Implementing Single Sign On in Java Technologybased

Size: px
Start display at page:

Download "Implementing Single Sign On in Java Technologybased"

Transcription

1 Implementing Single Sign On in Java Technologybased Web Services Rima Patel Sriganesh Technology Evangelist Sun Microsystems, Inc.

2 Why Am I Here? Well Because I Hate to sign-on tens of times for using hundreds of different services, online 2

3 Presentation Goal Understand SAML, a technology, that enables open and interoperable design and implementation of Single Sign-On (SSO) functionality in web services 3

4 Learning Objectives As a result of this presentation, you will be able to: Understand what is SSO and its enabling technology, i.e., SAML Know various SSO use cases and scenarios Know how to implement SSO in web services using SAML 4

5 Speaker s Qualifications Rima is a Technology Evangelist at Sun Microsystems [email protected] Rima publishes on EvangCentral Rima speaks frequently on the J2EE platform, Sun ONE Web Services technology and XML Security, at conferences around the globe Rima is a Sun Certified Programmer for the Java Platform 5

6 Agenda, for the Next Hour SSO in web services Security Assertions Markup Language SAML: A closer look SAML SSO scenarios Implementing SSO, by example Summary and Resources 6

7 SSO in Web Services

8 What Is SSO, Anyway? SSO represents the ability of a user To authenticate in one domain And use resources in another domain WITHOUT re-authenticating 8

9 SSO Web Services A Generic Use Case Authenticates Source Security Info. Passed No Re-Authentication Destination Source and Destination may belong to a Federation 9

10 Now, We Know That SSO Is Not New But a Million Dollar Question Is: Does the existing SSO infrastructure let us create interoperable and cost-effective SSO services? 10

11 Although the Answer to Previous Question Is, No We do see an enabling technology emerging on the horizon! 11

12 Security Assertions Markup Language (SAML)

13 SAML XML Framework for exchanging security information over the internet Standardization efforts carried out within Security Services Technical Committee at OASIS Based on merger of two competing security efforts viz. S2ML and AuthML 13

14 Where Exactly Does SAML Help? It enables different security services systems to INTEROPERATE It does not define any new approaches towards authentication/authorization 14

15 Where Is SAML Headed? Roadmap SAML 1.0 Specification Set (Committee Working Draft) has been released as of Feb, 2002 SAML 1.0 Committee specification submission to OASIS is due by March, 2002 Java Specification Request 155 (JSR-155) defines a standard Java API for SAML 15

16 Where Is SAML Headed? Industry Traction Used in security services implementation of Internet2 Sun (Network Identity/iPlanet DSAME) Entrust (GetAccess portal) Systinet (WASP Secure Identity) Securant (RSA Cleartrust) Entegrity (AssureAccess) Netegrity (AffiliateMinder) 16

17 What Does SAML Define? SAML specification is a set of documents that define Assertions and Request/Response Protocol Bindings and Profiles Security considerations while using SAML Conformance guidelines and Test suite Use cases and Requirements 17

18 SAML: A Closer Look Assertions and Protocol Bindings and Profiles

19 Assertions Declaration of a certain fact about a Subject for e.g., User, Code, etc. Issued by SAML Authorities 19

20 Types of Assertions Attribute Assertions Authentication Assertions Authorization Assertions 20

21 SAML Architecture SAML Request SAML Assertion Response Relying Party Issuing Authority Creates Assertion SAML Assertion SOAP HTTP 21

22 Who Would Possibly Play as Issuing Authorities? Third-party Security Services Providers Microsoft for its Passport initiative XNSORG for its Web Identity Platform DotGNU for its Virtual Identity Platform 22

23 Who Would Possibly Play as Issuing Authorities? Businesses acting as Security Services Providers within Federations AOL, AMEX, VISA, American Airlines, Play as Authorities for asserting security information pertaining to their respective users Using Liberty Alliance technologies 23

24 Assertion Common Elements Issuer and issuance timestamp Assertion ID Subject Name and Security Domain Optionally subject s authentication data Advice Additional information provided by issuing authority 24

25 Assertion Common Elements (Cont.) Conditions under which an assertion is valid Assertion Validity Period NotBefore and NotOnOrAfter Audience restrictions Target restrictions Application-specific conditions 25

26 Protocol for Requesting/ Receiving Assertions TRUSTED Issuing Authority SAML Assertion Request SAML Assertion Response Relying Party 26

