Unique ID / serial no of the token. 16 Multi-OS Support It should be possible for the Appliance to work on Linux / Solaris / Windows / Vmware environments. Data Sheet submitted by company 17 Support a wide The solution should support Data Sheet submitted by

7 variety of VPN s integration with most popular firewalls, SSL IPSEC VPNs, routers, RADIUS servers, NAC clients, VPN clients, Citrix servers window servers( and 64 bit) local and RDP logon, wireless access points etc. 18 Token Assignment Should provide inbuilt database for user record creation and token assignment that could be automatically synced with external LDAP 19 Reports Should provide extensive reporting capability including but not limited to inbuilt reports like: company assign tokens using the GUI see the reports on the GUI 1. Users with Disabled Accounts 2. Users with Days Since Last Login Locked User Accounts 3. Principals Never Logged In with Token Authentication Activity 20 Inbuilt RADIUS Authentication server should have inbuilt RADIUS Server for ease of integration with end systems that support RADIUS based authentication. 21 Training The proposed solution should include user awareness training and administration training modules required to be delivered as part of the on boarding process Data Sheet Support letter issued by the company Hardware Specifications 1 CPU 1 * Intel Xeon X GHz Data Sheet 6.4GT/s, Core 12MB Cache or above 2 MotherBoard Intel S5520HCR Data Sheet 3 DDR III RAM 24 GB or above Data Sheet 4 HDD 12TB SATA 7.2K RPM or above Data Sheet

8 Please forward your valuable Comments/Suggestions by clearly mentioning in subject line as QRs suggestion for Multilevel Authentication Device on the following address/route: - Through Mail itwing@crpf.gov.in Through Fax By Hand Room No.325, 3 rd Floor, Block No-1, Directorate General, CRPF, Lodhi Road, New Delhi-3 NOTE:-You are hereby requested to submit the documents also as per given list below. 1. You are OEM/Supplier or otherwise (document in support-scan copy only ). 2. Clearly mention in all paras of QR/Specifications that you are complied with or otherwise. E.g :- S/No. Specifications Requirements Comment Remark 1 Power Supply 230 V + 5%, 50/60 Hz- Standard No Complied 2 Degausser System Capacitive Discharge No Complied 3 Duty Cycle Continuous No Complied 4 Cyclic Time 60 Seconds or less 50 Sec or more Not Complied 5 Display LCD Display to visually provide the user with erase, power & mode verification & other indications No Complied

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and

More information

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010

More information

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration

More information

MCBDirect Corporate Logging on using a Soft Token

MCBDirect Corporate Logging on using a Soft Token MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

DPH TOKEN SELF SERVICE SITE INSTRUCTIONS:

DPH TOKEN SELF SERVICE SITE INSTRUCTIONS: DPH TOKEN SELF SERVICE SITE INSTRUCTIONS: The purpose of this document is to provide users with assistance on resolving connection issues with Department of Public Health (DPH) Entrust tokens. These instructions

More information

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

2 factor + 2. Authentication. way

2 factor + 2. Authentication. way 2 factor + 2 way Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5

More information

Secure remote access to your applications and data. Secure Application Access

Secure remote access to your applications and data. Secure Application Access Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network

More information

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

ProtectID. for Financial Services

ProtectID. for Financial Services ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2

More information

Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide

Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide Replacing legacy twofactor authentication with YubiRADIUS for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection.

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park

More information

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560 WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Quick Start Guide. GV-Redundant Server GV-Failover Server. 1 Introduction. Packing List

Quick Start Guide. GV-Redundant Server GV-Failover Server. 1 Introduction. Packing List 1 Introduction Quick Start Guide GV-Redundant Server GV-Failover Server Welcome to the GV-Redundant Server / Failover Server Quick Start Guide. In the following sections, you will be guided through the

More information

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

YubiRADIUS Deployment Guide for corporate remote access. How to Guide YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship

More information

Soonr Workplace Enterprise Plan Overview

Soonr Workplace Enterprise Plan Overview This document is an overview of the features that are included in the Soonr Workplace Enterprise Plan. The Enterprise Plan is designed for the specific needs of IT departments in larger companies where

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including

More information

IDENTIKEY Product Family

IDENTIKEY Product Family IDENTIKEY Product Family Rik Swusten Product Manager & VACMAN Controller GO 3 GO 6 250-251 260-261 270 270 XPress 275 GO 7 GO 100 301 CV 550 560 736 Virtual Nano for Mobile VACMA N Controll er 800 810

More information

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

DIGIPASS Authentication for Sonicwall Aventail SSL VPN DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Authentication. Authentication in FortiOS. Single Sign-On (SSO) Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication

More information

ZyWALL OTPv2 Support Notes

ZyWALL OTPv2 Support Notes ZyWALL OTPv2 Support Notes Revision 1.00 September, 2010 Written by CSO Table of Contents 1. Introduction... 3 2. Server Installation... 7 2.1 Pre-requisites... 7 2.2 Installations walk through... 7 3.

