Globus Auth. Steve Tuecke. The University of Chicago
|
|
|
- Johnathan Lucas
- 9 years ago
- Views:
Transcription
1 Globus Auth Enabling an extensible, integrated ecosystem of services and applications for the research and education community. Steve Tuecke The University of Chicago
2 Cloud has transformed how platforms and software are delivered Software as a service: SaaS (web & mobile apps) Platform as a service: PaaS Infrastructure as a service: IaaS PaaS enables more rapid, cheap, and scalable delivery of powerful apps as SaaS 2
3 Globus and XSEDE adopted Globus SaaS early Much usage of Transfer and Sharing 3
4 4
5 Instrument 1 Researcher initiates transfer request; or requested automatically by script, science gateway Globus SaaS: Research data lifecycle Globus transfers files reliably, securely 2 Transfer Only a Web browser required Use storage system of your choice Access using your campus credentials Compute Facility 3 Share Researcher selects files to share, selects user or group, and sets access permissions Collaborator logs in to Globus and accesses shared files; no local account required; download via Globus 5 Personal Computer 4 Globus controls access to shared files on existing storage; no need to move files to cloud storage! 6 Researcher assembles data set; describes it using metadata (Dublin core and domainspecific) Publish 6 7 Curator reviews and approves; data set published on campus or other system Peers, collaborators search and discover datasets; transfer and share using Globus Discover Publication Repository 8 5
6 Globus by the numbers 4 major services 135 PB transferred 20 billion files processed 31,000 registered users 13 national labs use Globus 10,000 active endpoints ~400 active daily users 99.9% uptime 35+ institutional subscribers 1 PB largest single transfer to date 3 months longest continuously managed transfer 130 federated campus identities
7 No Globus usernames required! (coming tomorrow) Globus users no longer require a Globus username & password Old Globus usernames moved to separate, optional Globus ID identity provider Any identity recognized by Globus is now sufficient to access Globus Globus Account is a primary identity plus a set of linked identities Verified address can be a linked identity 7
8 Demo Using Globus with any identity Sharing with any identity 8
9 Globus and XSEDE adopted Globus SaaS early Much usage of Transfer and Sharing XSEDE now adopting Globus PaaS as the XSEDE platform à Any science gateway can now integrate trivially with XSEDE services, including Globus transfer 9
10 A science CI platform can spur creation of a science CI ecosystem Software as a service: SaaS (web and mobile apps) Platform as a service: PaaS Infrastructure as a service: IaaS In so doing, we can slash costs, improve quality, and accelerate discovery across the sciences 10
11 A science CI platform can spur creation of a science CI ecosystem Software as a service: SaaS (web and mobile apps) Platform as a service: PaaS Infrastructure as a service: IaaS In so doing, we can slash costs, improve quality, and accelerate discovery across the sciences 11
12 Globus PaaS: Ecosystem enabler Globus APIs Data Publication & Discovery File Sharing File Transfer & Replication Globus Connect Auth & Groups Globus Toolkit 12
13 Globus PaaS at NCAR Research Data Archive at NCAR Integrate Globus for data downloads Shared endpoint with subfolder per request Single sign on via streamlined account provisioning
14 Globus Auth Foundational identity and access management (IAM) platform service Brokers authentication and authorization interactions between: end-users identity providers: XSEDE, InCommon, web apps resource servers: services with REST APIs clients: web, mobile, desktop, command line apps resource servers acting as clients to other resource servers 14
15 Based on widely used web standards OAuth 2.0 Authorization Framework aka OAuth2 OpenID Connect Core 1.0 aka OIDC Allows use of standard OAuth2 and OIDC libraries E.g., Google OAuth Client Libraries (Java, Python, etc.), Apache mod_auth_openidc 15
16 Globus Auth is authorization server Resource Owner Client HTTPS/REST call Resource Server Authorization Server (Globus Auth) Identity Identity Identity 16
17 Globus Auth is authorization server Resource Owner Client HTTPS/REST call Resource Server (1) Authenticates a resource owner Authorization Server (Globus Auth) Identity Identity Identity Using existing identities: XSEDE, University (via InCommon), Google, web app, etc. User can link multiple identities into a single Globus Account No Globus username & password (Globus ID) required Globus Auth handles naming details (e.g., eppn vs eptid) 17
18 Globus Auth is authorization server Resource Owner Client consent HTTPS/REST call Resource Server (1) Authenticates a resource owner (2) Obtains authorization (consent) for a client to access a resource Authorization Server (Globus Auth) Resource is provided by a resource server Limited by a scope Identity Identity Identity 18
19 Globus Auth is authorization server Resource Owner Client access token HTTPS/REST call Resource Server (1) Authenticates a resource owner (2) Obtains authorization (consent) for a client to access a resource (3) Issues OAuth2 access token to client Authorization Server (Globus Auth) Access token is opaque to client May include a refresh token, for offline access Identity Identity Identity 19