27 Request for Authentication Assertion Sent by relying party to Issuing Authority, to assert that Subject S is authenticated 27

28 CAUTION Assertions are made about acts of authentication that have ALREADY occurred SAML does not include requirements or specifications for these acts of authentication 28

29 Example Request for Authentication Assertion <samlp:request MajorVersion= 1 MinorVersion= 0 RequestID= "> <samlp:authenticationquery> <saml:subject> <saml:nameidentifier SecurityDomain= sun.com Name= rimap /> </saml:subject> </samlp:authenticationquery> </samlp:request> 29

30 Authentication Assertion An Issuing Authority asserts that Subject S Was authenticated by means M At time T 30

31 Example of Authentication Assertion <samlp:response MajorVersion= 1 MinorVersion= 0 RequestID= InResponseTo= StatusCode= Success > <saml:assertion MajorVersion= 1 MinorVersion= 0 AssertionID= Issuer= Sun Microsystems, Inc. IssueInstant= T10:00:23Z > <saml:conditions NotBefore= T10:00:30Z NotAfter= T10:15:00Z /> 31

32 Example of Authentication Assertion (Cont.) <saml:authenticationstatement AuthenticationMethod= Password AuthenticationInstant= T10:00:20Z > <saml:subject> <saml:nameidentifier SecurityDomain= sun.com Name= rimap /> </saml:subject> </saml:authenticationstatement> </saml:assertion> </samlp:response> 32

33 Request for Attribute Assertion Sent by relying party to Issuing Authority, to assert The value of Attributes A, B, For a subject S 33

34 Example Request for Attribute Assertion <samlp:request...> <samlp:attributequery> <saml:subject> <saml:nameidentifier SecurityDomain= sun.com Name= rimap /> </saml:subject> <saml:attributedesignator AttributeName= Employee_ID AttributeNamespace= sun.com > </saml:attributedesignator> </samlp:attributequery> </samlp:request> 34

35 Attribute Assertion An Issuing Authority asserts that Subject S Is associated with attributes A, B, With values a, b, 35

36 Example of Attribute Assertion <samlp:response...> 36 <saml:assertion...> <saml:conditions.../> <saml:attributestatement> <saml:subject> <saml:nameidentifier SecurityDomain= sun.com Name= rimap /> </saml:subject> <saml:attribute AttributeName= Employee_ID AttributeNamespace= sun.com > <saml:attributevalue> </saml:attributevalue> </saml:attribute> </saml:attributestatement> </saml:assertion> </samlp:response>

37 Request for Authorization Assertion Sent by relying party to Issuing Authority, to assert whether Subject S Is allowed access of type D To Resource R Given the Evidence E Evidence is an assertion on which Issuing Party relies while making authorization decision Evidence is optional 37

38 Example Request for Authorization Assertion <samlp:request...> 38 <samlp:authorizationdecisionquery Resource= > <saml:subject> <saml:nameidentifier SecurityDomain= Name= rimap /> </saml:subject> <saml:actions Namespace= > <saml:action>read_benefits</saml:action> <saml:action>change_benefits</saml:action> </saml:actions> <saml:evidence> <saml:assertion>...some assertion... </saml:assertion> </saml:evidence> </samlp:authorizationquery> </samlp:request>

39 Authorization Decision Assertion An Issuing Authority asserts that Request for a particular access by subject S To resource R Has resulted in the authorization decision D On the basis of given evidence E (if present) 39

40 Example of Authorization Decision Assertion <saml:response...> <saml:assertion...> <saml:conditions.../> <saml:authorizationdecisionstatement Decision= Permit Resource= > <saml:subject> <saml:nameidentifier SecurityDomain= sun.com Name= rimap /> </saml:subject> </saml:authorizationstatement> </saml:assertion> </samlp:response> 40

41 Producer and Consumer Model for Assertions Credentials Collector Authentication Authority Attribute Authority Policy Decision Point (PDP) SAML Authentication Assertion Attribute Assertion Authorization Assertion System Entity Application Request Policy Enforcement Point (PEP) 41

42 SAML and Extensibility Applications can Define specific Assertions Exchange Assertions using specific request/response protocol However, extensibility comes at the cost of Interoperability 42