More information

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845

More information

SecurEnvoy Security Server. SecurMail Solutions Guide

SecurEnvoy Security Server. SecurMail Solutions Guide SecurEnvoy Security Server SecurMail Solutions Guide SecurMail Solutions Guide 2009 SecurEnvoy Printed: 2009 in United Kingdom Publisher SecurEnvoy Publishing Managing Editor SecurEnvoy Training Dept Technical

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

BlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist

BlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist BlackBerry Enterprise Service version.2 preinstallation and preupgrade checklist Verify that the following requirements are met before you install or upgrade to BlackBerry Enterprise Service version.2.

More information

AkrutoSync 4.0 User Guide

AkrutoSync 4.0 User Guide AKRUTO AkrutoSync 4.0 User Guide Welcome Thank you for choosing AkrutoSync. AkrutoSync can synchronize your Contacts, Calendar and Tasks between Outlook on your computer and your Windows Phone. AkrutoSync

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

NetIQ Advanced Authentication Framework

NetIQ Advanced Authentication Framework NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP

More information

SOMITS is located in the 1648 Pierce Drive School of Medicine Building, Suite AB51.

SOMITS is located in the 1648 Pierce Drive School of Medicine Building, Suite AB51. School of Medicine Information Technology Services All newly enrolled School of Medicine students are encouraged to visit the School of Medicine s IT office before orientation to obtain help configuring

More information

Propalms TSE Deployment Guide

Propalms TSE Deployment Guide Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,

More information

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: 2015-03-31

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide Product Release 8.1 Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide 2700 Zanker Road, Suite 200 San Jose, CA 95134

More information

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale Reading

More information

What s New in Propalms VPN 3.5?

What s New in Propalms VPN 3.5? What s New in Propalms VPN 3.5? Contents Improved Management Console Interface... 2 Inline Help on Management Console... 2 Graphical Dashboard on Management Console... 2 Multiple Authentication Server

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

RSA AUTHENTICATION AGENTS FOR MICROSOFT WINDOWS

RSA AUTHENTICATION AGENTS FOR MICROSOFT WINDOWS RSA AUTHENTICATION AGENTS FOR MICROSOFT WINDOWS Components Available with Each Version of RSA Agents for Microsoft Windows Agent Local Authentication Client RSA Authentication Agent 6.1.3 Remote Authentication

More information

State of Wisconsin. Virtual Private Network (VPN) Service Offering Definition (SOD)

State of Wisconsin. Virtual Private Network (VPN) Service Offering Definition (SOD) State of Wisconsin Virtual Private Network (VPN) Service Offering Definition (SOD) Document Revision History Date Version Creator Notes 9/15/11 1.5 Amy Dustin Annual review minor edits Table of Contents

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com

More information

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN) Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data

More information

Access All Your Files on All Your Devices

Access All Your Files on All Your Devices d Access All Your Files on All Your Devices The Best Performance, Features and Price for Private cloud storage for all platforms Windows, Mac, Linux, ios, Android, Blackberry & more Enterprise Private

More information

Amazon Elastic Compute Cloud Microsoft Active Directory

Amazon Elastic Compute Cloud Microsoft Active Directory Feature Summary Manage Microsoft Windows, Active Directory, Exchange, ActiveSync IIS, SQL Server, DHCP, DNS, Cluster Server, System Center Operations Manager and System Center Mobile Device Manager, RSA,

More information

Cisco Identity Services Engine

Cisco Identity Services Engine Cisco Identity Services Engine Secure Access Stefan Dürnberger CCIE Security Sourcefire Certified Expert Most organizations, large and small, have already been compromised and don t even know it: 100 percent

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

RICOH Data Center Services

RICOH Data Center Services RICOH Data Center Services 1 About RICOH RICOH Overview We are Fortune Global 500 Company Established in 1993 Global 100 Most Sustainable Corporations in the world (9 consecutive Yrs) World s 100 Most

More information

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

Mobile Admin Server Installation and Configuration Guide

Mobile Admin Server Installation and Configuration Guide Mobile Admin Server Installation and Configuration Guide Version 8.1 Copyright 1995-2013 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means

More information

IDENTIKEY Server Product Guide 3.0 3.1

IDENTIKEY Server Product Guide 3.0 3.1 IDENTIKEY Server Product Guide 3.0 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale

More information

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

Ultra-strong authentication to protect network access and assets

Ultra-strong authentication to protect network access and assets Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle-free.

