T0 Federation Scaling through self service. September, Heath Marks, Manager AAF.
|
|
- Bryan Edwards
- 8 years ago
- Views:
Transcription
1 T0 Federation Scaling through self service September, Heath Marks, Manager AAF.
2 Big responsibility, small footprint The value of the AAF is a shared service for Australian Research and Education We allow our subscribers to undertake self service as much as possible to minimise support workload!
3 Cloud based approaches for easy participation in the AAF Help Desk Support framework Who do the users contact? Tools for Admins so they can self administer Self Defined Set of Attributes & Attribute Release policy Mechanisms for Fine Grained Access Control & Group Mgt Service Availability & Monitoring When IdP & SPs are up/down minimise workload, Some want mechanisms for Identity Assurance maximise value in what we deliver! Mechanisms for providing Access to collaborators not already in the AAF
4 auedupersonsharedtoken edupersonassurance edupersontargetedid mail cn displayname edupersonscopedaffiliatio organisationname AuthenticationMethod edupersonaffiliation edupersonentitlemen Australian Access Federation Inc.
5 Self Service Tool: Federation Registry the central management point for all AAF components, Identity Providers and Service Providers. It is accessible via the web for administrators and REST API for downstream systems
6
7
8
9 FR integrations for the AAF
10 Our TEST federation, please ignore number of down/unmonitored
11 What next? Providing access to collaborators Virtual Home Registry VHR There exists a community of researchers that are unable to take advantage of the services provided by the AAF because they are not a member of, or associated with an Organisation that is a subscriber to the AAF. Telling eresearch service providers that they need to find their own way to provide access to these cohorts is a barrier to adoption. (we have tried it for the last 3 years)..
12 VHR Key Benefits Increased functionality over that provided by the existing Virtual Home Organisation (VHO) Removal of technical and financial barriers to on-board small research groups into the federation Improved speed at which researchers will be able to gain access to federated services (removing technical barriers faced by smaller research groups and organisations wanting to gain access to federated services)
13 VHR Key Users 1. Small cohorts of researchers that do not belong to organisations subscribed to the AAF (e.g. research bodies) 2. Commercial researchers (that usually partner with AAF subscribers) 3. Citizen researchers that are associated with an AAF subscribed organisation 4. International researchers associated with an AAF subscribed organisation.
14 VHR - Deliverables 1. A complete user self-service web interface to request accounts, manage passwords, reset forgotten passwords 2. A mechanism for 2 factor authentication 3. Workflow and administrative interface for domain leaders to manage users 4. Workflow and administrative interfaces for supplying higher Levels of Identity Assurance to end users (2 nd identity for some?) 5. Usage reports 6. High availability architecture 7. Full integration into the AAF Federation Registry
15 How else can we self service our stakeholders? - LoIAR Level of Identity Assurance Register Pronounced lawyer Enables the assertion of end users with recognised higher levels of Identity Assurance. This will allow service providers to define the trust levels they require independently of the different IdP implementation states of AAF's subscribers.
16 LoIAR Key Benefits a web user interface that will allow researchers to register and request a higher level of identity assurance. Workflows built into the LoIAR will allow registration authorities (RA) to approve such requests based on personally identifiable information submitted by each researcher. Services can then retrieve researcher's approved Level of Identity Assurance from the LoIAR service using standard AAF interfaces to aid in access control decisionmaking.
17 LoIAR Key Deliverables web interface, workflow and Attribute Authority documentation for Service Providers defining how to query the LoIAR and perform access control decisions based on the result Development of policies and procedures for Registration Authorities to use when verifying a user s identity
18 End user flow for accessing federated eresearch services Institution Authentication Middleware eresearch Service Providers Authorisation eresearcher services registered in the AAF (owned and managed by Service Providers) Behind the scenes Authentication Institution owned and managed Identity Provider AAF MAGIC happens here
19 What happens when something doesn t work? Institution Authentication Middleware eresearch Service Provider? eresearcher?? eresearch Service Service Desk T3 T1 T2? Local Service Desk T3 T3 AAF Service Desk & Knowledge base
20 We want to further extend AAF capability to meet stakeholder expectations. Initiative Develop services to enable fine grained access control and group management for Service Providers edupersonentitlement Develop cloud-based approaches for participation in AAF Outcome Increased utility of the federation for eresearch services Reduced technical barriers for participation in AAF
21 Future Initiative 1: N ational E S ntitlement ervice Our subscribers would like to see a solution to ease the burden of implementing cross service, finegrained access control with values being transported via the edupersonentitlement attribute.
22 NES Proposed Features A central service that would act as a source of enhanced entitlement data for end users that supplements the existing, reliable personal information about end users that is already supplied from AAF Identity Providers. Entitlements provided by the NES would be able to be assigned to end users by experts in their relevant fields via the NES web front end without the need for involvement of IT helpdesks. Self-assigned entitlements (that are clearly delineated for security purposes) would also be able to be provided via the NES. This would allow users to indicate their interest in specific fields Technically services would see the NES as an Attribute Authority and access data via standard SAML 2 attribute queries after successful login via a users IdP. This work turbo charges the concepts found in our in development LoIAR application.
23 Future Initiative 2: AAF Hosted IdP solution The VHR forms the core interface for this Remove the technical barriers of installing, configuring and managing an IdP Increase our subscriber base to make it easier for new organisations to come on board
24 Web: Initiatives: FR: wiki.aaf.edu.au/federationregistry2/
25 AUEDUPERSONSHAREDTOKEN A unique identifier enabling federation spanning services such as Grid and Repositories.Values of the identifier are generated using a set formula. The value has the following qualities: o Unique o Opaque o Non-targeted o Persistent o Resolvable (only by an IdP that has supplied it) o Not re-assignable o Not mutable (refreshing the value is equivalent to creating a new identity) o Permitted to be displayed o Portable Format is 27 character PEM Base 64 Encoding with URL and Filename Safe Alphabet encoded string from a 160-bit SHA1 hash of a globally unique string. Padding character, =, is removed from the value. Australian Access Federation Inc.
SP-initiated SSO for Smartsheet is automatically enabled when the SAML feature is activated.
Chapter 87 Configuring Smartsheet The following is an overview of the steps required to configure the Smartsheet Web application for single sign-on (SSO) via SAML. Smartsheet offers both IdP-initiated
More informationConfiguring Parature Self-Service Portal
Configuring Parature Self-Service Portal Chapter 2 The following is an overview of the steps required to configure the Parature Self-Service Portal application for single sign-on (SSO) via SAML. Parature
More informationConnected Data. Connected Data requirements for SSO
Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated
More informationShibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User
More informationOnline eopf Self-service Feature for Login ID and Password Retrieval for New Users
For Employees Online eopf Self-service Feature for Login ID and Password Retrieval for New Users eopf provides web-based access for Federal personnel to view and print employment documents. Employees are
More informationAAA for IMOS: Australian Access Federation & related components
AAA for IMOS: Australian Access Federation & related components James Dalziel Professor of Learning Technology, and Director, Macquarie E-Learning Centre Of Excellence (MELCOE) Macquarie University james@melcoe.mq.edu.au
More informationThe future of eresearch user support
Supported by Member of Supported by AeRO - Australian eresearch Organisations The future of eresearch user support April 2013 Presented by Dean Nottingham AAF Australian Access Federation Provides a common
More informationAn overview of configuring Intacct for single sign-on. To configure the Intacct application for single-sign on (an overview)
Chapter 94 Intacct This section contains the following topics: "An overview of configuring Intacct for single sign-on" on page 94-710 "Configuring Intacct for SSO" on page 94-711 "Configuring Intacct in
More informationShibboleth Authentication. Information Systems & Computing Identity and Access Management May 23, 2014
Shibboleth Authentication Information Systems & Computing Identity and Access Management May 23, 2014 For every question an answer: Why should I care about SAML? What is a Shibboleth? What is a Federation?
More informationShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie
ShibboLEAP Project Final Report: School of Oriental and African Studies (SOAS) Colin Rennie May 2006 Shibboleth Implementation at SOAS Table of Contents Introduction What this document contains Who writes
More informationConfiguring. SugarCRM. Chapter 121
Chapter 121 Configuring SugarCRM The following is an overview of the steps required to configure the SugarCRM Web application for single sign-on (SSO) via SAML. SugarCRM offers both IdP-initiated SAML
More informationSCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service
Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and
More informationSingle Sign On at Colorado State. Ron Splittgerber
Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal
More informationAAF boost. AAF boost 2014 report for AAF EXAMPLE ORGANISATION
2014 AAF boost 2014 report for AAF EXAMPLE ORGANISATION This report focuses on the following 4 key areas to help boost your connection to the federation: Assurance; Awareness of federation tools; Your
More informationUser Management Interfaces for Earth Observation Services Abstract Test Suite
User Management Interfaces for Earth Observation Services Abstract Test Suite Primary Author Andrew Woolf, STFC Rutherford Appleton Laboratory Revision history Version Contributors Date Changes 0.1 Andrew
More informationThe Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
More informationCloudwork Dashboard User Manual
STUDENTNET Cloudwork Dashboard User Manual Make the Cloud Yours! Studentnet Technical Support 10/28/2015 User manual for the Cloudwork Dashboard introduced in January 2015 and updated in October 2015 with
More informationThis chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
More informationG Cloud 6 CDG Service Definition for Forgerock Software Services
G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform
More informationCLAIMS-BASED IDENTITY FOR WINDOWS
CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with
More informationMBAM Self-Help Portals
MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa
More informationIGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
More informationOpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
More informationAn overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview)
Chapter 190 WebEx This chapter includes the following sections: "An overview of configuring WebEx for single sign-on" on page 190-1600 "Configuring WebEx for SSO" on page 190-1601 "Configuring WebEx in
More informationHow To Make A Multi-Tenant Platform Secure And Secure
Authentication As A Service Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Jason Hart CISSP CISM VP Cloud Solutions What a great world Today's World
More informationAn overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview)
Chapter 83 WebEx This chapter includes the following sections: An overview of configuring WebEx for single sign-on Configuring WebEx for SSO Configuring WebEx in Cloud Manager For more information about
More informationUser-password application scripting guide
Chapter 2 User-password application scripting guide You can use the generic user-password application template (described in Creating a generic user-password application profile) to add a user-password
More informationGuideline on Implementing Cloud Identity and Access Management
CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National
More informationKentico CMS security facts
Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the
More informationIBM API Management Overview. 2014 IBM Corporation
IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential
More informationThis is the Department s service that creates and manages unique identities, manages usernames and passwords, and provides secure access to edupass.
These FAQs are specifically tailored to edupass for Students (i.e. Students and those who manage student user names and passwords [i.e. Principals / Delegated Administrators]). General What is identity
More informationBucks PSN. Updata Self-Service Portal User Guide. Version 1.0
Bucks PSN Updata Self-Service Portal User Guide Version 1.0 Updata Infrastructure Ltd Page 2 of 4 The Updata Self-Service Portal The Updata Self-service Portal is a web based online portal which enables
More informationSelf-Service Password Manager
WWW.ROSE-HULMAN.EDU/EIT OFFICE OF ENTERPRISE INFORMATION TECHNOLOGY Self-Service Password Manager Rose-Hulman Institute of Technology has implemented a self-service password manager that provides an easy-to-use
More informationPOSITION DESCRIPTION Senior Developer
Position Title: Closes: Salary Range/Classification: TBC TBC depending on qualifications and experience Term: Fixed-term till 31 December 2016 Contact: TBC Open to: The position is open to Australian citizens
More informationFederated Identity & Access Mgmt for Higher Education
Federated Identity & Access Mgmt for Higher Education Dr. Erik Vullings Program Manager Macquarie University s s E-Learning E Centre of Excellence (MELCOE) Erik.Vullings@melcoe.mq.edu.au 1/23/2006 1 Backing
More informationSAML single sign-on configuration overview
Chapter 34 Configurin guring g Clarizen Configure the Clarizen Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with Clarizen. Configuration also specifies how the application