43 SAML: A Closer Look Assertions and Protocol Bindings and Profiles

44 SAML Bindings Binding is Way to transport SAML requests and responses Defined by mapping SAML message exchange to messaging or communication protocol SOAP-over-HTTP binding is defined 44

45 SOAP-Over-HTTP Binding for SAML SAML SOAP-Over-HTTP Binding SOAP Header SOAP Body SAML Request/Response SOAP Message 45

46 SAML Profiles Profile describes A way to embed and extract SAML assertions into a framework or protocol Currently defined are Web Browser SSO profiles Draft Profiles SAML Profile for XML DSIG 46

47 Web Browser SSO Profiles Supports SSO scenarios in web services delivered through browsers Two ways to convey assertion information Browser/artifact Browser/POST 47

48 Browser/Artifact Profile Supports SSO scenarios in which When a user accesses secured resource on destination site An artifact (reference) is sent along with the request Artifact is used to de-reference real assertion 48

49 Browser/POST Profile Supports SSO scenarios in which assertions are Exchanged as part of HTML form POST-ed to destination site on submitting the form 49

50 SAML SSO Scenarios Pull Model Push Model Third-party Security Service

51 SSO Web Services Pull Model Scenario Part I Employee (System Entity) Sunweb.central (Auth. And Attr. Authority) Hewitt.com/sunflex/benefits (PEP/PDP) 1. Authenticates 2. Chooses Benefits Link 3.1 Provides Auth. Reference 3.2 Redirects to Hewitt.com 4.1 Requests Benefits Mgmt. Service 4.2 Provides Auth. Reference 51

52 SSO Web Services Pull Model Scenario Part II Employee (System Entity) Sunweb.central (Auth. And Attr. Authority) Hewitt.com/sunflex/benefits (PEP/PDP) 5. Requests SAML Auth. Assertion 6. Provides SAML Auth. Assertion 7. Provides Access To Benefits Mgmt. Service 52

53 SSO Web Services Push Model Scenario Part I Employee (System Entity) Sunweb.central (Auth. And Attr. Authority) Hewitt.com/sunflex/benefits (PEP/PDP) 1. Authenticates 2. Chooses Benefits Link 3. Pushes Auth. And Attr. Assertion 4. Provides Authz. Assertion Reference 53

54 SSO Web Services Push Model Scenario Part II Employee (System Entity) Sunweb.central (Auth. And Attr. Authority) Hewitt.com/sunflex/benefits (PEP/PDP) 5.1 Provides Authz. Reference 5.2 Redirects To Hewitt.com 6.1 Requests Benefits Mgmt. Service 6.2 Provides Authz. Assertion Reference 7. Provides Access To Benefits Mgmt. Service 54

55 SSO Web Services Third-Party Security Service Scenario Part I Consumer (System Entity) AOL Magic Carpet (Security Service) Travelocity.com (PEP/PDP) 1. Authenticates 2. Provides Auth. And Attr. Assertion Reference 3.1 Requests For Booking Vacation Itinerary 3.2 Provides Auth. And Attr. Assertion References 55

56 SSO Web Services Third-Party Security Service Scenario Part II Consumer (System Entity) AOL Magic Carpet (Security Service) Travelocity.com (PEP/PDP) 4. Requests Auth. And Attr. Assertions 5. Provides Auth. And Attr. Assertion 6. Lets The Consumer Book Vacation Itinerary 56

57 SSO Web Services Third-Party Security Service Scenario Part III Consumer (System Entity) Travelocity.com (PEP/PDP) Vacationpurchase.com (PEP/PDP) 7. Clicks On Link For vacationpurchase.com 8. Forwards Auth. And Attr. Assertion 9. Provides Authz. Assertion Reference 57

58 SSO Web Services Third-Party Security Service Scenario Part IV Consumer (System Entity) Travelocity.com (PEP/PDP) Vacationpurchase.com (PEP/PDP) 10.1 Forwards Authz. Assertion Reference 10.2 Redirects To vacationpurchase.com 11.1 Requests The Secured Resource 11.2 Provides Authz. Assertion Reference 12. Customer Is Allowed To Purchase Vacation Goodies! 58

59 Implementing SAML by Example

60 SSO Web Services Pull Model Scenario Part I Employee (System Entity) Sunweb.central (Auth. And Attr. Authority) Hewitt.com/sunflex/benefits (PEP/PDP) 1. Authenticates 2. Chooses Benefits Link 3.1 Provides Auth. Reference 3.2 Redirects to Hewitt.com 4.1 Requests Benefits Mgmt. Service 4.2 Provides Auth. Reference 60

