Identity and Access Management
|
|
- Carmella Ellis
- 7 years ago
- Views:
Transcription
1 Identity and Access Management Business Ready Security Solutions Karl Bjarne Westbye Security & Management, Microsoft 24. Mars 2010
2 Business Needs and IT Challenges Provide secure access to applications from anywhere Simplify user experience for collaboration Provide seamless movement between applications Reduce cost of account management Multiple locations and devices Difficulty in extending business resources Disparate systems to manage Complex account lifecycle management BUSINESS Needs Agility and Flexibility IT Needs Control
3 Current Situation Time and labor intensive process Different sign on requirements for applications Password reset and access requests handled through help desk Multiple identities and limited sign-on help Remote access solution w/ separate identities Contoso managing Fabrikam accounts Fabrikam managing Contoso accounts
4 Business Ready Security Help securely enable business by managing risk and empowering people Protect everywhere, access anywhere Identity Simplify the security experience, manage compliance Highly Secure & Interoperable Platform Integrate and extend security across the enterprise from: Block Cost Siloed to: Enable Value Seamless
5 Business Ready Security Solutions Secure Messaging Secure Collaboration Secure Endpoint Information Protection Identity and Access Management Active Directory Federation Services
6 Identity and Access Management Enable more secure, identity-based access to applications on-premises and in the cloud from virtually any location or device PROTECT everywhere ACCESS anywhere INTEGRATE and EXTEND security SIMPLIFY security, MANAGE compliance Provide more secure, always-on access Enable access from virtually any device Control access across organizations Provide standardsbased interoperability Extend powerful selfservice capabilities to users Automate and simplify management tasks
7 Provide More Secure, Anywhere Access Empower Business Seamless and more secure access Simplified, always-on access Empower IT Policy-based network access Ability to manage machines anywhere Empower Business Consolidated secure portal to simplify remote access to resources Simplified sign-on Empower IT Policy-based resource access DIRECT ACCESS Empower Business Access from virtually any device Empower IT Policy-based restricted access Click here to see the technical details
8 Simplify Identity Management Empower Business Self-service profile, credential, and group management Password and PIN reset from Windows login Group management from within Microsoft Office Single identity across heterogeneous applications Empower IT End-to-end, workflow-driven user provisioning Policy-controlled self-service capabilities Automatic, attribute-based group membership for simplified resource access GOVERNED SELF-SERVICE AND AUTOMATION Source: Windows identity management tools move closer to completion. Tech Target, November Click here to see the technical details
9 Platform Protection & Access Solutions Management Business Ready Security: The Road Ahead Active Directory Domain Services Active Directory Domain Services DirectAccess Subject to Change
10 Technology Drilldown The Microsoft Solution for Identity and Access Management Protect Everywhere, Access Anywhere Access to on-premises and cloud services User provisioning Strong authentication Integrate and Extend Security Standards-based, interoperable identity sharing Support for heterogeneous environments Simplify Security, Manage Compliance Self-service capabilities in Microsoft Office and Microsoft Windows Compliance management
11 Secure and Seamless Access Integrated SSL VPN capabilities for both managed and non-managed clients Simplified remote access by non-windows, down-level, or non-trusted endpoints DirectAccess in Microsoft Windows Server 2008 R2, along with Forefront Unified Access Gateway (UAG) 2010, enables more secure, seamless, always-on access to messaging and applications from Microsoft Windows 7 clients UAG 2010 extends the benefits of DirectAccess to down-level servers and applications across your infrastructure Mobile Data Center/Corporate Network Partners (non-managed) Home/Kiosk Internet Layer3 VPN HTTPS (443) DirectAccess AUTHENTICATION AND POLICY Terminal Services Remote Desktop Citrix CRM IBM, SAP, Oracle Non-Web, Legacy Down-level Employees (managed) SmartCard, RADIUS, LDAP.
