Swisscom Mobile ID: Enabling an Ecosystem for Secure Mobile Authentication
|
|
|
- Griselda Jones
- 9 years ago
- Views:
Transcription
1 Swisscom Mobile ID: Enabling an Ecosystem for Secure Mobile Authentication
2 The GSMA represents the interests of mobile operators worldwide. Spanning more than 220 countries, the GSMA unites nearly 800 of the world s mobile operators with more than 230 companies in the broader mobile ecosystem, including handset makers, software companies, equipment providers and Internet companies, as well as organisations in industry sectors such as financial services, healthcare, media, transport and utilities. The GSMA also produces industry-leading events such as the Mobile World Congress and Mobile Asia Expo. Contents For more information, please visit the GSMA corporate website at or Mobile World Live, the online portal for the mobile communications industry, at Introduction 02 What is Mobile ID? 04 Authentication, not identification 06 Author: Alix Murphy With special thanks to: Adrian Humbel, Swisscom HP Waldegger, Swisscom & the Swisscom Mobile ID Team Daniel Gasche, PostFinance Bank Claudio Lombardi, PostFinance Bank Martin Moser, PostFinance Bank Joachim Vetter, Abacus Product Simplification 08 implified User Journey 12 Customer Care 16 Simple pricing 17 Developing the Ecosystem 19 Future services 23
3 Introduction In early 2013, Switzerland s leading operator, Swisscom, introduced Mobile ID, a fully managed strong authentication solution and a complete service package for enterprise and business, as well as individual users. Using a PKI- based, mobile signature secure encryption technology on the SIM card, Mobile ID has been recognised highly within the security community for combining smartcard level security with a sophisticated ease of use for customers wanting to transact across a wide range of industries, including online and mobile banking, insurance, pensions and HR processes, secure enterprise access, as well as government and public services (such as tax, social security, housing, healthcare). Guiding principles Our promise As a trustworthy companion in the digital world, we help our customers feel secure and at ease find what they re looking for quickly and simply experience and achieve extraordinary things. Swisscom we open up new possibilities. Within only a few months since launch, Mobile ID has now reached a user-base of 25,000, with steadily increasing adoption rates of around 10% each month. Much of this success may be attributed to simplified processes for customers in obtaining and using the authentication solution. However, a large degree of the success is due to Swisscom s determination to develop a broader ecosystem of partners and relying parties to ensure a strong market for the uptake of Mobile ID. Swisscom s unique approach to the positioning of Mobile ID within Switzerland s high securityconscious business community provides important lessons for the telecoms industry as it adopts and explores new trusted roles within the evolving digital economy. Equally, Swisscom s success in gaining rapid traction among users and business customers reveals key insights into the effective operationalisation and deployment of a managed secure authentication service as part of its core product offering. This case study follows the story of Mobile ID and explores the key success factors that allowed Swisscom to further solidify its position as a trusted brand among customers and partners. Beginning with the operator s pioneering strategy and rationale for a new identity product, the study explores the deliberate decisions taken by the Swisscom product team to ensure smooth integration, deployment and delivery of a product that has maintained a persistent level of uptake and satisfaction among users to date. In December and January , the GSMA s Personal Data team met with Swisscom to collect and expose these insights out to the broader mobile operator community. 2 Swisscom Mobile ID Swisscom Mobile ID 3
4 What is Mobile ID? Mobile ID is a PKI-based secure authentication service that enables users of business applications to access secure accounts, platforms, applications and cloud services in a single, unified mechanism. The service both simplifies the user experience and protects the individual s identity as they interact in the digital world. MOBILE ID USERS Employees Partners Customers Consumers Citizens LOGIN WITH MOBILE ID Using security features and functions integrated directly into the SIM card, Mobile ID combines smartcard level security with a user-friendliness that has been recognised in numerous security and consumer awards, including the Mobile Security category of the European Identity Awards in April Using a different login solution for each portal is a thing of the past. With Mobile ID on the SIM card, every mobile phone becomes an authentication tool. As a result, users have a single login solution for a wide variety of applications and one that is always to hand. COMPANIES Remote work stations, VPN, B2B portals, CRM / ERP systems, intranet application etc SERVICE PROVIDERS e-banking, e-health, e-shopping, web portals, mobile apps, cloud services, extranet applications etc AUTHORITIES e-government Swisscom Mobile ID for employees and partners (business applications) Swisscom Mobile ID for customers, consumers or citizens Swisscom s USP is the ability for the user to access services across multiple applications using just one PIN number, thus simplifying the user experience and encouraging persistent use across multiple platforms. Secure login for remote work stations Access control for data and enterprise applications (e.g. ERP) Protection of VPN access to company network Login to business-to-business and intranet portals Protection of web applications and single sign-on services Integration of mobile devices in CRM and ERP workflows Protection of terminal services and remote desktop Integration in complete solutions (e.g. authentication gateways and web application firewalls) Login to business-to-consumer and citizen-to-government platforms Login to online portals for banking, health, shopping, public sector, education, etc. Login to mobile apps Context-based transaction confirmation Protection of electronic financial transactions Protection of cloud services (e.g. software as a service) 4 Swisscom Mobile ID Swisscom Mobile ID 5