61 SSO Web Services Pull Model Scenario Part II Employee (System Entity) Sunweb.central (Auth. And Attr. Authority) Hewitt.com/sunflex/benefits (PEP/PDP) 5. Requests SAML Auth. Assertion 6. Provides SAML Auth. Assertion 7. Provides Access To Benefits Mgmt. Service 61

62 SSO Between Sun and Hewitt Service Interaction Diagram Sun.com Employee Hewitt.com 62

63 SSO Between Sun and Hewitt Service Interaction Diagram Sun.com Employee 1 Login (JSP) Hewitt.com 63

64 SSO Between Sun and Hewitt Service Interaction Diagram Sun.com Employee 1 2 Employee Assistant (JSP/Servlet) Login (JSP) Hewitt.com 64

65 SSO Between Sun and Hewitt Service Interaction Diagram Sun.com Employee 1 2 Login (JSP) Employee Assistant (JSP/Servlet) 3 ForwardTo Hewitt (Servlet) Hewitt.com 65

66 SSO Between Sun and Hewitt Service Interaction Diagram Sun.com Employee 1 2 Login (JSP) Employee Assistant (JSP/Servlet) 3 ForwardTo Hewitt (Servlet) 4 HewittEntry (Servlet) Hewitt.com 66

67 SSO Between Sun and Hewitt Service Interaction Diagram Sun.com 1 Login (JSP) SunAssert (JAXM Service) Employee 2 5 Employee Assistant (JSP/Servlet) 3 ForwardTo Hewitt (Servlet) 4 HewittEntry (Servlet) Hewitt.com 67

68 SSO Between Sun and Hewitt Service Interaction Diagram Sun.com 1 Login (JSP) SunAssert (JAXM Service) Employee 2 5 Employee Assistant (JSP/Servlet) 3 ForwardTo Hewitt (Servlet) 4 6 HewittEntry (Servlet) Hewitt.com 68

69 SSO Between Sun and Hewitt Service Interaction Diagram Sun.com 1 Login (JSP) SunAssert (JAXM Service) Employee Employee Assistant (JSP/Servlet) 3 ForwardTo Hewitt (Servlet) 4 6 HewittEntry (Servlet) Hewitt.com 69

70 SSO Between Sun and Hewitt Service Interaction Diagram Sun.com 1 Login (JSP) SunAssert (JAXM Service) Employee Employee Assistant (JSP/Servlet) 3 ForwardTo Hewitt (Servlet) SunFlex (JSP/Servlet) HewittEntry (Servlet) Hewitt.com 70

71 ForwardToHewitt (Cont.) Sample Implementation (Using iplanet DSAME SAML Impl.) public void doget(...) { //Generate the Assertion for this user Assertion objassertion = getassertion (request.getremoteuser()); //Write the assertion to your store (a filesystem, say) and //return a reference (a random number) to this assertion AssertionArtifact objartifact = createassertionartifact (objassertion, "Sun.Com", "Hewitt.Com"); String sreference = objartifact.getassertionartifact(); //Now time for redirecting the user to HewittEntry servlet, //with assertion reference response.sendredirect(" SAMLart = " + sreference); } 71

72 ForwardToHewitt Sample Implementation (Using iplanet DSAME SAML Impl.) public Assertion getassertion(...) { //Create SAML Conditions under which this assertion is valid Conditions objconditions = new Conditions (StartDate, EndDate); //Add Audience Restriction Condition, if any objconditions.addaudiencerestrictioncondition (objaudience); //Add Target Restricton Condition, if any objconditions.addtargetrestrictioncondition (objtarget); //Create the Subject relevant to this assertion NameIdentifier nameidentifier = new NameIdentifier(sSecurityDomain, susername); Subject objsubject = new Subject(NameIdentifier); //Now make an Authentication Statement AuthenticationStatement objauthstmt = new AuthenticationStatement("Password", new Date(), objsubject); 72

