USING FEDERATED AUTHENTICATION WITH M-FILES

Size: px
Start display at page:

Download "USING FEDERATED AUTHENTICATION WITH M-FILES"

Transcription

1 M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0

2 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication with M-Files. The text covers key concepts that are closely or directly related to user authentication and federated identity, and briefly describes the federated authentication protocols and mechanisms that are compatible with M-Files. Finally, the article gives a rundown of the different M-Files identity federation solutions that enable the use of federated authentication with M-Files. Keywords: AD FS, Azure AD, LDAP, OAuth, SAML, authentication, federation, identity, user provisioning

3 Contents 1. Introduction Glossary and Acronyms Prerequisites M-Files Software Requirements Overview Login Types Key Concepts Computational Trust Digital Certificates Identity Providers Claims and Tokens Authentication and User Provisioning Benefits Protocols SAML OAuth LDAP WS-Federation Comparison Solutions Azure AD AD FS PingFederate Comparison Summary Change History Reference Documents... 15

4 1. Introduction In case your organization has been looking for a way for the users to authenticate themselves in M-Files by using, say, their Google account or some other commonly used online service, you found the right document. Authentication is needed, for instance, in logging in to M-Files vaults, as well as in electronic signing of workflow state transitions. The aim of this article is to describe the various ways for your organization to start using federated identity management, or federated authentication, with M-Files. Traditionally, the need to verify user identity has been met by using software-specific credentials or Windows credentials. Federated authentication offers organizations the possibility to use an authentication system that is completely external to M-Files. In many cases, having a centralized repository for all the M-Files user credentials completely outside the M-Files system can be very useful. Federated identity management also enables single sign-on, and provides the opportunity for the users to utilize their pre-existing credentials. This article is mainly targeted for M-Files system administrators or other personnel responsible for your organization's IT management and security. This and the following chapter, however, might also be useful for the M-Files end users. This chapter provides a general introduction to this document, along with a glossary and a list of prerequisites. The second chapter, Overview, explains 1) why you should consider using federated identity management, and 2) the relevant key concepts related to federated authentication. This is followed by the chapter Protocols, offering a technical description of the protocols behind the Solutions for federated authentication in M-Files. Finally, there is a brief Summary recapping the topics discussed in the article. There is also a list of helpful reference documents at the very end of the article Glossary and Acronyms This table explains the essential, subject-specific terminology and acronyms used in this article. TERM Federation Identity provider / Authorization server Service provider / Resource server DEFINITION The concept of two or more security domains agreeing to interact with each other, specifically letting users of one security domain access services in another security domain. The party that identifies and authenticates the user requesting access to a service provider resource. The party providing the service or a resource that the user wants to access. 4

5 1.2. Prerequisites Please make sure your environment meets these requirements before moving forward M-Files Software Requirements To be able to use the technologies described in this document with M-Files, make sure your M-Files software meets the requirements specified in the table below. M-FILES PRODUCT VERSION M-Files Desktop M-Files M-Files Server M-Files M-Files Mobile for ios M-Files Mobile for ios Q2/2015 Release (1.7.0) M-Files Mobile for Android M-Files Mobile for Android Q2/2015 Release (2.4.0) M-Files Mobile for WP M-Files Mobile for Windows Phone Q2/2015 Release ( ) 2. Overview M-Files offers a wide variety of ways for organizations to use federated identity management. These solutions are presented in the chapter Solutions, but let's first consider why your organization should probably start using federated authentication and how it actually works Login Types There are basically three ways of authenticating an M-Files user: Software-specific credentials (M-Files username and password) Windows credentials Federated authentication The traditional way of managing access rights to M-Files is by giving each user a login account with an M-Files username and password. These login accounts are stored on the M-Files server computer and may be associated with Windows credentials, thus enabling users to authenticate themselves in M-Files with the same credentials they use for logging in to Windows or their organization's domain. This also means that the user does not need to re-enter the credentials after logging in to Windows, and that no additional passwords are needed. In addition to these methods, the authentication data may be located outside M-Files Server. The login information may 1) be managed and synchronized by the organization's IT staff in an external repository, such as Azure AD, or 2) consist of purely external login details, such as credentials for Microsoft or Google accounts. In this document, we refer to this method as federated identity management, or federated authentication. 5