5 Key success factor: Authentication, not identification: A key difference in Swisscom s offering to that of other mobile signature services is the fact that, although the service uses PKI technology for authenticating the user, there is no actual identity element beyond the user s mobile number and the MSISDN. This means that, rather than making a statement to verify that John Smith is accessing x account at this exact moment (which entails a complex and rigid in-person identification process for the user), Mobile ID enables Swisscom to simply state to the relying party that the same user who established an account with service X (e.g. personal insurance account) is the same individual who is accessing this account now. Due to the strength of the PKI technology and the cryptographic hardware of the SIM, the authentication adheres to the highest level of assurance (Level 4, according to EU Level of Assurance standards), in asserting that the user is unique and the only one with ability to access the service. USER SWISSCOM SERVICE INTERNET APPLICATION SERVER SIM CARD KEY MATERIAL MOBILE NETWORK MOBILE ID SERVER MOBILE PHONE DIRECTORY After having spoken to our partner service providers and to the regulatory bodies here in Switzerland with regards to using certificates with the user credentials stored in them, we realised that this was not really necessary. And it did not match with the freedom we wanted for the Mobile ID in that the individual should be able to utilise Mobile ID for many purposes: they should be recognised as both an employee and an ordinary citizen and a bank account holder. If we had chosen to go ahead with the full mobile signature option from the beginning, this would have required many different certificates for each of these identities, and different PINs to remember for each one. HP Waldegger, Swisscom Mobile ID Business Consultant 6 Swisscom Mobile ID Swisscom Mobile ID 7
6 Key success factor: Product Simplification From the outset, the Swisscom team determined to ensure that the technical process guides would be open-source, allowing technicians and developers from every client enterprise to access documentation detailing every aspect of technical implementation (including signature codes) via the Swisscom website. The team at Swisscom understood that new business customers would need to evaluate Mobile ID on more than just the highest security criteria if it was going to prove a success. Far too often in the development of new technology products, the needs of IT infrastructure managers and web developers go overlooked, particularly when it comes to integrating the product with existing technical platforms. Underestimating the technical challenges involved in this integration process, or leaving the client to deal with these aspects of implementation, can lead to delays and sometimes significant challenges to the user experience The team developed a standard interface to connect applications and online portals of all kinds to the Mobile ID service (customer platforms, company networks, e-government, other cloud solutions, etc.). SOAP/HTTPS Secure SMS CUSTOMER ENVIRONMENT Integration mapping to a service provider environment via SOAP/ HTTPS protocol option (also includes SAML option) GSM GSM ENVIRONMENT Product-specific documentation designed to help you incorporate Mobile ID in environments with VPN, access gateways, business applications, cloud and collaboration services, etc., including for Google, Microsoft, Oracle, Cisco and others. Service Interface AP Application Server Internet & Lan-I MSS / Mobile Signature Service The Mobile ID interface is a web service (SOAP/XML). The protocol and data structures are based on ETSI-standard ETSI TS Three pieces of information must be provided for each authentication so that Mobile ID can be used: 1. Mobile number: To whom should the request be sent? 2. Text: What should be displayed on the user s mobile device? 3. Language: In which language should messages be displayed? MOBILE ID ENVIRONMENT Support for service providers and enterprises covers the following individual services: Maintenance of the Mobile ID service interface Customer service desk 24 hrs / 365 days Fault management Managed Service Defined service level agreement The use of this simple protocol gives service provider extreme flexibility for the future. We can build in additional functionality on top of the baseline authentication service: after the initial authentication with Mobile ID, why not introduce a second step with facial recognition, for example? Adrian Humbel, Head of Identity & Access Management, Head of Swisscom Mobile ID team 8 Swisscom Mobile ID Swisscom Mobile ID 9