73 ForwardToHewitt (Cont.) Sample Implementation (Using iplanet DSAME SAML Impl.) //Now build Attribute Assertion Attribute attribute = new Attribute("Department", "sun.com", DepartmentValue); List attributelist = new HashList(); attributelist.add(attribute); AttributeStatement objattrstmt = new AttributeStatement(attributeList, objsubject); //Now build an Assertion containing above AssertionStatements String sissuer = "Sun Microsystems, Inc."; Set objstmts = new HashSet(); objstmts.add(objauthstmt); objstmts.add(objattrstmt); Assertion objassertion = new Assertion(AssertionID, sissuer, new Data(), objconditions, objstmts); } return objassertion; 73

74 HewittEntry Sample Implementation (Using iplanet DSAME SAML Impl.) public void doget(...) { //Extract the value of request parameter "SAMLart" String sreference = request.getparameters("samlart"); //Now populate a SOAP message consisting of this reference //and send it synchronously to SunAssert JAXM Service //(sun.com/partners/sunassert) in order to get the actual //assertion... SOAPMessage objassertionsoapmsg = objsoapconnection.call(objrequestsoapmessage, objurlendpoint); //Now the returned AssertionSOAPMsg consist of Assertions. So //get hold of the Assertion element from the SOAP message //body and populate the SAML Assertion... Assertion objassertion = new Assertion (objsoapassertionlistelement); 74

75 HewittEntry (Cont.) Sample Implementation (Using iplanet DSAME SAML Impl.) //Once you have Assertion, check for its validity boolean bvalid = isassertionvalid(spartner,objassertion); //If everything is okay then redirect the user to Benefits //(hewitt.com/sunflex) response.sendredirect(" } 75

76 HewittEntry (Cont.) Sample Implementation (Using iplanet DSAME SAML Impl.) public boolean isassertionvalid(string FromPartner, Assertion objassertion) { //Make sure that the assertion is coming from a valid partner... //Check the date and time of these assertions Conditions objconditions = objassertion.getconditions(); boolean bvalid = objconditions.checkdatevalidity(new Date()); //Now check whether you are one of the intended audiences boolean bvalid = objconditions.checkaudience (Audience); //Finally return the result of validity check return bvalid; } 76

77 SunAssert (JAXMServlet) Sample Implementation (Using iplanet DSAME SAML Impl.) public SOAPMessage onmessage (SOAPMessage objincomingsoapmsg) { //Extract the SOAP Body first and then extract the assertion //reference from the incoming SOAP message's body SOAPElement objreference = extractelement (objincomingsoapbody, "AssertionArtifact"); //Now retrieve the Assertion corresponding to this reference //from your assertion store (i.e. Your filesystem) //Now populate your response SOAP message's body with this //assertion objresponsesoapbody.addbodyelement( objresponsesoapenv.createname ("Assertion", null, null));... //Now time to send the response SOAP message to the callee return objresponsesoapmsg; }

78 Summary and Resources

79 Summary SAML is one available solution to enable SSO in web services in an interoperable way SAML implementations are available JSR-155 aims to provide a standard API for writing Java technology-based SAML services 79

80 Resources Official OASIS SAML resource center For iplanet DSAME Implementation Lots of whitepapers and SAML implementation SAML Community website XML Cover pages 80

81 One Thing You Can Do Right Away Is Ask yourself, Are my service consumers signing-in for TENS of times? If yes, then start thinking about SAML! 81

82

83

SAML basics A technical introduction to the Security Assertion Markup Language

SAML basics A technical introduction to the Security Assertion Markup Language SAML basics A technical introduction to the Security Assertion Markup Language WWW2002 Eve Maler, XML Standards Architect XML Technology Center Sun Microsystems, Inc. Agenda The problem space SAML concepts

More information

Introduction to SAML. Jason Rouault Section Architect Internet Security Solutions Lab Hewlett-Packard. An XML based Security Assertion Markup Language

Introduction to SAML. Jason Rouault Section Architect Internet Security Solutions Lab Hewlett-Packard. An XML based Security Assertion Markup Language Introduction to SAML An XML based Security Assertion Markup Language Jason Rouault Section Architect Internet Security Solutions Lab Hewlett-Packard 1/18/2002 Introduction to SAML Page 1 Credits and Acknowledgements

More information

SAML Security Assertion Markup Language

SAML Security Assertion Markup Language SAML Security Assertion Markup Language Dennis Kafura Draws heavily on: SAML basics: A technical introduction to the Security Assertion Markup Language, Eve Maler, Sun Microsystems 1 SAML in Context SAML