More information

SingTel VPN as a Service. Quick Start Guide

SingTel VPN as a Service. Quick Start Guide SingTel VPN as a Service Quick Start Guide Document Control # Date of Release Version # 1 25 April 2014 PT_SN20_1.0 2 3 4 5 6 Page Affected Remarks 2/33 Table of Contents 1. SingTel VPN as a Service Administration...

More information

Ultra-strong authentication to protect network access and assets

Ultra-strong authentication to protect network access and assets Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle-free.

More information

Hosting topology SMS PASSCODE 2015

Hosting topology SMS PASSCODE 2015 Hosting topology SMS PASSCODE 2015 Hosting Topology In a hosting environment, you have a backend and a several front end (clients). In the example below, there is a backend at the right side. At the left

More information

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0 Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of

More information

CRYPTOCard. Strong Two Factor Authentication

CRYPTOCard. Strong Two Factor Authentication CRYPTOCard Strong Two Factor Authentication CRYPTOCard Solutions Overview Cybercrime is a serious, real, and all-to-prevalent threat to networked assests. With the abundance of deployed workers requiring

More information

msuite5 & mdesign Installation Prerequisites

msuite5 & mdesign Installation Prerequisites CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...

More information

Discovering Computers

Discovering Computers Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 9 Operating Systems Objectives Overview Define an operating system Describe the start-up process and shutdown

More information

SVN5800 Secure Access Gateway

SVN5800 Secure Access Gateway The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,

More information

DIGIPASS Authentication for SonicWALL SSL-VPN

DIGIPASS Authentication for SonicWALL SSL-VPN DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

SafeWord 2008 Customer Release Notes

SafeWord 2008 Customer Release Notes SafeWord 2008 Customer Release Notes Product Version: 2.1.0.04 Release Notes Issue Date: October 14, 2010 Last Updated: October 14, 2010 1. Product Description SafeWord 2008 by SafeNet is a two-factor

More information

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative

More information

Summer Webinar Series

Summer Webinar Series Summer Webinar Series Cisco ASA AnyConnect VPN with AD Christopher Rose Sr. Client Network Engineer crose@mcnc.org Webinar Links: www.mcnc.org/cne-webinars Agenda Review the security implications of remote

More information

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505 INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210

More information

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Edge Metrics Data Center User Manual

Edge Metrics Data Center User Manual Edge Metrics Data Center User Manual Introduction EMDC is an Internet based, Facility Access Control Solution for small to medium size businesses, property management firms, schools, religious facilities,

More information

Whitepaper. The Top 10 Advantages of 3CX Phone System. Why your next phone system should be software based and by 3CX

Whitepaper. The Top 10 Advantages of 3CX Phone System. Why your next phone system should be software based and by 3CX Whitepaper The Top 10 Advantages of 3CX Phone System Why your next phone system should be software based and by 3CX This whitepaper outlines the top 10 advantages of choosing 3CX Phone System, a Windows

More information

SysAidTM Freeware Installation Guide

SysAidTM Freeware Installation Guide SysAidTM Freeware Installation Guide Document Updated: 10 November 2009 Introduction SysAid free edition is built for organizations with fewer than 100 computers and users. This document will help you

More information

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

BlackShield ID Best Practice

BlackShield ID Best Practice BlackShield ID Best Practice Implementation Guide for a Complex Network Document Scope This document is designed to demonstrate best practice when implementing and rolling out a two-factor authentication

More information

Lucas POS V4 for Windows

Lucas POS V4 for Windows Lucas POS V4 for Windows Version 4.02 Secure Implementation Guide Document Revision: 4 Lucas Systems provides this publication as is without warranty of any kind, either expressed or implied. This publication

More information

An Integrated Business Management Solution

An Integrated Business Management Solution An Integrated Business Management Solution www.exactllyerp.com exactllyerp An Integrated Business Management Solution MEETS ALL YOUR CORE BUSINESS NEEDS SIMPLE TO LEARN AND USE DRIVES VALUE FOR YOUR BUSINESS

More information

Product Life Cycle Management

Product Life Cycle Management Engineering Change Control Systems (atecc) Product Life Cycle Management Enterprise information boundaries are disappearing as corporations open their networks to allow external access by manufacturing

More information

Data Sheet. NCP Secure Enterprise Management. General description. Highlights

Data Sheet. NCP Secure Enterprise Management. General description. Highlights Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server

More information

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved.

CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved. CRYPTOLogon Agent for Windows Domain Logon Authentication Deployment Guide Table of Contents 1. OVERVIEW... 1 1.1 SINGLE AUTHENTICATION MODE (MS-GINA REPLACEMENT)... 1 1.2 DUAL AUTHENTICATION MODE (MS-GINA

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE) INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information