More informationProtect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
More informationLepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with
Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3
More informationOpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
More informationIdentity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics
Identity, Privacy, and Data Protection in the Cloud XACML David Brossard Product Manager, Axiomatics 1 What you will learn The issue with authorization in the cloud Quick background on XACML 3 strategies
More informationConfiguring SuccessFactors
Chapter 117 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors
More informationService Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin
Service Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin Purpose of document The purpose of this document is to assist users in reset their USD passwords
More informationAutomated User Provisioning
Automated User Provisioning NOMINATING CATEGORY: ENTERPRISE IT MANAGEMENT INITIATIVES NOMINATOR: TONY ENCINIAS, CHIEF TECHNOLOGY OFFICER COMMONWEALTH OF PENNSYLVANIA 1 TECHNOLOGY PARK HARRISBURG, PA 17110
More informationEMBASSY Remote Administration Server (ERAS) Helpdesk Guide. ERAS Version 2.8 Document Version 0.0.0.2. http://www.wave.com
EMBASSY Remote Administration Server (ERAS) Helpdesk Guide ERAS Version 2.8 Document Version 0.0.0.2 http://www.wave.com ERAS v 2.8. Wave Systems Corp. 2010 Contents Contents... 2 1. Introduction... 3
More informationOAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
More informationSalesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationWhen millions need access: Identity management in an increasingly connected world
IBM Software Thought Leadership White Paper January 2011 When millions need access: Identity management in an increasingly connected world Best practice solutions that scale to meet today s huge numbers
More informationCloud Services. Sharepoint. Admin Quick Start Guide
Cloud Services Sharepoint Admin Quick Start Guide 3/12/2015 ACTIVATION An activation letter will be sent to the email account of your administrator contact. SharePoint will be part of your Cloud Control
More informationHow To Set Up Chime For A Coworker On Windows 7.1.2 (Windows) With A Windows 7 (Windows 7) On A Windows 8.1 (Windows 8) With An Ipad (Windows).Net (Windows Xp
INSTALLATION GUIDE July 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
More informationGLS Support Guide Tips and Tricks
GLS Support Guide Tips and Tricks NT14-28911, 3.0, 1/11/2014 Ascom. All rights reserved. TEMS is a trademark of Ascom. All other trademarks are the property of their respective holders. NT14-28911, 3.0,
More informationIncrease the Security of Your Box Account With Single Sign-On
A Box White Paper Increase the Security of Your Box Account With Single Sign-On Box s high level of security, 24x7 support and 99.9% uptime are critical for us. The biggest benefits are the reliability
More informationGuide to Getting Started with the CommIT Pilot
Guide to Getting Started with the CommIT Pilot Fall 2013 2 Table of Contents What is the CommIT Pilot?... 3 What is the scope for the Pilot?... 3 What is the timeframe for the Pilot?... 5 What are the
More informationB2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
More informationHelp Desk Self Service Quick Start Guide
Help Desk Self Service Quick Start Guide Introduction Faculty and Staff can submit support tickets via Help Desk Self- Service. This will give users more control over how they submit helpdesk tickets and
More informationCopyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
More informationGetting the Most From. Your Help Desk
. Turbo-IT Corporation 103 West Second Street Irving, Texas 75060 http://www.turbo-it.com turbo-it Corporation Getting the Most From.......... Your Help Desk Cost Reduction Strategies for Service Desk
More informationResearch Management System. User Guide Introduction to RMS Target Audience New and Current Users
Research Management System User Guide Introduction to RMS Target Audience New and Current Users Contents Introduction... 3 PART 1 RMS Significant Changes... 3 PART 2 General... 4 2.1 Login for Current
More informationThis section includes troubleshooting topics about certificates.
This section includes troubleshooting topics about certificates. Cannot Remove or Overwrite Existing, page 1 Cannot Remove an SSO IdP Certificate, page 2 Certificate Chain Error, page 2 Certificate Does
More informationOPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
More informationSafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
More informationOffice 365 deploym. ployment checklists. Chapter 27
Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of
More informationDOMAIN CENTRAL HOSTING EMAIL
Welcome to our hosting services, we have created the following documents to help you get up and running as quickly as possible. If at any stage you encounter difficulties, you are welcome to send a help
More informationManageEngine ADSelfService Plus. Evaluator s Guide
ManageEngine ADSelfService Plus Evaluator s Guide Table of Contents Document Summary:...3 ADSelfService Plus Overview:...3 Core Features & Benefits:...4 ADSelfService Plus Architecture:...5 Admin Portal:...