More information

Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security

Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security Dongkyoo Shin, Jongil Jeong, and Dongil Shin Department of Computer

More information

Security Assertion Markup Language (SAML)

Security Assertion Markup Language (SAML) CS 595G 02/14/06 Security Assertion Markup Language (SAML) Vika Felmetsger 1 SAML as OASIS Standard OASIS Open Standard SAML V2.0 was approved in March, 2005 Blending of two earlier efforts on portable

More information

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC

More information

Authorization-Authentication Using

Authorization-Authentication Using School of Computing Science, University of Newcastle upon Tyne Authorization-Authentication Using XACML and SAML Jake Wu and Panos Periorellis Technical Report Series CS-TR-907 May 2005 Copyright c 2004

More information

SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun

SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun SAML Security Analysis Huang Zheng Xiong Jiaxi Ren Sijun outline The intorduction of SAML SAML use case The manner of SAML working Security risks on SAML Security policy on SAML Summary my course report

More information

MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard

MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY ASR 2006/2007 Final Project Supervisers: Maryline Maknavicius-Laurent, Guy Bernard Federated Identity Project topic Superviser: Maryline Maknavicius

More information

Single Sign-on Systems SS5

Single Sign-on Systems SS5 Single Sign-on Systems SS5 Scenario Going to travel Sign in for booking flight ticket Sign in for booking hotel room Sign in for renting a car Multi sign on is troublesome Is it possible to just sign-on

More information

OpenSSO: Cross Domain Single Sign On

OpenSSO: Cross Domain Single Sign On OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2

More information

Biometric Single Sign-on using SAML

Biometric Single Sign-on using SAML Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On

More information

Security Assertion Markup Language (SAML) 2.0 Technical Overview

Security Assertion Markup Language (SAML) 2.0 Technical Overview 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Security Assertion Markup Language (SAML) 2.0 Technical Overview Working Draft 03, 20 February 2005 Document identifier:

More information

Biometric Single Sign-on using SAML Architecture & Design Strategies

Biometric Single Sign-on using SAML Architecture & Design Strategies Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand

More information

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion. Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On

More information

Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006

Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On Introduction... 3 Single Sign-On with Siebel CRM On Demand... 4 Customer Requirements... 4 SSO

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Version 27.0: Spring 13 Single Sign-On Implementation Guide Last updated: February 1, 2013 Copyright 2000 2013 salesforce.com, inc. All rights reserved. Salesforce.com is a registered trademark of salesforce.com,

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,

More information

Federated Identity Management Solutions

Federated Identity Management Solutions Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single

More information

Extending DigiD to the Private Sector (DigiD-2)

Extending DigiD to the Private Sector (DigiD-2) TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.

More information

Federated Identity in the Enterprise

Federated Identity in the Enterprise www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember

More information

Setting Up Federated Identity with IBM SmartCloud

Setting Up Federated Identity with IBM SmartCloud White Paper March 2012 Setting Up Federated Identity with IBM SmartCloud 2 Setting Up Federated Identity with IBM SmartCloud Notices Contents International Business Machines Corporation provides this publication

More information

JVA-122. Secure Java Web Development

JVA-122. Secure Java Web Development JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard

More information

Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0

Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0 Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0 SAP WebAS 6.40 Version 1.0 1.0 1 Copyright Copyright 2004 SAP AG. All rights reserved. No part of this documentation may

More information

Oasis Security Services Use Cases And Requirements

Oasis Security Services Use Cases And Requirements 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 Oasis Security Services Use Cases And Requirements Consensus Draft 1, 30 May 2001 Purpose This document describes

More information

000-575. IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>

000-575. IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>> 000-575 IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: Demo Page 1.What is the default file name of the IBM Tivoli Directory Integrator log? A. tdi.log B. ibmdi.log C. ibmdisrv.log

More information

2015-11-30. Web Based Single Sign-On and Access Control

2015-11-30. Web Based Single Sign-On and Access Control 0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking

More information

WebLogic Server 7.0 Single Sign-On: An Overview

WebLogic Server 7.0 Single Sign-On: An Overview WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of

More information

SAML:The Cross-Domain SSO Use Case

SAML:The Cross-Domain SSO Use Case SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 [email protected] Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397