7 Mobile ID Unsupported devices Version dated 9 December Errors and modifications reserved. Availability Mobile ID features a SIM card based application that is compatible with practically all devices. To be able to use Mobile ID, the SIM application toolkit (defined by GSM standard 11.14) must be installed on the device. All devices available from Swisscom are tested for Mobile ID compatibility. Swisscom is unable to provide any information on devices from other sources. Swisscom assumes no guarantee as to the availability and correct functioning of the SIM application toolkit on the devices. Important information On some devices the screen must be unlocked in order to receive and display Mobile ID requests. Non-supported devices HTC Comment 7 Trophy No SIM application toolkit HD7 No SIM application toolkit We have two specialists in our software team who are members of the Hacker Group in Berlin. They tested out the Swisscom Mobile ID and compared it with the Suisse ID and determined that they have the same level of security, only the Mobile ID system is much simpler. Nokia C No SIM application toolkit No SIM application toolkit Samsung Express Nexus S No SIM application toolkit No SIM application toolkit Omnia 7 No SIM application toolkit GT-S5830i Activation not possible Joachim Vetter, Head of Development and Customer Relationships for Abacus ZTE Tara 3G No SIM application toolkit For further information on Mobile ID, visit: Swisscom (Switzerland) Ltd, Corporate Business, PO Box, CH-3050 Berne, Tel , Sample of Swisscom s SOAP Client Reference guide All devices available from Swisscom are tested for Mobile ID compatibility. Mobile ID is already preinstalled on the SIM card as a SIM toolkit (STK) applet, which can only be accessed by the mobile provider over the air (OTA) via the correct identification key. As a result, Mobile ID works on all mobile devices that meet the GSM standard (GSM or 3GPP ), regardless of the operating system. Customers who use Mobile ID log in more often than customers who use another login PostFinance To guarantee the security of the STK applet and the initial SIM-specific key and subsequently generated user-specific key, Mobile ID is available on EAL5+ certified hardware. The latestgeneration SIM cards contain a cryptographic coprocessor and the Mobile ID SIM applications. Customer with Mobile ID Customer with Mobile ID Firewall Service Provider Connection Swisscom Mobile ID service Swisscom PK Encrypted SMS communications 10 Swisscom Mobile ID Swisscom Mobile ID 11
8 Key success factor: Simplified User Journey User experience is one of the most important factors which determines the ultimate success of a new product. In the case of Mobile ID, ease of use for the customer was paramount to this service offering, given the product s placement within the Swiss market alongside other high-end security authentication products. The Swisscom Mobile ID team were conscious to ensure that endusers had a postive experience at every step. 1 To order Mobile ID, the customer first is asked to check their mobile number against the Swisscom CRM database. By checking the customer s account details, Swisscom is able to ensure that the customer is in possession of the right handset. Our first customer was ourselves: Swisscom rolled out the service to its internal employees, which gave us some good insights into the user experience. In fact, there were several mistakes with the rollout which we could avoid with other customers, such as sending both the activation code and the new SIM in the post, which prevented a lot of people from activating it simply because they lost interest if they had to wait. We realised that the activation had to be online in the self-service portal. Swisscom Mobile ID Product Development team member 2 Their postal address is confirmed and a new Mobile ID SIM is sent via post. Rather than having to go into a Swisscom store in person to purchase and register for their new Mobile ID SIM, Swisscom customers can order it directly from the Swisscom website. Once the customer s account details and address are verified, a new Mobile ID SIM card is sent directly to their registered address via post. This simple process was in fact one of the more challenging steps to implement at first, due to the change in mindset that this required as a business that typically looks to maximise customer touch-point opportunities. 3 Once the customer receives their new Mobile ID SIM card, he or she is asked to activate their account. During activation, an individual RSA key is generated on the SIM card and the user defines his or her Mobile ID PIN. This PIN must be entered for every service provider request( e.g. a login). Upon activation, with this SIM card the mobile phone becomes the user s personal security token. 12 Swisscom Mobile ID Swisscom Mobile ID 13
9 It is fairly normal that we Swiss expect an electronic process in most things we do nowadays. Many are already at the stage where we believe that everything should be available on the web, so it seems archaic to require someone to physically go all the way into the shop to obtain something that is made for an electronic process. It should be available instantaneously. That s what we have tried to do with Mobile ID, but it did entail a big change in philosophy internally. Most of the work done in the last year has been about reducing the complexity that the team originally built. Another example was language support on the applet - now Mobile ID has the same language as the portal. But the most important element was making it much more user friendly with things like this and the online self-service portal. Adrian Humbel, Head of Identity & Access Management, Head of Swisscom Mobile ID team When the customer is using Mobile ID to log in to an account or authenticate themselves for a secure process, this principle of simplification is still maintained. The main processing steps that are performed by the end-user and the mobile signature service are described below: Do you want to log into Web Bank? Please enter your mobile ID PIN Y N ********* The end-user uses any application relying on Mobile ID for authentication, which sends a mobile signature request through the dedicated web interface of the authentication platform (AP), including the personal MSISDN as input parameter to login. The AP receives the end-user request, forms the contents to be signed (in accordance with the ETSI TS standard) and forwards the request to the MID service. The MID platform receives the signature request and validates the AP in accordance with the service agreement. The MID platform ensures that the end-user signature request is allowed and forwards the signature request to the end-user s mobile phone. The end-user gets a message on his mobile phone to sign the mobile signature request. The end-user signs the request by entering his Mobile ID PIN code. After the AP has received a valid electronic signature, the end-user will be granted access to the corporate application. The user-specific Mobile ID PIN is independent of the SIM PIN for normal mobile services and is automatically locked if an incorrect PIN is entered five times. It s always a balance between user experience, complexity and security, but of course we had to include a hardware element as this is really important for our banking-grade security. The SIM card as hardware solved one of our major problems. And you don t have to rely on a physical token: the Mobile ID is always handy, the mobile phone is something you always have with you. Msg SCREEN USER INTERFACE STA APPLICATION Operating system Baseband Encr (Msg) Mobile ID Backend server Daniel Gasche, Project Manager of Digital Products, PostFinance Encr (Msg) 14 Swisscom Mobile ID Swisscom Mobile ID 15
10 Key success factor: Simple pricing Works perfectly with Postfinance! Waiting now for UBS e-banking and other partners End user posted comment on Swisscom Support Community website Mobile ID is offered at a monthly price per user, with differentiation on whether the end-user is using the service in a B2B or B2C context: Mobile ID price per user (B2B): CHF 4.50 / month ( 3.70) Mobile ID price per user (B2C): CHF 1.00 / month ( 0.80) Key success factor: Customer Care The product team in Swisscom recognised early on that one of the most important components to making the Mobile ID service a success particularly in the early stages of deployment would be to ensure that the Operator s business customers had access to support services at all times. This meant having a dedicated business consultant embedded within the Swisscom Mobile ID team to be on call to support customers with any issues, ranging from technical integration queries to customer marketing advice Companies wishing to use Mobile ID for its employees are charged a one-off lump sum of CHF 1,500 for the activation, setup and provision (regardless of the number of users) and a fixed charge for provision of the interface, support, SLA and reporting is CHF 1,500/year. The costs for SIM cards and technical SMS communication are undertaken by Swisscom. For companies offering Mobile ID to their own customers as a secure authentication service (e.g. for logging in and accessing accounts and secure web pages), Swisscom allows the enterprise to determine their own customer charging models. For example, PostFinance, a leading Swiss bank, charges 9CHF for a 1 year subscription to Mobile ID. Equally, when it came to end users, Swisscom endeavoured to place as much support into a self-service portal as possible. If users forget their Mobile ID PIN or lose their phone, they can contact Swisscom Support via an automated customer help line, which enables the user to identify themselves via a number of different means. The user can prove his or her identity by means of an activation code sent to a previously stored address, and then receives a new certificate with the same run number in the certificate DN (pseudonym). If the user s identity cannot be confirmed, a new pseudonym/run number, and therefore a new digital identity, is issued for the user. From a financial point of view, this makes a huge difference as a call with a call centre can cost up to 50-60CHF, whereas this process now is free. In my opinion there are no disadvantages to Mobile ID, only advantages. Joachim Vetter, Head of Development and Customer Relationships for Abacus 16 Swisscom Mobile ID Swisscom Mobile ID 17
11 THE MOBILE ECONOMY 2014 Interview with Abacus Key success factor: Developing the Ecosystem Abacus is a leading software company in Switzerland and world renowned in the field of EAP (Enterprise Architecture Planning) software. The company currently has around 39,000 customers (small to medium enterprises ranging between employees), and approximately 150,000 users of their software services in total. The GSMA interviewed Joachim Vetter, Head of Development and Customer Relationships for Abacus, on their decision to use Mobile ID for their employees and partners: When it comes to ensuring safe access for its employees and partners, Abacus has always been committed to using solutions that did not entail simple username and password combinations. Many of our companies are working in the trusted accounts business (such as accountants and others in charge of bookings, financial records and HR processes) and use our software for their internal processes as well as for their own customers. Therefore, having trust in your authentication processes for digital tools is very important - it s part of the Swiss mentality we are very protective of our data on the web. We have two specialists in our software team who are members of the Hacker Group in Berlin. They tested out the Swisscom Mobile ID and compared it with the Suisse ID and determined that they have the same level of security, only the Mobile ID system is much simpler. The implementation was very simple. Testing and integration took around 2-3 months in total: we tested on our employees before rolling out to our customers. It was great there were no problems at all! From the users perspective it was very positive. Especially because Mobile ID is very handy the mobile is always with you. Then the actual implementation process took only 3-4 days. So far, it s been a great decision for us. Since we launched Mobile ID one year ago it s been running perfectly. We have received feedback from our partners and clients, which has all been very positive: users are satisfied with this solution, they find it very good to have mobile access all the time that is not dependent on additional piece of software or hardware. The only ones who are not happy are the non- Swisscom customers who don t have it yet! In my opinion, Swisscom Mobile ID will gain rapid traction in Switzerland because one of the major banks, PostFinance, now uses it and it seems to be gaining ground pretty quickly among a lot of businesses. For example, we are soon going to launch Mobile ID for our HR and salary tool, which is currently used by around 900,000 employees in Switzerland to manage and access their salary and employee benefits information via Abacus. With Mobile ID, they will also be able to access it safely in the cloud. We aim to launch this capability towards the middle of this year. One thing we are waiting for is to be able to allow users to sign documents digitally. This will be possible in April this year and we are already working on it together with Swisscom by providing specialist expertise to support it. In my opinion there are no disadvantages to Mobile ID, only advantages. In the early stages of product development, the Swisscom Mobile ID team set clear priorities for the development of Mobile ID as a tool for multiple industry sectors. By establishing a mutual partnership with well-known security software firm, AdNovum, Swisscom was able to immediately offer Mobile ID to a range of high profile enterprises, including some of Switzerland s leading banks, HR system providers and management consulting firms. In this way, developing the ecosystem has been a core part of Swisscom s Mobile ID strategy from the outset, recognising the long-term strategic benefits that come from being prepared to invest both time and resource to establishing partnerships across different sectors in the marketplace. As enterprise IT and security departments worldwide continue to grapple with bring-your-own-device challenges, Swisscom has successfully positioned itself as an integral part of the mobile security value chain and a trusted provider of personal data services. When we talked to Swisscom and started discussing the Mobile ID, we just thought it was a brilliant idea. Many of our clients were having a lot of trouble providing 2FA (second factor authentication) to their customers it is a big and growing trend as enterprises are trying to keep up with everyone using multiple devices. Through this partnership with Swisscom, we could combine our strengths to offer a simple solution that used all the Operator strengths of requisite hardware of the SIM, network and customer care, plus our trusted Nevis software and security engineering experience. Dr. Tom Sprenger, CTO, AdNovum 18 Swisscom Mobile ID Swisscom Mobile ID 19
12 SFR $ The ecosystem for whatever you do as an Operator is extremely important. Authentication and signature services are not just about identifying the customer, they are about trust. The most important thing when developing the ecosystem is maintaining this trust among your partners and customers in everything that you do. Adrian Humbel, Head of Identity & Access Management, Swisscom Time to Market without Ecosystem Management Fix & Variable Cost Revenue Sales & Marketing Fix Cost TIME A few core guiding principles helped the Mobile ID team stay focused on the partnerships that would drive scale most quickly in the Swiss market: Establish and maintain strong partnerships among secure firms Only approach industries / areas where strong authentication is absolutely needed (i.e. banking, secure enterprise access, government services) to ensure that Swisscom s reputation for security is maintained. At a later date, when uptake is more widespread, lower-level authentication services can be pursued. At the start, try to get a lighthouse account in each sector or vertical as a driver for more uptake within that sector and to ensure a wide range of applications within the whole market (e.g. banking, insurance, local government, federal government) Be ready to invest both financially and in terms of human effort in developing ecosystem partnerships. The indirect benefits to driving scale by treating ecosystem investment as a fixed cost can be significant and lead to quicker realisation of more sustainable revenues in the long run. Time to Market with Ecosystem Management SFR $ Revenue Fix & Variable Cost Ecosystem Management Cost Fix Cost TIME SFR $ The Swisscom Mobile ID team details its rationale for investment in ecosystem development from the beginning of product development by considering it as a fixed cost - this leads to a steeper rise in revenues and a shorter time to obtaining ROI. As the user base continues to grow and more service providers request Mobile ID for their customers, providing a ubiquitous service across the Swiss market will be an important factor in ensuring that adoption of the service continues to escalate. Swisscom recognised that enabling the other Swiss mobile operators to offer Mobile ID would be key to ensuring long-term success of Mobile ID for all Swiss customers. Ecosystem Management on Steroids: Own IP Revenue Fix & Variable Cost Own IP Cost Ecosystem Management Cost Fix Cost TIME 20 Swisscom Mobile ID Swisscom Mobile ID 21
13 Interview with PostFinance The GSMA spoke to the PostFinance team in charge of managing the implementation of Swisscom Mobile ID to understand why they chose to use and market the strong authentication service to their personal and enterprise banking customers. A few years ago we were already looking for a convenient and secure authentication service to access online banking, especially for mobile users, who were becoming a bigger segment of our customers. We had a very good business relationship with Swisscom from the beginning, which I think helped a lot in ensuring that we had a good communication process for both the technical implementation and commercial negotiations. Swisscom had already launched the business platform for Mobile ID for B2B services, but we were the first to use it as a customer-facing service, so we were prepared to work together with Swisscom to build these processes. One way we did this at first was by conducting a technical live test with our internal staff to prove that Mobile ID would work smoothly with our online banking system and so that customers would understand the end to end processes. By sharing the test results, we helped Swisscom to improve the customer experience of their new self-service web portal for customers to order and activate the Mobile ID SIM card. We don t get many phone calls to our customer care service this is a good sign, and in fact was one of our own internal criteria for indicating success. It seems that as soon as customers learn about Mobile ID and see how it works they are satisfied. We track our user logins and can clearly state that one of the most important indicators of success is that customers who use Mobile ID log in more often than customers who use another login. This is an important sign that typical authentication processes are a big challenge for users. Of course our goal is to offer our customers the most convenient solution. For the timebeing, however, we will continue offering Swisscom Mobile ID as one alternative way to for users to authenticate themselves, since it is not yet offered by the other Swiss mobile operators. With many thanks to Daniel Gasche, Project Manager of Digital Products, Claudio Lombardi, Product Manager, and Martin Moser, Marketing Manager at PostFinance Future services In January 2014, Swisscom released its latest evolution of the Mobile ID service: signature. Mobile ID signature is an all-in signing service, with the idea being that an individual can digitally sign any type of media in a legally binding manner (equivalent to a handwritten signature), including music and photos, yet still without requiring any further identity proofing than the original Mobile ID identifiers (the MSISDN and the mobile number). The mobile signature function works like a snapshot where at a certain given time we as Swisscom can say: at this time what we received refers to the original. If the item that was signed gets altered, we can immediately see th at it has been tampered with. This is part of the privacy enhancement: we as Swisscom do not see what has been changed within the document or file (we don t ever even see the original file) but we can confirm that it has been tampered with. We believe that this is an important service that all the mobile operators in Switzerland should provide. Think about it: it s a winwin for everyone if the pie grows larger. We are working to support the other Swiss mobile operators to launch Mobile ID so that the entire market will increase to +90% if all Operators provide the same service. Adrian Humbel, Head of Identity & Access Management, Head of Swisscom Mobile ID team This process is based on segregation of duty; we don t make judgements, but we put everything in the seal and hand it back. So if there is a dispute even 5 years later we can show that record. In this way, Mobile ID signature is a context oriented signature it generates a one-time-use certificate on the spot which expires rapidly. We believe that this will have a huge advantage in many business processes. That s the new way to sign. Adrian Humbel, Head of Identity & Access Management, Head of Swisscom Mobile ID team 22 Swisscom Mobile ID Swisscom Mobile ID 23
14 GSMA Personal Data Programme 7th Floor, 5 New Street Square, London, EC4A 3BF, United Kingdom [email protected] Web:
Secure and simple authentication via mobile phone
Mobile ID Secure and simple authentication via mobile phone Mobile ID provides your employees and customers with a convenient and secure way to login to applications and online portals. It also makes it
ADAPTIVE USER AUTHENTICATION
ADAPTIVE USER AUTHENTICATION SMS PASSCODE is the leading technology in adaptive multi-factor authentication, improving enterprise security and productivity through an easy to use and intelligent solution
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Self Service Portal and 2FA User Guide
Self Service Portal and 2FA User Guide Accessing Symantec Self Service Portal Self Service Portal (SSP) is a web-based application which you can use to register, test, reset, or remove Symantec VIP credentials.
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Nevis Secure Web Interaction
Nevis Secure Web Interaction Your Challenges Role-based Access Control End-to-End Security End-to-End Audit Trail Data Protection Delegated Administration Unauthorized Access Access Collaboration User
Trackunit Telematics Solution. for OEM
Trackunit Telematics Solution for OEM Trackunit Telematics is an indispensable tool for improving your business through a deeper understanding of machine usage and customer behaviour. It enables you to
Modern Multi-factor and Remote Access Technologies
Modern Multi-factor and Remote Access Technologies ANDREW BRICKEY Senior IT Engineer Identity and Access Management / Core Computing Services NLIT Summit 2016 May 11, 2016 1 Agenda Problem and solution
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003
Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13
TABLE OF CONTENTS Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13 Introduction Our world is more Mobile now than ever. In 2013
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
Passlogix Sign-On Platform
Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure
Two-Factor Authentication
Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained
Identity Relationship and Access Management for the Extended Enterprise
Identity Relationship and Access Management for the Extended Enterprise Benefits in External Identity Management CONTENTS Introduction... 3 Internal vs External identities... 3 Productivity vs Convenience...
Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance
Partner Capability Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance Company overview About us CCE is one of the UK s largest independent IT
Sage Integration Cloud Technology Whitepaper
Sage Integration Cloud Technology Whitepaper Sage Christian Rubach July 21, 2016 Abstract Sage is committed to providing businesses around the world the information, insight and tools they need to succeed.
External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy
External Authentication with CiscoSecure ACS Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business
How To Get Smart Cards From Atos
secure authentication and trusted identity delivering assurance and efficiency to every sector with CardOS Smart Card Solutions Your business technologists. Powering progress Delivering certainty through
Secure Authentication for the Development of Mobile Internet Services Critical Considerations
Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s
How much do you pay for your PKI solution?
Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.
Made for MSPs by an MSP
Made for MSPs by an MSP features & Pricing Guide THE END OF STICKY NOTE SECURITY www.passportalmsp.com lower costs improve security increase sales A cloud-based identity and password management solution
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
MECOMS Customer Care & Billing As A Service
MECOMS Customer Care & Billing As A Service MECOMS As A Service. Your pay as you grow meter-to-cash solution. Introducing MECOMS As A Service, an innovative customer management and billing solution for
MICROSOFT HIGHER SOLUTION
SOLUTIONS AT A GLANCE United States Higher Education Gr Canyon University () is a private Gr Canyon has approximately University () 41,500 is students, a private 111 Christian full-time college faculty
Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08
Signicat white paper Signicat Solutions This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Version 1.1 2015-08-20 Disclaimer Please note that this
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
Ericsson Mobile digital identity
Ericsson Mobile digital identity (Views on delivering solutions and the Business case for the banking and finance community) pedro calderon head of Product line Authentication & digital identity Ericsson
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Hard vs. Soft Tokens Making the Right Choice for Security
Hard vs. Soft Tokens Making the Right Choice for Security HSTE-NB0012-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
Cloud Computing - Benefits and Barriers for Retail Adoption
Original Published Research from Cobweb Solutions - Europe s Leading Cloud Services Provider Cloud Computing - Benefits and Barriers for Retail Adoption 28022011 v1.5 written by Ed Dixon Director of Enterprise
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845
Cortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
Future- Building a. Business: The Ultimate Guide. Business to
Building a Future- Proof Business: The Ultimate Guide to Moving Your Business to the Cloud Fluid IT Services 5601 Democracy Drive, Suite 265 Plano, TX 75024 Phone: (866) 523-6257 [email protected]
Hybrid for SharePoint Server 2013. Search Reference Architecture
Hybrid for SharePoint Server 2013 Search Reference Architecture 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views expressed in this document, including
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
Civil Contractors :Interview case study Industry: Construction
BUILDING PROJECT MANAGEMENT SOLUTIONS THE WAY PROJECT MANAGERS THINK Civil Contractors :Interview case study Industry: Construction How would you describe your business? We manage the construction of earthworks,
Why SMS for 2FA? MessageMedia Industry Intelligence
Why SMS for 2FA? MessageMedia Industry Intelligence MessageMedia Industry Intelligence Why SMS for 2FA? ii Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email
Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era
Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of
Proposal Document TitleDocument Version 1.0 TitleDocument
G-Cloud - Strong Authentication Service - Service Definition Proposal Document Author TitleDocument Version 1.0 TitleDocument Document publication date - 02/12/2014 Title Document Classification - Public
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
How To Build A Digital Business From The Ground Up
Powering Business Value and Seamless Experiences GSMA Mobile Connect Accelerator and API Exchange by Apigee Apigee Digital Value Chain for Network Operators and Service Providers APP DEVELOPER Wants to
Single Sign-On Portal User Reference (Okta Cloud SSO)
Single Sign-On Portal User Reference (Okta Cloud SSO) Contents Okta Single Sign-on Portal... 3 Initial account creation and configuration... 3 First time manual login to the Okta Single Sign-on Portal...