12 DirectAccess Seamless Access Without VPN Always On Manage Out Access Policies Protected Transactions
13 Consolidated Secure Portal Single point of entry to share and publish applications Locate applications without tracking site addresses Embed the Forefront UAG portal as a Web Part inside the enterprise portal Same user experience for remote users Remote user can be allowed access to corporate applications and shared folder without direct access to internal resources. Business partner has limited access to corporate network; UAG allows access only to those applications for which users have permissions.
14 Policy-Based Granular Access Out-of-the-box support for more than 70 variables of detection, including antivirus, anti-malware, and personal firewall Easy-to-configure graphical interface to simplify management of endpoint detection policies Extended GUI for manual editing of policies Uses Windows Shell Scripting to create any policy and inspect for any client-side variable Example: attachment forwarding
15 Network Access Protection Health state validation against the health requirement policies Health policy compliance with health requirement policies Limited access to non-compliant computers until the updates and configuration changes are complete Remote user sends request to access corporate network. 1 If endpoint doesn't comply, policy is redirected to Microsoft remediation Network server for updates. Policy Servers Not Policy Compliant 4 Restricted Network Remediation Servers e.g., WSUS UAG verifies endpoint against If endpoint complies, NAP NAP policy. policy is allowed access to corporate network. 2 Policy Compliant 3 Corporate Network Health Policies e.g., patch-level, AV signature version
16 SIMPLIFY security, MANAGE compliance
17 Identity Management User provisioning Policy-based identity lifecycle management system Built-in workflow for identity management Automatically synchronize all user information to different directories across the enterprise Automates the process of on-boarding users Active Directory User Enrollment Workflow Lotus Domino LDAP HR System Approval FIM SQL Server Oracle DB User provisioned on all allowed systems Manager FIM CM
18 Identity Management User de-provisioning Automated user de-provisioning Built-in workflow for identity management Real-time de-provisioning from all systems to prevent unauthorized access and information leakage Active Directory User de-provisioned Workflow Lotus Domino LDAP HR System FIM SQL Server Oracle DB User de-provisioned or disabled on all systems FIM CM
19 Strong Authentication Certificate Authority Increase access security beyond username and password solutions Streamline deployment by enrolling user and computer certificates without user intervention Simplify certificate and SmartCard management using Forefront Identity Manager (FIM) Enhance remote access security through certificates with Network Access Protection Stronger authentication through certificates for administrative access and management FIM policy triggers request for FIM CM to issue certificate or Certificate is issued to user and SmartCard written to either machine or smart card End User SmartCard User is validated using multifactor authentication FIM CM HR System FIM FIM Certificate Management (CM) requests certificate creation User Enrollment from AD and CS Authentication request sent by HR System Active Directory Certificate Services (AD CS) SmartCard User ID and Password End User
20 Strong Authentication SmartCard Secure and appropriate access to corporate resources by deploying and managing strong two-factor authentication, encryption, and signing services to users via certificates and smart cards Integrates enterprises heterogeneous identity infrastructure and strong authentication systems Strong authentication and authorization for remote access Differentiated access based on authentication method(s) Forefront TMG AD DS Third-Party Apps End User SmartCard **** PIN User provides two-factor authentication Forefront UAG AD DS validates the authentication credentials User is allowed TBD access to the resources Users get access to the allowed applications This is just an example of secure authentication for remote users. It also applies to internal users.
21 Forefront Identity Manger 2010 Architecture Solutions Group Mgmt User Mgmt Credential Mgmt Policy Mgmt Custom FIM Client Experiences FIM Service and Portal FIM Service Outlook FIM Portal Windows Custom ILM Sync ILM-CM Portal ILM-CM Request Processor Delegation & Permissions AuthN Workflow AuthZ Workflow App DB Action Workflow Sync DB Adapters ILM-CM DB Cert Mgmt Identity and data stores Directories Applications Databases Systems
22 HR System FIM LDAP Active Directory/ Exchange SQL Server DB givenname sn title mail employeeid telephone Sammy Dearling 008 givenname sn title mail employeeid telephone givenname sn title mail employeeid telephone Samara Darling 007 givenname sn title mail employeeid telephone Sam Dearing Intern 007 givenname sn title mail employeeid telephone Samantha Dearing 007 Coordinator Samantha Dearing Coordinator 007 Identity Data Aggregation GivenName sn title mail employeeid telephone Samantha Dearing 007 Coordinator Identity Synchronization and Consistency Identity synchronization across multiple directories Attribute Ownership FirstName LastName EmployeeID Title Telephone
23 Identity Synchronization and Consistency Identity consistency across multiple directories Attribute Ownership FirstName LastName EmployeeID Title HR System SQL Server DB Active Directory / Exchange givenname sn title mail employeeid telephone givenname sn title mail employeeid telephone givenname sn title mail employeeid telephone Samantha Dearing 007 Samara Darling Coordinator 007 Sam Dearing Intern someone@example.com 007 FIM givenname Samantha Bob sn Dearing title Coordinator mail someone@example.com employeeid 007 telephone Identity Data Brokering (Convergence) Telephone LDAP givenname sn title mail employeeid telephone Sammy Dearling
24 Group Management Self-service group and distribution list management with the FIM 2010 Web portal Office integration allows users to manage group membership from within Microsoft Office Outlook for maximum productivity Enables users to use Outlook to manage approvals while they are offline Automatically add users to either group based on their employee type at the time they are provisioned to Active Directory Group and distribution list management, including dynamic membership calculation in these groups and distribution lists based on user s attributes FIM Add-in for Outlook SharePoint-Based Management Console
25 Advanced Group Management Integrates with Exchange and Outlook Manages distribution and security groups Self-service group management Criteria-based group membership Integrated approval
26 Min portal i FIM
27 Godkjenning i Outlook
28 Arbeidsflyt opprett bruker
29 Workflow Management Enables IT to quickly define, automate, and enforce identity management policies IT can use the integrated workflow in the approval/rejection process Automatic notifications for request approvals or rejections
30 Management Policy Rules SharePoint-based console for policy authoring, enforcement, and auditing Create rules governing users and groups using easy-to-use menu-driven controls Helps organizations integrate policies across the enterprise
31 Self-Service Password Management Enables users to reset their own passwords through both Windows logon and FIM password reset portal Controls helpdesk costs by enabling end users to manage certain parts of their own identities Improves security and compliance with minimal errors while managing multiple identities and passwords User requests password reset FIM Server Active Directory Oracle Passwords updated SQL Server End User IBM DS Reset Password LDAP FIM capabilities integrated with Windows logon Randomly selects a number of questions
32 Manage Compliance Active Directory Federation Services P OL I CY I DE NT I T Y MA NA GE ME NT Enterprise policy enforcement for external partners and vendors to prevent unauthorized access Granular authorization policy enables IT to define what parts of an application a user has access to based on identity, role, endpoint profile, and device compliance (health state) Maintains identity across multiple systems in the enterprise Offers real-time / automated offboarding of users to prevent unauthorized access to information Stores information on requests, approvals, and other identity management tasks Centralized reporting and alerting with UAG management console Endpoint integrity checking through Network Access Protection and UAG Post-session endpoint cache cleanup to help prevent information leaks
33 Forefront Identity Manager Powerful self-service capabilities and automation for IT professionals Comprehensive Protection Integrated Security Simplified Management Strong authentication User provisioning Identity synchronization Extensible workflows Password synchronization across heterogeneous system Self-service management Credential lifecycle management Identity and access management via SharePoint Server
34 Mer informasjon
35 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Andre sikkerhetsløsninger
Andre sikkerhetsløsninger Business Ready Security Solutions Karl Bjarne Westbye Security & Management, Microsoft 24. Mars 2010 Agenda Business and IT Challenges Secure Messaging Secure Collaboration Secure
More informationMicrosoft Forefront Unified Access Gateway and DirectAccess. Better Together
Microsoft Forefront Unified Access Gateway and DirectAccess Better Together Disclaimer The information contained in this document represents the current view of Microsoft Corporation on the issues discussed
More informationProduct overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
More informationWINDOWS SERVER SMALL BUSINESS SOLUTIONS. Name: Marko Drev
WINDOWS SERVER SMALL BUSINESS SOLUTIONS Name: Marko Drev SMB Windows Server Family SOLUTION SERVERS TRADITIONAL SERVERS Complete server platform, integrated and optimized Customizable Server platform for
More informationBusiness Ready Security
Business Ready Security Steve Scholz Microsoft Education steve.scholz@microsoft.com Protect everywhere, access anywhere Identity Simplify the security experience, manage compliance Highly Secure & Interoperable
More informationWhite paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com
More informationand the software then detects and automates all password-related events for the employee, including:
Reduce costs, simplify access and audit access to applications with single sign-on IBM Single Sign-On Highlights Reduce password-related helpdesk Facilitate compliance with pri- costs by lowering the vacy
More informationHow the Quest One Identity Solution Products Enhance Each Other
Better Together How the Quest One Identity Solution Products Enhance Each Other Written by Quest Software, Inc. Business Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary
More informationBusiness-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
More informationMANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters
More informationBusiness-Driven, Compliant Identity Management
Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System
More informationOracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved
More informationOracle Access Manager. An Oracle White Paper
Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
More informationOracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
More informationPassword Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions
Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including
More informationManufacturer to Enhance Efficiency with Improved Identity Management
Microsoft Forefront: Security Products for Business Customer Solution Case Study Manufacturer to Enhance Efficiency with Improved Identity Management Overview Country or Region: United States Industry:
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationDirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationA Practical Path to Unified Identity Across Data Center, Cloud and Mobile
C E N T R I F Y W H I T E P A P E R A Practical Path to Unified Identity Across Data Center, Cloud and Mobile Abstract The major trends challenging IT organizations today are the increasing heterogeneity
More informationSAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationIdentity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
More informationDirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
More informationF5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France
F5 Identity and Access Management (IAM) Overview Laurent PETROQUE Manager Field Systems Engineering, France F5 s Security Strategy Protect Apps/Data Wherever They Reside Control Access to Apps/Data from
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationTCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
More information1. Introduction to DirectAccess. 2. Technical Introduction. 3. Technical Details within Demo. 4. Summary
1. Introduction to DirectAccess 2. Technical Introduction 3. Technical Details within Demo 4. Summary Section 2: Technical Introduction Solution Overview Compliant Client Compliant Client Internet
More informationOracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
More informationADAPTIVE USER AUTHENTICATION
ADAPTIVE USER AUTHENTICATION SMS PASSCODE is the leading technology in adaptive multi-factor authentication, improving enterprise security and productivity through an easy to use and intelligent solution
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationHow Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT
How Microsoft runs IT Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT 2 Source: Accenture Cloudrise: Rewards & Risks at the Dawn of Cloud Computing, November 2010 3 Source: Accenture Cloudrise:
More informationnexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
More informationCentralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop Self-service Password Reset Layer v.3.2-007 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200
More informationidentity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
More informationStrong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
More informationStrengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
More information<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
More informationFOREFRONT IDENTITY MANAGEMENT
FOREFRONT IDENTITY MANAGEMENT March 13, 2015 Page 2 Module One... 6 User Creation And Synchronization Process... 6 Agency Roles And Responsibilities... 7 Logging Into Forefront Identity Manager Portal
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationPortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
More informationTECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
More informationMicrosoft SharePoint Architectural Models
Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint
More informationTake Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
More informationDeliver Secure and Accelerated Remote Access to Applications
DATASHEET What s Inside: 1 Key Benefits 2 Scalability to Meet Future IT Demands 2 Streamlined Access Management 5 Improved User Experience and Productivity 6 Superior Security 6 Accelerated Application
More informationOperationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationIdentity & Access Management in the Cloud: Fewer passwords, more productivity
WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability
More informationMod 2: User Management
Office 365 for SMB Jump Start Mod 2: User Management Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall CEO & SMB Technologist District Computers 1 Jump Start Schedule
More informationInstallation Guide. Tech Excel January 2009
Installation Guide Tech Excel January 2009 Copyright 1998-2009 TechExcel, Inc. All Rights Reserved. TechExcel, Inc., TechExcel, ServiceWise, AssetWise, FormWise, KnowledgeWise, ProjectPlan, DownloadPlus,
More informationIDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
More informationTwo-Factor Authentication
Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationThe Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationEnterprise Mobility Suite Overview. Joe Kuster Catapult Systems
Enterprise Mobility Suite Overview Joe Kuster Catapult Systems 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two
More informationCritical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
More informationSAP Identity Management Overview
Identity Management Overview October 2014 Public Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password
More informationAurora Hosted Services Hosted AD, Identity Management & ADFS
22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to
More informationWHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory
WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering
More informationSetup Guide: Server-side synchronization for CRM Online and Exchange Server
Setup Guide: Server-side synchronization for CRM Online and Exchange Server Version 8.0 Microsoft Dynamics CRM 2016 Authors: Elad Ben Yosef, Sumanta Batabyal This document is provided "as-is". Information
More informationCisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
More informationManager 2010 R2 Handbook
Microsoft Forefront Identity Manager 2010 R2 Handbook A complete handbook on FIM 2010 R2 covering both Identity and Certificate Management Kent Nordstrom n, ' enterp rise^., "N ' PUBLISHING - BIRMINGHAM
More informationIBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
More informationIDENTITY & ACCESS MANAGEMENT
Securely Enabling Your Business IDENTITY & ACCESS MANAGEMENT Customer Solution Case Study FishNet Security Helps Hotelier Prepare for Rapid Move to Cloud with New Identity Management Solution Achieving
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationConfiguration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationPortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
More informationIBM Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationExtending Identity and Access Management
Extending Identity and Access Management Michael Quirin Sales Engineer Citrix Systems 1 2006 Citrix Systems, Inc. All rights reserved. Company Overview Leader in Access Infrastructure NASDAQ 100 and S&P
More informationHow To Manage A Plethora Of Identities In A Cloud System (Saas)
TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities
More informationServer-based Password Synchronization: Managing Multiple Passwords
Server-based Password Synchronization: Managing Multiple Passwords Self-service Password Reset Layer v.3.2-004 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax:
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationQuest One Identity Solution. Simplifying Identity and Access Management
Quest One Identity Solution Simplifying Identity and Access Management Identity and Access Management Challenges Operational Efficiency Security Compliance Too many identities, passwords, roles, directories,
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationSOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding www.citrix.com Contents Introduction... 3 The On- boarding Problem Defined... 3 Considerations for Application On- boarding...
More informationEXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.
KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings pc@kuppingercole.com October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single
More informationIntegration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
More informationConfiguration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
More informationRSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION
RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on
More informationSAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
More informationEnterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
More informationBill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support
Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support Learning & Development Specialist Customer Support Services Been with Microsoft for 7 years Professionally
More informationPublished April 2010. Executive Summary
Effective Incident, Problem, and Change Management Integrating People, Process, and Technology in the Datacenter Published April 2010 Executive Summary Information technology (IT) organizations today must
More informationMicrosoft Premier Deployment. Office 365 Service Description
Microsoft Premier Deployment Office 365 Service The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication and
More informationIntegrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
More informationUser identity, Account Provisioning, Directory Synchronization, Federation
User identity, Account Provisioning, Directory Synchronization, Federation Workshop Purpose and Objectives Workshop Purpose Plan for user identity and provisioning, including discussion of Active Directory
More informationRole Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
More informationSOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business
SOLUTION BRIEF MOBILE SECURITY Securely Accelerate Your Mobile Business CA Technologies allows you to accelerate mobile innovation for customers and employees without risking your enterprise data or applications.
More informationCloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator
More informationSpeeding Office 365 Implementation Using Identity-as-a-Service
August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com
More informationNetop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
More informationThe Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
More informationExtend the value of Microsoft Dynamics ERP with other technology innovations from Microsoft
Extend the value of Microsoft Dynamics ERP with other technology innovations from Microsoft Combined with these products and technologies, Microsoft Dynamics ERP solutions can help you gain momentum in
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More information