More information

RSA Secured Implementation Guide for VPN Products

RSA Secured Implementation Guide for VPN Products RSA Secured Implementation Guide for VN roducts Last Modified August 27, 2004 1. artner Information artner Name Juniper Networks Web Site http://www.juniper.com/ roduct Name Juniper Networks NetScreen-SA

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Exam : C2150-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version : Demo 1.What is the default file name of the

More information

Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1

Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1 OASIS Standard,

More information

Securing Web Services With SAML

Securing Web Services With SAML Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion

More information

Web Access Management and Single Sign-On

Web Access Management and Single Sign-On Web Access Management and Single Sign-On Ronnie Dale Huggins In the old days of computing, a user would sit down at his or her workstation, login to the desktop, login to their email system, perhaps pull

More information

Software Requirement Specification Web Services Security

Software Requirement Specification Web Services Security Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: [email protected] This document is subject to the following license:

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

23.11.2012 Martin Käser. Single Sign-on mit OpenSAML

23.11.2012 Martin Käser. Single Sign-on mit OpenSAML 23.11.2012 Martin Käser Single Sign-on mit OpenSAML SAML Überblick l SAML = Security Assertion Markup Language v1.1 OASIS Standard 2003 v2.0 OASIS Standard 2005 l Rollen: User agent (Principal) Identity

More information

How to Implement Enterprise SAML SSO

How to Implement Enterprise SAML SSO How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and

More information

OIO SAML Profile for Identity Tokens

OIO SAML Profile for Identity Tokens > OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

IBM WebSphere Application Server

IBM WebSphere Application Server IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

An SAML Based SSO Architecture for Secure Data Exchange between User and OSS

An SAML Based SSO Architecture for Secure Data Exchange between User and OSS An SAML Based SSO Architecture for Secure Data Exchange between User and OSS Myungsoo Kang 1, Choong Seon Hong 1,Hee Jung Koo 1, Gil Haeng Lee 2 1 Department of Computer Engineering, Kyung Hee University

More information

IAM Application Integration Guide

IAM Application Integration Guide IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document

More information

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH Identity opens the participation age Open Web Single Sign- On und föderierte SSO Dr. Rainer Eschrich Program Manager Identity Management Sun Microsystems GmbH Agenda The Identity is the Network Driving

More information

Single Sign On In A CORBA-Based

Single Sign On In A CORBA-Based Single Sign On In A CORBA-Based Based Distributed System Igor Balabine IONA Security Architect Outline A standards-based framework approach to the Enterprise application security Security framework example:

More information

Authentication and Single Sign-On. Patrick Hildenbrand NW PM Security, SAP AG

Authentication and Single Sign-On. Patrick Hildenbrand NW PM Security, SAP AG Authentication and Single Sign-On Patrick Hildenbrand NW PM Security, SAP AG Agenda Authentication and Identities Authentication with SAP in a Web Based Scenario At the SAP GUI for Windows Summary SAP

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

SAML Single-Sign-On (SSO)

SAML Single-Sign-On (SSO) C O L A B O R A T I V E I N N O V A T I O N M A N A G E M E N T Complete Feature Guide SAML Single-Sign-On (SSO) 1. Features This feature allows administrators to setup Single Sign-on (SSO) integration

More information

SAML and OAUTH comparison

SAML and OAUTH comparison SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single

More information

Deploying RSA ClearTrust with the FirePass controller

Deploying RSA ClearTrust with the FirePass controller Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you

More information

Egnyte Single Sign-On (SSO) Installation for OneLogin

Egnyte Single Sign-On (SSO) Installation for OneLogin Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin

More information

Software Design Document SAMLv2 IDP Proxying

Software Design Document SAMLv2 IDP Proxying Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: [email protected] This document is subject to the following license: COMMON DEVELOPMENT AND

More information

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]

More information

Liberty Alliance Project Setting the Standard for Federated Network Identity

Liberty Alliance Project Setting the Standard for Federated Network Identity Liberty Alliance Project Setting the Standard for Network Identity Privacy, Identity Management and Services using Liberty technologies in Mobile Environment. Identity Management Rise of electronic networks:

More information

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce. Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Security solutions Executive brief. Understand the varieties and business value of single sign-on. Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies

More information

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service

More information

Configuring Salesforce

Configuring Salesforce Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more

More information

Interoperable Provisioning in a Distributed World

Interoperable Provisioning in a Distributed World Interoperable Provisioning in a Distributed World Mark Diodati, Burton Group Ramesh Nagappan, Sun Microsystems Sampo Kellomaki, SymLabs 02/08/07 IAM 302 Contacts Mark Diodati ([email protected])

More information

SAML v1.1 for.net Developer Guide

SAML v1.1 for.net Developer Guide SAML v1.1 for.net Developer Guide Copyright ComponentSpace Pty Ltd 2004-2016. All rights reserved. www.componentspace.com Contents 1 Introduction... 1 1.1 Features... 1 1.2 Benefits... 1 1.3 Prerequisites...