Frequently Asked Questions: Cisco Jabber 9.x for Android
Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail
COMPANY PROFILE OVERVIEW
Corporate Profile COMPANY PROFILE OVERVIEW Align your IT with your business THINK it Solutions TM is a leading specialist in the world of Information and Communications Technology (ICT).Offering dynamic
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
RETAIL COMMUNICATIONS
RETAIL SOLUTIONS RETAIL solutions RETAIL COMMUNICATIONS THE CHALLENGES Your employees are busy serving in-store customers, the phones are ringing unanswered; will missed calls result in missed sales opportunities?
Auth0 SSO Drives B2B Expansion
Auth0 SSO Drives B2B Expansion An Auth0 Customer Case Study auth0.com Setting up our application to integrate with one partner and then having that partner act as a service hub for dozens of identity systems
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
End-to-end Field Service Management
End-to-end Field Service Management Building end-to-end field service management solutions around your unique business processes Customer Self-Service Service Desk Software Workforce Scheduling Mobile
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107
Okta Identity Management for Portals Built on Salesforce.com An Architecture Review Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 Okta: A Platform for Cloud
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
BT Cloud Phone. A simpler way to manage your business calls.
. A simpler way to manage your business calls. Make and receive calls from anywhere with a phone system that s hosted in the cloud. Save on set-up, maintenance and call charges. Have reassurance that we
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
UBS KeyLink Quick reference WEB Installation Guide
ab UBS KeyLink Quick reference WEB Installation Guide Table of contents 1. Introduction 3 1.1. Why is an Installation needed? 3 1.2. Is UBS KeyLink secure? 3 1.3. Information about Secure Sockets Layer
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization
White paper: Unlocking the potential of load testing to maximise ROI and reduce risk.
White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. Executive Summary Load testing can be used in a range of business scenarios to deliver numerous benefits. At its core,
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
RSA SECURITY SOLUTIONS. Secure Mobile & Remote Access
RSA SECURITY SOLUTIONS Secure Mobile & Remote Access SECURE MOBILE & REMOTE ACCESS empower workforce mobility strengthen relationships & create new opportunities reduce exposure to network breaches support
Your guide to email marketing
Your guide to email marketing Precept 2016 Entering the world of email marketing can seem pretty daunting. Especially if your business has never done email marketing. But emails are actually a great way
Ubisecure. White Paper Series. e-service Maturity Model
Ubisecure White Paper Series e-service Maturity Model 2 e-service Maturity Model What we ve seen when we ve been dealing with the extranets and e-services, where companies can offer always available, easy-to-use
Take Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
Linux Web Based VPN Connectivity Details and Instructions
Linux Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
How to select the right Marketing Cloud Edition
How to select the right Marketing Cloud Edition Email, Mobile & Web Studios ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire customer lifecycle
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
Cloud? Should. My Business Be in the. What you need to know about cloud-based computing for your business. By Bill Natalie
Should My Business Be in the Cloud? By Bill Natalie T HE CLOUD. IT S BEEN A MAJOR topic of conversation for a few years now, and most of us are already leveraging it on a regular basis both at home and
A HIGH-LEVEL GUIDE TO EFFECTIVE IDENTITY MANAGEMENT IN THE CLOUD
A HIGH-LEVEL GUIDE TO EFFECTIVE IDENTITY MANAGEMENT IN THE CLOUD By Gail Coury, Vice President, Risk Management, Oracle Managed Cloud Services 2014 W W W. OU T S O U R C IN G - CEN T E R. C O M Outsourcing
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
White Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility
1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance
This way, Bluewin will be able to offer single sign-on for service providers within the circle.
Clareity Security and The National Association of Realtors Develop a SAML Toolkit for the Real Estate Industry Ask any REALTOR about the systems they use and the passwords they deploy. The word mess will
A new Secure Remote Access Platform from Giritech. Page 1
A new Secure Remote Access Platform from Giritech Page 1 Remote users have preferences G/On 5 works for Windows, Mac and Linux The G/On Client user experience is specific to the operating system Users
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Sage Abra HRMS. Abra HRMS Security Considerations
Sage Abra HRMS Abra HRMS Security Considerations August 2005 TABLE OF CONTENTS August 2005... 1 Introduction... 1 Abra Application Security Considerations... 1 Abra HRMS...1 Logon and Password Security...