6 2.2. Key Concepts There are a few recurrent concepts tightly related to federated authentication that might help you better understand the technologies and solutions presented further below. Let's spend a few minutes getting to know these basics. Here is a brief overview of what happens when a user logs in to M-Files using federated authentication: 1. The user attempts to log in to M-Files and sends a login request to M-Files Server. 2. M-Files Desktop requests the identity provider to authenticate the user, and the identity provider requests for the user's credentials if they have not been previously provided. 3. M-Files Desktop delivers the access token from the identity provider to M-Files Server, and M-Files Server logs in the user after making sure the token can be trusted. Image 1: The authentication sequence and key concepts Computational Trust Trust is a big deal in relationships. Similarly in information technologies, whenever external actors are involved, one party must be able to trust the other so that cooperation can be undertaken with complete confidence. Computational trust largely corresponds to the notion we humans have when we speak of trust. That is to say, when we trust someone, we can expect them to speak the truth and deliver what was agreed upon. 6

7 Trust in the digital world is established via the authentication of the identities of the parties involved. For one party to perform an operation that everyone affected can trust upon, we need a trusted third party, a definite authority, to authorize the operation and tell everyone that the agent and the action can be trusted. Such authorization is generally orchestrated in the digital domain via digital certificates issued by a certification authority Digital Certificates The trust between an identity provider, such as Google or PingFederate, and the target application, in our case M-Files Server, is established by using a digital certificate. The certificate, issued by a trusted certification authority, and installed on both ends of a digital transaction, is a kind of electronic "passport" in the form of a cryptographic key proving that the information delivered by the identity provider to M-Files Server is legitimate. When the identity provider delivers an access token to M-Files Server, a digital certificate makes sure the information can be trusted Identity Providers Identity providers, or identity assertion providers, offer authentication for users requiring to log in to a system by providing identifiers that the system uses to authenticate the user. On top of that, they assert that the identifier carried by the user is genuine. Let's say that you have a Google account and want to use your Google credentials to log in to M-Files. In such a case, Google acts as the identity provider and supplies evidence of your successful authentication to M-Files, which in turn accepts the evidence as a form of authentication and lets you in without further validation. Some of the common identity providers include: Microsoft account Google PingFederate LinkedIn Twitter Yahoo! Claims and Tokens What is essentially happening in Image 1 (see further above), boils down to delivering a claim to M-Files Server: the identity provider claims that the user is who he or she declares to be, in other words, authenticates the user. M-Files Server trusts this claim as long as M-Files Server is capable of verifying the token with the same digital certificate. In a simple case, there is a single claim for instance one about the identity of a user but there could also be various others. This is why we need an "envelope", a token. The identity provider packages one or more claims to a token, signs the package and sends it to the requesting application, in this case M-Files Desktop. Finally, M-Files Desktop delivers the token to M-Files Server Authentication and User Provisioning User provisioning is a means to gather, store, manage and distribute user information across multiple systems. Provisioning is bidirectional, outbound and inbound, meaning that user data can be either provisioned from a user provisioning system to other systems or gathered from other applications to the user provisioning system. A user provisioning system consists of inbound and outbound connectors and an internal database where user data is represented as user objects. These objects are maintained with provisioning processes, such as auto-provisioning, auto- 7

8 deactivation and identity synchronization, in which user data is created, erased or updated automatically via monitoring inbound connections to the provisioning system and with user-initiated requests, such as self-service change or access requests and delegated access requests. A user provisioning system assigns access rights to users but it itself does not authenticate a user, i.e. verify that the user is who he claims to be. It is therefore important to make a distinction between user provisioning and authentication. User authentication is a process that establishes the identity of a user attempting to log in to a system, so that appropriate privileges can be granted to the user for accessing the system. Or, conversely, access to the system can be denied from unauthorized users. The authentication process, in the simplest terms, is a comparison of the credentials that a user has provided and user attributes stored in a provisioned user object. Therefore authentication and user provisioning go hand in hand. "Welcome to the party!" We can use a private party as an analogy. The person managing the guest list and the invitations is the one in charge of user provisioning, and the person waiting at the door, checking people's identification and comparing it with the names on the guest list is responsible for authentication. Without the guest list, there is nothing to authenticate against, and without the person at the door or the identification everyone, including unwelcome guests, would be allowed to join the party Benefits The current and future benefits of federated authentication are numerous. Perhaps the most obvious user benefit is that you do not need to create a separate user account to log in to M-Filer per se, as you can use your existing Google, AD, Microsoft or some other account to log in. That way also external users can take advantage of their existing accounts and gain immediate access to M-Files if they are authorized to do so, of course. Another important user benefit and user experience improvement is that with federated authentication and SSO logins, user sessions can be retained after a single login from one service to another, which offers a more streamlined user experience when users are not interrupted by login screens. Heightened privacy and security is also an advantage, as when you log in using federated authentication, you only present your user credentials to the identity provider, and never to M-Files itself. We take great pride in making sure that your user account or your files are never compromised, and with federated authentication, your credentials are never even passed to M-Files in the first place. If you consider knowledge-based authentication to be insufficient, you can also augment the security level by utilizing multifactor authentication, a security token, or any form of strong authentication. You yourself are in full control of all the aspects of identity management. From the developer's perspective, federated authentication protocols separate the security infrastructure from the software architecture, meaning that federated authentication essentially provides a cross-platform authentication solution since the security layer is always abstracted from specific platform implementations. Then again, from the administrative perspective, costs of maintaining user accounts are reduced when authentication and user account maintenance is transferred from the service provider to the identity provider. Similarly, the risk of user account information being compromised is transferred from the service provider to the identity provider. 8

9 3. Protocols SAML, OAuth, WS-Federation, and LDAP are protocols for communicating authentication data between an identity provider and a client application, essentially meaning that by using these protocols you can "outsource" your organization's identity management to the employees. In this chapter we give a rundown of each protocol and finally compare the protocols by highlighting key differences SAML Security Assertion Markup Language, or SAML for short, is an XML-based, open-standard data format for communicating authentication and authorization information between a party that provides user identities, i.e. an identity provider, and a party that provides the service that the user needs to log in to, i.e. a service provider. M-Files and later supports SAML V2.0 with HTTP POST Binding and HTTP Redirect Binding for M-Files Desktop and M-Files Web. HTTP POST Binding is a means of communication via HTML forms between the client, the service provider and the identity provider. HTTP Redirect Binding, on the other, communicates SAML data via URL query strings. SAML requests can be initiated by either the service provider or the identity provider. The figure below gives an overview of the authentication process using the SAML protocol: Image 2: Authentication flow with the SAML protocol. 1. Diego attempts to log in, and the client first sends an authentication request to the service provider. 2. The service provider creates an authorization request, which it sends to the identity provider. 3. Diego is redirected to the identity provider's login page where Diego provides their credentials and logs in. 4. After the credentials have been validated, the identity provider returns a response to the service provider in a SAML format that contains an assertion affirming that Diego has been authenticated. 5. The service provider verifies the SAML assertion and grants Diego access based on the authenticated token OAuth OAuth is an open-standard protocol used for authorizing access to resources on behalf of the user. The protocol allows, with the permission of the user, access tokens (in binary or JSON format) to be issued to clients by authorization servers, or 9

10 identity providers. The user can then use the token to access a third-party resource without providing their user credentials directly to the resource. The OAuth framework is designed specifically to work with the HTTP protocol. OAuth 2.0 authentication is supported in M-Files and newer for M-Files Desktop, M-Files Web and M-Files Admin, and in M-Files Mobile Q2/2015 releases. The OAuth authentication flow is similar to the SAML authentication process: Image 3: Authentication flow with the OAuth protocol. 1. On login, Phoebe is redirected to the identity provider login page (authorization server) with a request for authorization. Phoebe logs in and effectively authorizes the service provider to act on her behalf. 2. The service provider receives an authorization grant, which it forwards to the client. 3. The client uses the authorization grant to request an access token from the identity provider. 4. Provided that the authorization grant is valid, the identity provider grants an access token, which the client uses to request access to the service. 5. The service provider receives the access token and it either sends the token to the identity provider for validation or verifies the token against the identity provider certificate, depending upon the type of the token. If the token is valid, the identity provider sends back user claims to the service provider. 6. Phoebe is granted access to the service LDAP The Lightweight Directory Access Protocol (LDAP) is an application protocol for accessing and maintaining distributed directory services that share information about users, services and applications in the network. It is commonly used for implementing a SSO solution for users in a domain, so that a single set of user credentials are shared across several services in the network. LDAP can be used in M-Files for authentication in both on-premises and cloud environments. This is established by setting up an LDAP server that serves directory data in a network. Authentication with such a setup is accomplished using a simple bind operation where the credentials provided by the user are checked against a matching user object entry on the LDAP server. The below figure gives an overview of the authentication process using an LDAP server. 10

11 Image 4: Authentication flow using an LDAP server. 1. Harald logs in to M-Files to use a cloud vault. 2. The M-Files client encrypts Harald's credentials and sends them via M-Files Server to the LDAP server. 3. The LDAP server receives the credentials and matches the user name with a corresponding one that it should have in store. If a match is found, it validates the credentials and returns them to M-Files Server. 4. M-Files Server receives a confirmation about validated credentials and allows Harald to access the cloud vault WS-Federation Web Services Federation Language (WS-Federation) is an identity federation protocol that offers cross-domain authentication and authorization. It uses an approach based on WS-Trust, which is part of the Web Services Security set of standards, to offer a flexible identity federation architecture that can employ a number of different types of tokens for user authentication, including SAML tokens. The WS-Federation authentication flow is, to all intents and purposes, very similar to the SAML authentication process: Image 5: Authentication flow with WS-Federation. 1. Laura wants to log in to M-Files. 2. She is redirected from M-Files to the identity provider login page. 3. Laura, if she hasn't done so already, provides her user credentials to the identity provider and logs in. 11

12 4. The identity provider authenticates Laura's credentials to determine whether Laura is truly who she claims to be, and after successfully doing so, the identity provider sends a token to M-Files. The token includes user claims about Laura, which basically helps the service to determine what Laura is authorized to do once she's logged in. 5. M-Files receives the token from the identity provider and Laura is free to use M-Files once it has verified that the token is indeed authentic Comparison From the end user's point of view, we can conclude that the protocols introduced in this chapter offer a similar login experience. The crucial differences between the protocols therefore exist under the hood. The table below presents a comparison of the protocols presented in this chapter, and pinpoints the most important differences between them. PROTOCOL SOLUTION COMPATIBILITY M-FILES SUPPORT SCOPE SAML Azure AD, AD FS, LDAP, PingFederate M-Files Desktop, M-Files Web, M- Files Admin SAML is typically used for enterprise SSO solutions within an enterprise, enterprise to partner, or enterprise to cloud scenarios. OAuth Azure AD, AD FS (since Windows Server 2012 R2), LDAP, PingFederate M-Files Desktop, M-Files Admin and M-Files Mobile OAuth is typically used with web and mobile applications for delegated authorization of resources. LDAP AD FS, PingFederate M-Files Desktop and M-Files Web An LDAP server is typically used to provide single sign-on capabilities within a network. WS-Federation Azure AD, AD FS, PingFederate M-Files Desktop and M-Files Web with AD FS WS-Federation is typically used for identity federation in Microsoft enterprise environments. 4. Solutions This chapter lists and describes the various ways that allow you to start utilizing federated identity management with M-Files. The solutions are presented one by one and are followed by a comparison chart Azure AD Azure Active Directory (Azure AD) is a cloud-based identity management solution from Microsoft that offers comprehensive identity and access management tools for single sign-on login procedures to cloud and on-premises applications. Azure AD supports several different authentication and authorization protocols, including the ones introduced in this article: SAML, OAuth and WS-Federation. Azure AD can be used as an identity provider for M-Files 2015 with the SAML and OAuth protocols. M-Files also has an Azure AD synchronization plugin that can be used to import users and user groups from Azure AD to M-Files. The below figure illustrates how Azure AD serves as an identity provider, or an authorization server, for M-Files via the OAuth protocol: 12

13 Image 6: M-Files authentication flow with Azure AD using the OAuth protocol AD FS Active Directory Federation Services (AD FS) is an identity management service for Windows Server that uses a claims-based authentication to allow users to gain single sign-on access across trusted domains. In M-Files, AD FS can be used as an identity provider in a cloud environment where M-Files clients and user accounts reside in one domain and M-Files Server resides in another. AD FS enables cross-domain authentication so that M-Files Server can authenticate users from a different domain. AD FS uses WS-Federation, OAuth, and SAML as sign-in and authentication protocols and for issuing user claims. The below figure illustrates the cross-domain authentication procedure in M-Files using an AD FS server and an AD FS plugin on the M-Files Server side: Image 7: AD FS authentication flow. This type of approach that AD FS offers allows users from another domain to access M-Files without direct authentication and without the need for the server and the client side to share distributed user account information. 13

14 4.3. PingFederate PingFederate is an identity provider and a federation service that provides cross-domain SSO capabilities, identity management and API security. Its multiprotocol capability provides support for all the authentication protocols introduced in this article and it can also be integrated with other identity stores and cloud directory services, such as Active Directory and Azure AD. PingFederate is a full-fledged, highly configurable federation service offering high level of availability and integrability. It allows access decisions based on contextual data, such as device, time of day or location, and offers augmented authentication data with user information from other external data stores, among other things. PingFederate is well-suited for authentication in M-Files as it supports all the authentication protocols that are also compatible with M-Files, meaning that it can be used as an external identity provider for M-Files Desktop, Web, Admin and Mobile applications Comparison The table below highlights the capabilities of the solutions presented in this chapter. SOLUTION DESCRIPTION SCOPE TYPE Azure AD A cloud solution from Microsoft for identity and access management. Azure AD is used for cloud-based identity federation. Cloud-delivered identity management AD FS A software component for Windows Server operating systems, providing federated identity management and single sign-on capabilities. AD FS is typically used to provide SSO across trusted domains. On-premises bridge component for federated authentication PingFederate A multi-protocol federation service that provides cross-domain SSO capabilities, identity management and API security. PingFederate is used as an external identity provider for web applications. Web-centric IDaaS (Identity as a Service) 5. Summary Federated identity management allows user authentication to be handled by a third-party service provider. Federated authentication is based on a trust relationship between the identity provider and the service provider where user identification, authentication and requests between the parties are communicated with security tokens and authorization grants. Such an approach offers many benefits for end users, administrators as well as developers. Federated authentication offers a streamlined and highly configurable login experience for users, who can sign in to services using SSO and use different types of access control, including multi-factor authentication solutions. The use of external identity providers entails that user credentials are never stored in the client application, which improves security considerably. With federation, also the costs of maintaining user accounts are reduced since authentication and user provisioning are outsourced to the identity provider. M-Files 2015 and newer offer federated authentication support via several authentication and authorization mechanisms that enable you to use various federated authentication solutions with M-Files. You can delegate M-Files user authentication to SAML or OAuth compliant identity providers, or, if you are deeply invested in Active Directory, you can take advantage of the federation solutions offered by Microsoft to extend your Active Directory presence into the cloud for M-Files. 14

15 6. Change History The table below describes the essential changes by document version. VERSION DATE ESSENTIAL CHANGES Initial published version. 7. Reference Documents Refer to these documents for instructions on how to configure a specific protocol or solution for M-Files authentication: Configuring OAuth 2.0 for M-Files Authentication Configuring AD FS for M-Files Authentication Configuring LDAP for M-Files Authentication Configuring SAML v2.0 Authentication Against Azure AD Configuring Azure Active Directory Synchronization Plugin 15

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Identity. Provide. ...to Office 365 & Beyond

Identity. Provide. ...to Office 365 & Beyond Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Leveraging SAML for Federated Single Sign-on:

Leveraging SAML for Federated Single Sign-on: Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

Extend and Enhance AD FS

Extend and Enhance AD FS Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta. Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

SAML SSO Configuration

SAML SSO Configuration SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting

More information

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 Okta White paper Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-dint-053013 Table of Contents

More information

A Standards-based Mobile Application IdM Architecture

A Standards-based Mobile Application IdM Architecture A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted

More information

Perceptive Experience Single Sign-On Solutions

Perceptive Experience Single Sign-On Solutions Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

Securing SharePoint Server with Windows Azure Multi- Factor Authentication

Securing SharePoint Server with Windows Azure Multi- Factor Authentication Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 1, 2015 ISSN 2067 4074 Securing SharePoint Server with Windows Azure Multi- Factor Authentication Petru-Radu NARITA Department of Economic

More information

Getting Started with AD/LDAP SSO

Getting Started with AD/LDAP SSO Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Security Assertion Markup Language (SAML) Site Manager Setup

Security Assertion Markup Language (SAML) Site Manager Setup Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and

More information

HP Software as a Service. Federated SSO Guide

HP Software as a Service. Federated SSO Guide HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server

Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server This blog will explain how to use Microsoft Azure as a Federated Authenticator for WSO2 Identity Server 5.0.0. In this example

More information

Integrating Single Sign-on Across the Cloud By David Strom

Integrating Single Sign-on Across the Cloud By David Strom Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

IT Exam Training online / Bootcamp

IT Exam Training online / Bootcamp DumpCollection IT Exam Training online / Bootcamp http://www.dumpcollection.com PDF and Testing Engine, study and practice Exam : 70-534 Title : Architecting Microsoft Azure Solutions Vendor : Microsoft

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner

More information

Pick Your Identity Bridge

Pick Your Identity Bridge Pick Your Identity Bridge Options for connecting users and resources across the hybrid cloud Executive Overview Enterprises are increasing their use of software as a service (SaaS) for two principal reasons:

More information

Google Apps SSO to Office 365 Integration

Google Apps SSO to Office 365 Integration KETS Google Apps SSO to Office 365 Integration Kentucky Department of Education Version 1.6 4/21/2015 Google Apps for Education (GAFE) + Microsoft Active Directory Integration Introduction Welcome to the

More information

Google Apps SSO to Office 365 Integration

Google Apps SSO to Office 365 Integration KETS Google Apps SSO to Office 365 Integration Kentucky Department of Education Version 1.5 12/3/2014 Google Apps for Education (GAFE) + Microsoft Active Directory Integration Introduction Welcome to the

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support

Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support Learning & Development Specialist Customer Support Services Been with Microsoft for 7 years Professionally

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Egnyte Single Sign-On (SSO) Installation for OneLogin

Egnyte Single Sign-On (SSO) Installation for OneLogin Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin

More information

How To Use Salesforce Identity Features

How To Use Salesforce Identity Features Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

CLAIMS-BASED IDENTITY FOR WINDOWS

CLAIMS-BASED IDENTITY FOR WINDOWS CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with

More information

Federated Identity and Single Sign-On using CA API Gateway

Federated Identity and Single Sign-On using CA API Gateway WHITE PAPER DECEMBER 2014 Federated Identity and Single Sign-On using Federation for websites, Web services, APIs and the Cloud K. Scott Morrison VP Engineering and Chief Architect 2 WHITE PAPER: FEDERATED

More information

Speeding Office 365 Implementation Using Identity-as-a-Service

Speeding Office 365 Implementation Using Identity-as-a-Service August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com

More information

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Cloud-based Identity and Access Control for Diagnostic Imaging Systems Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology

More information

Copyright Pivotal Software Inc, 2013-2015 1 of 10

Copyright Pivotal Software Inc, 2013-2015 1 of 10 Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10

More information

SECUREAUTH IDP AND OFFICE 365

SECUREAUTH IDP AND OFFICE 365 WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that

More information

Advanced Configuration Administration Guide

Advanced Configuration Administration Guide Advanced Configuration Administration Guide Active Learning Platform October 2015 Table of Contents Configuring Authentication... 1 PingOne... 1 LMS... 2 Configuring PingOne Authentication... 3 Before

More information

TrustedX - PKI Authentication. Whitepaper

TrustedX - PKI Authentication. Whitepaper TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Building Secure Applications. James Tedrick

Building Secure Applications. James Tedrick Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS

More information

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management

More information

idp Connect for OutSystems applications

idp Connect for OutSystems applications idp Connect for OutSystems applications THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES

More information

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1 PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity

More information

Administering Jive Mobile Apps

Administering Jive Mobile Apps Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

OVERVIEW. DIGIPASS Authentication for Office 365

OVERVIEW. DIGIPASS Authentication for Office 365 OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility

More information

Federated Identity Management A Sevan White Paper

Federated Identity Management A Sevan White Paper Federated Identity Management A Sevan White Paper Federated Identity Management is a term widely used to refer to authentication and authorization of people or systems across independent organizations.

More information

White Paper. What is an Identity Provider, and Why Should My Organization Become One?

White Paper. What is an Identity Provider, and Why Should My Organization Become One? White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today

More information

JVA-122. Secure Java Web Development

JVA-122. Secure Java Web Development JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Glossary of Key Terms

Glossary of Key Terms and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which

More information

SINGLE & SAME SIGN-ON ASPECTS

SINGLE & SAME SIGN-ON ASPECTS SINGLE & SAME SIGN-ON ASPECTS OF AZURE ACTIVE DIRECTORY Harold Baele Senior ICT Trainer JULY 2, 2015 SLIDE 1 TRAINER INFO Harold Baele MCT at RealDolmen Education Harold.baele@realdolmen.com - @hbaele

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

OpenLogin: PTA, SAML, and OAuth/OpenID

OpenLogin: PTA, SAML, and OAuth/OpenID OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Copyright: WhosOnLocation Limited

Copyright: WhosOnLocation Limited How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and

More information

Office 365 deployment checklists

Office 365 deployment checklists Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.

More information

Microsoft Office 365 Using SAML Integration Guide

Microsoft Office 365 Using SAML Integration Guide Microsoft Office 365 Using SAML Integration Guide Revision A Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

Identity Federation Broker for Service Cloud

Identity Federation Broker for Service Cloud 2010 International Conference on Sciences Identity Federation Broker for Cloud He Yuan Huang 1, Bin Wang 1, Xiao Xi Liu 1, Jing Min Xu 1 1 IBM Research China {huanghey, wangbcrl, liuxx, xujingm}@cn.ibm.com

More information

Identity Implementation Guide

Identity Implementation Guide Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper

Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

Onegini Token server / Web API Platform

Onegini Token server / Web API Platform Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s

More information

WHITE PAPER. Active Directory and the Cloud

WHITE PAPER. Active Directory and the Cloud WHITE PAPER Active Directory and the Cloud HyperOffice, 2011 What is Active Directory? What are its benefits? Active Directory (AD) is a directory service created by Microsoft. Active Directory is popularly

More information

How To Manage A Plethora Of Identities In A Cloud System (Saas)

How To Manage A Plethora Of Identities In A Cloud System (Saas) TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS. Single Sign-On (SSO) Solution

UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS. Single Sign-On (SSO) Solution UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS Single Sign-On (SSO) Solution For University Information Systems (UIS) May 9, 2013 2 University of Colorado

More information

Adding Stronger Authentication to your Portal and Cloud Apps

Adding Stronger Authentication to your Portal and Cloud Apps SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well

More information

Connecting Users with Identity as a Service

Connecting Users with Identity as a Service Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user

More information

AVG Business Secure Sign On Active Directory Quick Start Guide

AVG Business Secure Sign On Active Directory Quick Start Guide AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and

More information

Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps

Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps Sofia Event Center 14-15 May 2014 Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps Radi Atanassov SharePoint MCM & MVP

More information

Cloud SSO and Federated Identity Management Solutions and Services

Cloud SSO and Federated Identity Management Solutions and Services Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com MOBILITY Transforming the mobile device from a security liability into a business asset. pingidentity.com Table of Contents Introduction 3 Three Technologies That Securely Unleash Mobile and BYOD 4 Three

More information

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

DocuSign Single Sign On Implementation Guide Published: March 17, 2016 DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents

More information

SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service

SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service Document Version: 1.0 2014-09-01 Content 1....4 1.1 Release s....4 1.2 Product Overview....8 Product Details.... 9 Supported Browser Versions....10 Supported Languages....12 1.3 Getting Started....13 1.4

More information

WHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO)

WHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO) WHITEPAPER NAPPS: A Game-Changer for Mobile Single Sign-On (SSO) INTRODUCTION The proliferation of mobile applications, including mobile apps custom to an organization, makes the need for an SSO solution

More information

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

White Paper. McAfee Cloud Single Sign On Reviewer s Guide White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.

EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole. KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings pc@kuppingercole.com October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single

More information

Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team

Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team Presented by: Tom Connolly, Jason Lieberman Company: BizTech Session ID: #10351 Overview Introductions Background Web

More information