20 Globus Auth is authorization server Resource Owner Client id_token HTTPS/REST call Resource Server (1) Authenticates a resource owner (2) Obtains authorization (consent) for a client to access a resource (3) Issues OAuth2 access_token to client (4) May issue OIDC id_token to client with resource owner identity Authorization Server (Globus Auth) Identity Identity Identity JWT id_token: sub: Globus Auth identity id iss: name: full name preferred_username: e.g., [email protected] contact other standard OIDC claims 20
21 Globus Auth is authorization server Resource Owner Client HTTPS/REST call Authorization: Bearer <access_token> Resource Server (1) Authenticates a resource owner (2) Obtains authorization (consent) for a client to access a resource (3) Issues OAuth2 access_token to client (4) May issue OIDC id_token to client with resource owner identity (5) HTTPS/REST call with access_token Authorization Server (Globus Auth) Identity Identity Identity 21
22 Globus Auth is authorization server Resource Owner Client HTTPS/REST call Resource Server access_token (1) Authenticates a resource owner (2) Obtains authorization (consent) for a client to access a resource (3) Issues OAuth2 access_token to client (4) May issue OIDC id_token to client with resource owner identity (5) HTTPS/REST call with access_token (6) Validates access_token for resource server, and gets additional information Authorization Server (Globus Auth) Identity Identity Identity RFC 7662: OAuth 2.0 Token Introspection response: active: true or false client_id scope sub: Globus Auth identity id username: [email protected] identity_set: linked identities name other standard claims 22
23 Globus Auth is authorization server Resource Owner Client (1) Authenticates a resource owner (2) Obtains authorization (consent) for a client to access a resource (3) Issues OAuth2 access_token to client (4) May issue OIDC id_token to client with resource owner identity (5) HTTPS/REST call with access_token (6) Validates access_token for resource server, and gets additional information (7) Issues dependent access tokens to resource server HTTPS/REST call Authorization Server (Globus Auth) Identity Identity Identity Resource Server Dependent Resource Servers Allows resource server to act as client to other resource servers 23
24 Simple web app server login
25 Simple web app server login Web App Server (Client) id_token Browser Globus Auth Identity Identity Identity OAuth2 Authorization Code Grant with Globus Auth With OIDC scopes: openid profile User logs into Globus account using their favorite identity provider Globus Auth returns OIDC id_token to the web server With identity sub (unique id), name, preferred_username, Client policy can require identity from a particular identity provider 25
26 Login + Globus Auth REST API Web App Server (Client) (1) id_token, access token (2) REST calls w/ access_token Browser Globus Auth Identity Identity Identity OAuth2 Authorization Code Grant with Globus Auth With OIDC scopes: openid profile And scope: urn:globus:auth:scope:auth.globus.org:view_identies Globus Auth returns OAuth2 access token to Web App Server (OAuth2 client) for use with Globus Auth REST API Web App Server calls Globus Auth REST API with access token Authorization: Bearer <access_token> Get identity information, including full set of linked identities 26
27 Browser-based web app login 27
28 Browser-based web app login Web App Server Browser JS Web App (Client) id_token Globus Auth OAuth2 Implicit Grant With OIDC scopes: openid profile Identity Identity Identity Globus Auth returns OIDC id_token to the browser-based Javascript client With identity sub (unique id), name, preferred_username, Client policy can require identity from a particular identity provider 28
29 Globus transfer integration Browser Web App Server (Client) (1) id_token, access token (2) access_token Globus Transfer (3) Verify access token Globus Auth OAuth2 Authorization Code Grant with Globus Auth Scopes: openid profile urn:globus:auth:scope:transfer.api.globus.org:all Globus Auth returns OAuth2 access token to Web App Server (OAuth2 client) for use with Globus Transfer REST API Web App Server (OAuth2 client) calls Globus Transfer REST API Authorization: Bearer <access_token> 29
30 Using existing web app identities Web App Server (Client) Browser id_token, access token Globus Auth Globus Transfer Web App Id Provider Identity Identity (OpenIDConnect) Web App Server does OAuth2 Authorization Code Grant with Globus Auth Scopes: openid profile urn:globus:auth:scope:transfer.api.globus.org:all Globus Auth does OIDC login with Web App Identity Provider Results in Web App Server having: User login information from own Web App Id Provider Access token(s) that it can use with REST APIs for Globus Transfer, XSEDE, etc. SSO to your web app and Globus using only your web app identities! 30
31 Research data portal 31
32 Research data portal Globus Auth Browser Portal Web Server (Client) Globus Transfer User s Endpoint Portal Endpoint Science DMZ XSEDE Endpoint Move portal storage into Science DMZ, with Globus endpoint High performance, managed storage Leave Portal Web server behind firewall Globus handles the data heavy lifting 32
33 HTTPS to endpoints (coming soon) