Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0
|
|
|
- Megan Bell
- 9 years ago
- Views:
Transcription
1 sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0
2 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models... 6 Taxonomy... 6 Usage Scenarios... 7 Single Sign On Authentication Subscriber initiated... 7 Single Sign On Authentication Provider initiated... 8 Industry Call to Action... 9 References
3 Legal Notice This Open Data Center Alliance SM Usage Model: Single Sign On Authentication is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS WHO ARE NOT OPEN DATA CENTER ALLIANCE PARTICIPANTS: Non-Open Data Center Alliance Participants only have the right to review, and make reference or cite, this document. Any such references or citations to this document must give the Open Data Center Alliance, Inc. full attribution and must acknowledge the Open Data Center Alliance, Inc. s copyright in this document. Such users are not permitted to revise, alter, modify, make any derivatives of, or otherwise amend this document in any way. NOTICE TO USERS WHO ARE OPEN DATA CENTER ALLIANCE PARTICIPANTS: Use of this document by Open Data Center Alliance Participants is subject to the Open Data Center Alliance s bylaws and its other policies and procedures. OPEN CENTER DATA ALLIANCE SM, ODCA SM, and the OPEN DATA CENTER ALLIANCE logo SM are service marks owned by Open Data Center Alliance, Inc. and all rights are reserved therein. Unauthorized use is strictly prohibited. This document and its contents are provided AS IS and are to be used subject to all of the limitation set forth herein. Users of this document should not reference any initial or recommended methodology, metric, requirements, or other criteria that may be contained in this document or in any other document distributed by the Alliance ( Initial Models ) in any way that implies the user and/or its products or services are in compliance with, or have undergone any testing or certification to demonstrate compliance with, any of these Initial Models. Any proposals or recommendations contained in this document including, without limitation, the scope and content of any proposed methodology, metric, requirements, or other criteria does not mean the Alliance will necessarily be required in the future to develop any certification or compliance or testing programs to verify any future implementation or compliance with such proposals or recommendations. This document does not grant any user of this document any rights to use any of the Alliance s trademarks. All other service marks, trademarks and trade names referenced herein are those of their respective owners. Published April,
4 sm Open Data Center Alliance Usage: Single Sign On Authentication REV. 1.o Executive Summary Many organizations that are considering purchasing cloud-based services already have fully integrated identity management (IdM) systems. These systems are normally widely connected throughout the internal systems of an organization and allow single sign on (SSO) connectivity to enterprise systems. As resources in the cloud become more prevalent in the enterprise users will expect this single sign on capability to be maintained. SSO represents a specific model of identity federation and is described here to permit organizations to undertake the initial elements of identity federation when purchasing cloud services. This usage model will identify recommended elements of a SSO transaction between the cloud subscriber and the cloud provider, as well as demonstrating the recommended mechanisms for communicating during a SSO transaction. This document serves a variety of audiences. Solution providers and technology vendors will benefit from its content to better understand customer needs and tailor service and product offerings. Standards organizations will find the information helpful in defining end-user relevant and open standards. Organization for the Advancement of Structured Information Standards (OASIS) Security Assertion Markup Language (SAML) standards will be used throughout this usage model. 4
5 Reference Framework The following diagram shows a framework of the functional areas of identity management. This framework provides a reference model for the usage models described below. This usage model covers the single sign on element of identity management. Identity and Access Management Framework Identity and Access Management Identity Lifecycle Management Identity and Authentication Management Authorization and Permission Lifecycle Management Authorization and Permission Management Identity Governance Identity Creation/ Validation Identity Federation Entitlement Externalization Access Control Services Confirm Validation Identity Provisioning (add/modify/delete) Directory Services / User Repositories Entitlement Provisioning Policy Enforcement Point (PEP) Auditing and Reporting Mover / Leaver Process Authentication Mover / Leaver Process Policy Decision Point (PDP) Monitoring Strong Authentication Role Mining and Discovery Weak Authentication Reporting for Audit / Compliance Checks Sign On Multiple Sign On Reduced Sign On (web, desktop) Single Sign On Credential Management Policy Enforcement Point (PEP) 5
6 Applicability This usage model is applicable to Software as a Service (SaaS) and may in some models also be applicable to Platform as a Service (Paas) and Infrastructure as a Service (IaaS). The usage model should be applied in the case of Silver, Gold, and Platinum levels of security, as defined in the ODCA Provider Assurance Usage Model 1, being required. Correlation of applicability to other use models can be found in the ODCA Identity Management Interoperability Guide 2. Related Usage Models This usage model is referenced from the ODCA Identity Management Interoperability Guide 2. This guide demonstrates the relationships between the different elements of identity management. The ODCA Single Sign On Usage Model should be read in conjunction with the interoperability guide. General requirements for the levels of security required in cloud solutions can be found in the ODCA Provider Assurance Usage Model 1. Taxonomy Actor Name Cloud Subscriber Cloud Subscriber User Cloud Subscriber Administrator Cloud Provider Identity Provider Description A person or organization that has been authenticated to a cloud and maintains a business relationship with a cloud. A user of a cloud subscriber organization who consumes the cloud service provided by the cloud provider as an end user. For example, an organization s user who is using a SaaS service the organization subscribes to would be a cloud subscriber s user. An administrator type of user of a cloud subscriber organization that performs (cloud) system related administration tasks for the cloudcubscriber organization. An organization providing network services and charging cloud subscribers. A (public) cloud provider provides services over the internet. An entity that is responsible for establishing and maintaining the digital identity associated with a person, organization, or (in some cases) a software program. [e.g., National Strategy for Trusted Identities in Cyberspace (NSTIC)] InteropGuide_Rev1.0_final.pdf 6
7 Usage scenarios Single Sign On Authentication Subscriber Initiated In this usage model the cloud subscriber user is already logged onto the corporate network using the credentials required by the cloud provider application. Access to the cloudprovider application is through a web page hosted on a cloud subscriber internal web site. Actors: cloud subscriber, cloud provider, cloud subscriber user Goal: The cloud subscriber user requires access to a cloud provider application without the need to re-authenticate to the application. Assumptions: The following assumptions are made regarding authentication: Assumption 1: The identity provider will be the cloud subscriber. Assumption 2: The service provider will be the cloud provider. Assumption 3: The cloud subscriber user identity has been provisioned into the cloud provider s system. Assumption 4: A prior trust relationship has been created between the cloud provider and the identity management system of the cloud subscriber. Assumption 5: The cloud subscriber user has successfully authenticated to the cloud subscriber identity management system. Assumption 6: The interactions defined below are to be carried out in a timely manner. The maximum delay in transaction time should be defined in the contract. Success Scenario: A cloud subscriber user is able to authenticate to a cloud provider s system or application without the need to re-authenticate. Steps: 1. The cloud subscriber user accesses the cloud provider resource through a cloud subscriber based web page. 2. The cloud subscriber web page passes the digitally signed SAML authentication assertion as part of the transaction. 3. The cloud provider application verifies the level of access for the cloud subscriber user. 4. The cloud provider grants appropriate level of access to the cloud subscriber user. Failure Condition 1: The cloud provider s system does not receive the SAML authentication assertion of the cloud subscriber user. Failure Handling 1: The cloud provider s system should provide an appropriate error message back to the cloud subscriber user. 7
8 Single Sign On Authentication Provider Initiated In this usage scenario the cloud subscriber user connects to the cloud provider application directly through a web page hosted on the cloud provider web site. Actors: cloud subscriber, cloud provider, cloud subscriber user Goal: The cloud subscriber connects first to the application of a cloud provider and goes through a standard web based authentication and is allowed access to the application. Authentication information is only stored in the cloud subscriber identity management system. Assumptions: The following assumptions are made regarding authentication: Assumption 1: The identity provider will be the cloud subscriber. Assumption 2: The service provider will be the cloud provider. Assumption 3: The cloud subscriber user identity has been provisioned into the cloud provider s system. Assumption 4: A prior trust relationship has been created between the cloudprovider and the identity management system of the cloud subscriber. Assumption 5: The cloud subscriber has a web based authentication system available to the cloud subscriber user. Assumption 6: The interactions defined below are to be carried out in a timely manner. The maximum delay in transaction time should be defined in the contract. Success Scenario: A cloud subscriber user is able to authenticate to a cloud providers system or application using existing enterprise authentication information. Steps: 1. The cloud subscriber user accesses a cloud-based resource through the Internet with no associated SAML authentication assertion. 2. The cloud provider forwards the cloud subscriber user to a web page based on the cloud subscriber website that permits the cloud subscriber user to enter enterprise authentication information. 3. The cloud subscriber s identity management system validates the cloud subscriber user. 4. The cloud subscriber s identity management system forwards a SAML authentication assertion to the cloud provider. 5. The cloud provider application verifies the level of access for the cloud subscriber user. 6. The cloud provider grants appropriate level of access to the cloud subscriber user. Failure Condition 1: The cloud provider s system does not receive the SAML authentication assertion of the cloud subscriber user. Failure Handling 1: The cloud provider s system should provide an appropriate error message back to the cloud subscriber user. 8
9 Industry Call to Action The following further actions are required: The ODCA requests providers of identity management systems for the enterprise and cloud to produce reference models and proof-ofconcept implementations that will show compliance to this requirement. References OASIS Service Provisioning Markup Language (SPML) Version 2 4 OASIS Security Assertion Markup Language (SAML) Version 2 5 Any use or other implementation of the above cited OASIS markup language specifications / protocols ( OASIS Language ) are subject to any and all intellectual property rights and other rights held by, and any other limitations or restrictions which may be asserted by, OASIS and/or its members as the owner or owners of said OASIS Language ( Proprietary Rights ). ODCA takes no position regarding the validity or scope of any such Proprietary Rights that might be claimed or asserted by OASIS and/ or its members which may pertain to the use or other implementation of said OASIS Language or the extent to which any license of any such Proprietary Rights might or might not be available; nor does it represent that it has made any independent effort to identify any such Proprietary Rights. Each user and implementer of the OASIS Language is solely responsible for obtaining any and all licenses which may be needed in order to use or otherwise implement said OASIS Language. Requests for information regarding the Proprietary Rights and any applicable licenses should only be directed to OASIS and should not be made to the ODCA. Copies of any Proprietary Rights disclosures that may have been made, or potential licenses to be made available, or the result of an attempt made to obtain a license or other permission for the use or implementation of such Proprietary Rights by any implementer or user of the OASIS Language should only be directed to OASIS. This reference to, or citation of, the OASIS Language is provided on an AS IS basis and THE OPEN DATA CENTER ALLIANCE AND ITS PARTICIPANTS AND MEMBERS HEREBY DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, ANY WARRANTY THAT THE USE OR OTHER IMPLEMENTATON OF THE OASIS LANGUAGE (AS DEFINED ABOVE) WILL NOT INFRINGE ANY PROPRIETARY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0
sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...
Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0
sm Open Data Center Alliance Usage: Identity Interoperability Guide rev. 1.0 Open Data Center Alliance Usage: Identity Interoperability Guide Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary...
OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS
OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS Version Date Editor Description of Change 1.0 27 Aug 2014 Security WG Initial release Contributors Christophe Gévaudan UBS Tino Hirschmann
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1
sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 Open Data Center Alliance Usage: Virtual Machine (VM) Interoperability in a Hybrid Cloud
OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds
sm OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds SM Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Overview... 5 Interoperability... 6 Service
Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY
sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY 1 Legal Notice This Open Data Center Alliance SM Usage: VM Interoperability is proprietary to the Open Data Center Alliance, Inc.
OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY
OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY 2014 TABLE OF CONTENTS 3 Legal Notice 5 Executive Summary 5 ODCA Members Respond to Survey on Data Center Practices and Plans 6 Methodology 6 Growth in
OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0
sm OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0 SM Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Assumptions... 5 SaaS Interoperability
OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0
OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Reference Framework...5 Taxonomy...5 Usage Scenarios...6 Usage Scenario Transfer
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:
Open Data Center Alliance Usage: SERVICE CATALOG
sm Open Data Center Alliance Usage: SERVICE CATALOG Legal Notice This Open Data Center Alliance SM Usage: Service Catalog is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS WHO ARE NOT
OPEN DATA CENTER ALLIANCE USAGE MODEL: Provider Assurance Rev. 2.0
OPEN DATA CENTER ALLIANCE USAGE MODEL: Provider Assurance Rev. 2.0 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Taxonomy...6 Usage Model Diagram...6 Usage Model Details...6 Usage
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
Identity in the Cloud Use Cases Version 1.0
Identity in the Cloud Use Cases Version 1.0 Committee Note 01 08 May 2012 Specification URIs This version: http://docs.oasis-open.org/id-cloud/idcloud-usecases/v1.0/cn01/idcloudusecases-v1.0-cn01.pdf (Authoritative)
How To Manage A Plethora Of Identities In A Cloud System (Saas)
TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
Guideline on Implementing Cloud Identity and Access Management
CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National
SAML:The Cross-Domain SSO Use Case
SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 [email protected] Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397
OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Maturity Model Rev. 2.0
OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Maturity Model Rev. 2.0 Table of Contents Legal Notice...3 Executive Summary...4 Overview of the Cloud Maturity Model...5 Description of the Cloud Maturity
CA Business Service Insight
DATA SHEET CA Business Service Insight With CA Business Service Insight, you can know what services are being used within your business, improve service performance while helping to reduce operating costs,
EMC ViPR Controller. Version 2.4. User Interface Virtual Data Center Configuration Guide 302-002-416 REV 01 DRAFT
EMC ViPR Controller Version 2.4 User Interface Virtual Data Center Configuration Guide 302-002-416 REV 01 DRAFT Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published November,
The Gale Group Subscription and License Agreement
The Gale Group Subscription and License Agreement This legal document is an agreement between THE GALE GROUP, INC. (herein referred to as Gale ), a Thomson Corporation company, and you, the subscriber
DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
CA Nimsoft Monitor. Probe Guide for Cloud Monitoring Gateway. cuegtw v1.0 series
CA Nimsoft Monitor Probe Guide for Cloud Monitoring Gateway cuegtw v1.0 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change or withdrawal
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
Compute Infrastructure as a Service: Recommendations from the Open Data Center Alliance SM and TM Forum A joint perspective on the requirements of
Compute Infrastructure as a Service: Recommendations from the Open Data Center Alliance SM and TM Forum A joint perspective on the requirements of the enterprise consumer Legal Notice This CIaaS: Recommendations
Software License Monitoring
LANDESK Quick Start Guide Software License Monitoring VERSION 2 Introduction This guide was designed to help those users new to Software License Monitoring (SLM) introduced in LANDESK Management Suite
WI-FI ALLIANCE INTELLECTUAL PROPERTY RIGHTS POLICY
WI-FI ALLIANCE INTELLECTUAL PROPERTY RIGHTS POLICY BACKGROUND The purpose of the Wi-Fi Alliance ( WFA ) is to promote the IEEE 802.11 wireless networking standard by encouraging manufacturers of wireless
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Authentication and Authorization Systems in Cloud Environments
Authentication and Authorization Systems in Cloud Environments DAVIT HAKOBYAN Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:203 Abstract The emergence of cloud computing paradigm offers
QUADRO POWER GUIDELINES
QUADRO POWER GUIDELINES DA-07261-001_v03 July 2015 Application Note DOCUMENT CHANGE HISTORY DA-07261-001_v03 Version Date Authors Description of Change 01 June 6, 2014 VL, SM Initial Release 02 June 2,
CA Spectrum and CA Embedded Entitlements Manager
CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
How To Build An Operating Software For The Enterprise
Intel Information Technology Cloud Computing October 2009 Architecting Software as a for the Enterprise Executive Overview The reference architecture provides a proven template solution that Intel SaaS
Privacy Policy and Terms of Use
Privacy Policy and Terms of Use Pencils of Promise, Inc. ( PoP, we, us or our ) shares your concern about the protection of your personal information online. This Privacy Policy and Terms of Use ( Policy
An Oracle White Paper August 2010. Oracle OpenSSO Fedlet
An Oracle White Paper August 2010 Oracle OpenSSO Fedlet Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Rethinking Schools Limited Institutional Site License
Rethinking Schools Limited Institutional Site License This License Agreement ( License ) is entered into the day of [20 ] ( Effective Date ) between Rethinking Schools Limited, a Wisconsin Corporation,
Rational Asset Manager 7.2 Editions and Licensing
Rational Asset Manager 7.2 Editions and Licensing Derek D. Baron, [email protected] Product Manager, Rational Asset Manager 2009 IBM Corporation IBM Corporation 200 The information contained in this presentation
SafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
1 CA SECURITY SAAS VALIDATION PROGRAM 2015 ca.com. CA Security SaaS Validation Program. Copyright 2015 CA. All Rights Reserved.
1 CA SECURITY SAAS VALIDATION PROGRAM 2015 ca.com CA Security SaaS Validation Program 2 CA SECURITY SAAS VALIDATION PROGRAM 2015 ca.com At a Glance KEY BENEFITS/ RESULTS The CA Security SaaS Validation
Terms and Conditions
Below are the first 5 pages of our 11-page attorney-drafted WEBSITE AND BLOG TERMS AND CONDITIONS AGREEMENT (TERMS OF USE) Most terms of use agreements being offered on the Internet are only 3-5 pages
OPEN DATA CENTER ALLIANCE SM EXECUTIVE OVERVIEW Cloud Maturity Model Rev. 3.0
OPEN DATA CENTER ALLIANCE SM EXECUTIVE OVERVIEW Cloud Maturity Model Rev. 3.0 CONTRIBUTORS Allan Colins T-Systems Christoph Jung T-Systems Immo Regener PwC Lucia-Marie Muench Mariano Maluf The Coca-Cola
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
DLNA Guidelines March 2014
DLNA Guidelines March 2014 Part 7: Authentication An Industry Guide for Building Interoperable Platforms, Devices, and Applications Fulfilling the promise of the digital home requires a cross-industry
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement)
Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement) I. INTRODUCTION PARTIES AND DEFINITIONS This Mobile Banking Service Agreement (as amended from time to time,
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
McAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Entitlements Access Management for Software Developers
Entitlements Access Management for Software Developers Market Environment The use of fine grained entitlements and obligations control for access to sensitive information and services in software applications
TERMS AND CONDITIONS
TERMS AND CONDITIONS 1. Your Acceptance Welcome to the website operated by Joint Aid Management ( JAM ) International. By using or visiting this website, you signify your agreement to the terms and conditions
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006
Siebel CRM On Demand Single Sign-On An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On Introduction... 3 Single Sign-On with Siebel CRM On Demand... 4 Customer Requirements... 4 SSO
Self Help Guides. Setup Exchange Email with Outlook
Self Help Guides Setup Exchange Email with Outlook Setting up Exchange Email Connection This document is to be used as a guide to setting up an Exchange Email connection with Outlook; 1. Microsoft Outlook
Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management
Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
RSA SecurID Software Token Security Best Practices Guide
RSA SecurID Software Token Security Best Practices Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA, the RSA
Web Admin Console - Release Management. Steve Parker Richard Lechner
Web Admin Console - Release Management Steve Parker Richard Lechner Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is subject
C-DAC Medical Informatics Software Development Kit End User License Agreement
C-DAC Medical Informatics Software Development Kit End User License Agreement BY DOWNLOADING AND INSTALLING, COPYING OR OTHERWISE USING THE CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING ( C-DAC ) MEDICAL
Single Sign-on to Salesforce.com with CA Federation Manager
TECHNOLOGY BRIEF: SINGLE SIGN-ON TO SALESFORCE.COM WITH CA FEDERATION MANAGER Single Sign-on to Salesforce.com with CA Federation Manager TOMMY CHENG, PRINCIPAL ENGINEERING SERVICES ARCHITECT, CA PETER
Self Help Guides. Create a New User in a Domain
Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
DIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
CCA DSS SP 2 Release Notes. For Microsoft Dynamics GP v10.0, v2010 and v2013
CCA DSS SP 2 Release Notes For Microsoft Dynamics GP v10.0, v2010 and v2013 April 2013 Copyright Information Copyright 2012 Nodus Technologies, Inc. All rights reserved. Copyright 2004, 2005, 2006, 2007,
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0 Committee Specification 01 22 November 2012 Specification URIs This version: http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/cs01/saml-async-slo-v1.0-
Service Description: Cisco Prime Home Hosted Services. This document describes the Cisco Prime Home Hosted Services.
Service Description: Cisco Prime Home Hosted Services This document describes the Cisco Prime Home Hosted Services. Related Documents: The following documents also posted at www.cisco.com/go/servicedescriptions/
Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document:
Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement In this document: Company refers to the hospital, hospital group, or other entity that has been pre- registered by
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
idp Connect for OutSystems applications
idp Connect for OutSystems applications THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
Simplify and Secure Cloud Access to Critical Business Data
SAP Brief SAP Technology SAP Cloud Identity Objectives Simplify and Secure Cloud Access to Critical Business Data Gain simplicity and security in a single cloud solution Gain simplicity and security in
Simple Cloud Identity Management (SCIM)
Simple Cloud Identity Management (SCIM) Abstract The Simple Cloud Identity Management (SCIM) specification defines a simple, RESTful protocol for identity account management operations. SCIM s model is
Open Data Center Alliance : Software Entitlement Management Framework Rev 1.0
Open Data Center Alliance : Software Entitlement Management Framework Rev 1.0 Table of Contents Legal Notice...3 Executive Summary...4 Framing the Problem...5 Taxonomy...6 Software Licensing Issues, Challenges,
Oracle Enterprise Manager
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 12.1.0.1.0 E28548-04 February 2014 Microsoft Active Directory, which is included with Microsoft
This is a legal agreement ("Agreement") between the undersigned (either an individual or an entity)
Royalty Free Web Services Security Specification License Agreement This is a legal agreement ("Agreement") between the undersigned (either an individual or an entity) ( Company ), and Microsoft Corporation
Identity Management for Interoperable Health Information Exchanges
Identity Management for Interoperable Health Information Exchanges Presented to the NASMD Medicaid Transformation Grants HIE Workgroup - March 26, 2008 Presented by: John (Mike) Davis, Department of Veterans
OAuth Guide Release 6.0
[1]Oracle Communications Services Gatekeeper OAuth Guide Release 6.0 E50767-02 November 2015 Oracle Communications Services Gatekeeper OAuth Guide, Release 6.0 E50767-02 Copyright 2012, 2015, Oracle and/or
expanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services
goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services Data Protection and Security Considerations in an egovernment Cloud in Germany Dr. Klaus-Peter Eckert Public Sector Cloud Forum
Addressing Security for Hybrid Cloud
Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : [email protected] Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly
Web Site Hosting Service Agreement
Web Site Hosting Service Agreement Updated April, 2015 The following agreement is between Softext Publishing Inc. ( SOFTEXT ) of 954 1st Ave West, Owen Sound ON, Canada and You ( Client ). WHEREAS, SOFTEXT
Terms and Conditions
Terms and Conditions Agreement between user and internetsecurityservices.org Welcome to internetsecurityservices.org. The internetsecurityservices.org website (the "Site") is comprised of various web pages