More informationVirtual Cabinet Document Portal User Guide
Virtual Cabinet Document Portal User Guide Contents / Introduction Introduction... 2 What to expect when publishing a document... 3 Having difficulty? Troubleshooting guide.... 7 The Virtual Cabinet Document
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationConfiguring Salesforce
Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
More informationTurnitin User Guide. Includes GradeMark Integration. January 2014 (revised)
Turnitin User Guide Includes GradeMark Integration January 2014 (revised) Copyright 2014 2 Contents Contents... 3 Turnitin Integration... 4 How This Guide is Organized... 4 Related Documentation... 4 Campus
More informationSECURE YOUR WINDOWS ENTERPRISE WITH STRONG PASSWORD MANAGEMENT
Specops Software presents: SECURE YOUR WINDOWS ENTERPRISE WITH STRONG PASSWORD MANAGEMENT By Derek Melber, MCSE, MVP Secure Your Windows Enterprise with Strong Password Management... 3 Windows Default
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract
More informationQualtrics Single Sign-On Specification
Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by
More informationSwivel Secure and the Cloud
Swivel Secure and the Cloud Authentication for Cloud Application Abstract This document describes the issues relating to authenticating to cloud applications and how the Swivel authentication platform
More informationLeveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
More informationNetIQ Identity Manager
NetIQ Identity Manager Management Guide October 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
More informationHR Helpdesk & Case management
itouch Vision HR Helpdesk & Case management This document gives an overview of Case management for HR and discusses the different features and functionality. For further information, about implementation
More informationSet Up Certificate Validation
About Certificate Validation, page 1 About Certificate Validation Cisco Jabber uses certificate validation to establish secure connections with servers. When attempting to establish secure connections,
More informationMY1LOGIN SOLUTION BRIEF: PROVISIONING. Automated Provisioning of Users Access to Apps
MY1LOGIN SOLUTION BRIEF: PROVISIONING Automated Provisioning of Users Access to Apps MY1LOGIN SOLUTION BRIEF: PROVISIONING Automated Provisioning of Users Access to Apps The ability to centrally provision
More informationConfiguring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
More informationEntrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
More informationMy Private Cloud. Project Objectives
My Private Cloud David W Chadwick University of Kent 1 Dec 2011 IEEE CloudCom 2011 1 Project Objectives Migrate (as much as possible in 6 months of) the trust, security and privacy preserving infrastructure
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
More informationNCID User Guide Version 1.8. Office of Information Technology Services As of July 26, 2011
NCID User Guide Version 1.8 Office of Information Technology Services As of July 26, 2011 Document History Version Change Reference Date Author 1.0 Initial draft release 9/16/10 Heather Ferrie Update w/
More informationMonash Health Self Service
Monash Health Self Service Table of Contents Monash Health Self Service Password Reset \ Account Unlock via a Non-Monash Workstation... 2 Monash Health Self Service Password Reset \ Account Unlock via
More informationYubiKey Authentication Module Design Guideline
YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company
More informationUniversity of Leeds, VLE Service 2006 User Management Development Phase 1. Software Design Specification
University of Leeds, VLE Service 2006 User Management Development Phase 1 Software Design Specification Author: Jon Maber Client: The University of Leeds, VLE Service Date: July 2006 Purpose of this Document
More informationOffice 365 deployment checklists
Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.
More informationSAML single sign-on configuration overview
Chapter 46 Configurin uring Drupal Configure the Drupal Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with a Drupal-based web application. Configuration also specifies
More informationVector HelpDesk - Administrator s Guide
Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Configuring and Maintaining Vector HelpDesk version 5.6 Vector HelpDesk - Administrator s Guide Copyright Vector Networks
More informationAn Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationSELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any
More informationIDAM Most frequently encountered messages / known issues document
IDAM Most frequently encountered messages / known issues document Amendment History Version Date Comment By 0.1 20-Dec-2012 Initial version Madhusudan Kappaganthula SharePoint location https://wss2.bp.com/dct/functions/teams/diessl/idam/operational%20processes/forms/allitems.aspx?
More informationDPH TOKEN SELF SERVICE SITE INSTRUCTIONS:
DPH TOKEN SELF SERVICE SITE INSTRUCTIONS: The purpose of this document is to provide users with assistance on resolving connection issues with Department of Public Health (DPH) Entrust tokens. These instructions
More informationOpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
More informationUnderstanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk
More informationHR Helpdesk. itouch Vision. This document gives an overview of itouch Vision s HR Helpdesk and discusses the different features and functionality.
itouch Vision HR Helpdesk This document gives an overview of itouch Vision s HR Helpdesk and discusses the different features and functionality. For further information, about implementation and pricing
More informationPassword Manager. Version 3.4.2. Password Manager Quick Guide
Password Manager Version 3.4.2 Password Manager Quick Guide Document Title Password Manager Quick Guide Document Classification Public Document Revision C Document Status Final Document Date April 16,
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
More informationSelf-service password management user guide
King s College London IT Services Self-service password management user guide v1.04 26 January 2016 Contents How to register for online services and self-service password management... 2 How to reset your
More informationPassword Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist
Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing
More informationAdding Federated Identity Management to OpenStack
Adding Federated Identity Management to OpenStack David Chadwick University of Kent 3 December 2012 University of Kent 1 Some Definitions What is Identity? A whole set of attributes that in combination
More informationConfiguring. SuccessFactors. Chapter 67
Chapter 67 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors
More information