More information

SAML Federated Identity at OASIS

SAML Federated Identity at OASIS International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for

More information

Axway API Gateway. Version 7.4.1

Axway API Gateway. Version 7.4.1 O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1

More information

RSA Solution Brief. Federated Identity Manager RSA. A Technical Overview. RSA Solution Brief

RSA Solution Brief. Federated Identity Manager RSA. A Technical Overview. RSA Solution Brief RSA Federated Identity Manager A Technical Overview Federated identity management extends the management of digital identities for authorization and access beyond domain and corporate boundaries to externally

More information

A Standards-based Mobile Application IdM Architecture

A Standards-based Mobile Application IdM Architecture A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted

More information

The saga of WebFTS and Federated Identity

The saga of WebFTS and Federated Identity The saga of WebFTS and Federated Identity Andrey Kiryanov IT/SDC 15/12/2014 The Reason: 2 What is a Federated Identity? It is the means of linking a person's electronic identity and attributes, stored

More information

Disclaimer. SAP 2008 / SAP TechEd 08 / SIM202 / Page 2

Disclaimer. SAP 2008 / SAP TechEd 08 / SIM202 / Page 2 SIM202 SAML 2.0 and Identity Federation Yonko Yonchev, NW PM Security SAP AG Dimitar Mihaylov, NW Security and Identity Management SAP Labs Bulgaria Tsvetomir Tsvetanov, Active Global Support SAP America

More information

Crawl Proxy Installation and Configuration Guide

Crawl Proxy Installation and Configuration Guide Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main

More information

Automated Testing of SAML 2.0 Service Providers. Andreas Åkre Solberg UNINETT [email protected] http://rnd.feide.no

Automated Testing of SAML 2.0 Service Providers. Andreas Åkre Solberg UNINETT andreas@uninett.no http://rnd.feide.no Automated Testing of SAML 2.0 Service Providers Andreas Åkre Solberg UNINETT [email protected] http://rnd.feide.no Background 0% of SAML 2.0 implementations do SAML 100% correct. SAML includes alot of

More information

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management

More information

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011 NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity

More information

Security Assertion Markup Language (SAML) V2.0 Technical Overview

Security Assertion Markup Language (SAML) V2.0 Technical Overview 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Security Assertion Markup Language (SAML) V2.0 Technical Overview Working Draft 10, 9 October 2006 Document

More information

Department Service Integration with e-pramaan

Department Service Integration with e-pramaan Department Service Integration with e-pramaan How to integrate a.net Application.NET specific integration details are provided in this document. Read e-pramaan Departments Integration Document before proceeding.

More information

Weblogic as a Service Provider for CERN Web Applications: APEX & Java EE

Weblogic as a Service Provider for CERN Web Applications: APEX & Java EE Luis Rodriguez Fernandez. CERN IT Weblogic as a Service Provider for CERN Web Applications: APEX & Java EE UKOUG 04/12/2013 [email protected] AGENDA About CERN Why SSO? CERN SSO The challenge: integrate

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Secure Identity in Cloud Computing

Secure Identity in Cloud Computing Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by

More information

SAML: The Secret to Centralized Identity Management

SAML: The Secret to Centralized Identity Management 1 of 7 1/10/2007 9:05 AM December 2004 http://www.intelligententerprise.com/showarticle.jhtml?articleid=54200324 SAML: The Secret to Centralized Identity Management Complicated by too many systems, too

More information

Research and Implementation of Single Sign-On Mechanism for ASP Pattern *

Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software

More information

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1 PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

NetIQ Access Manager. Developer Kit 3.2. May 2012

NetIQ Access Manager. Developer Kit 3.2. May 2012 NetIQ Access Manager Developer Kit 3.2 May 2012 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON DISCLOSURE

More information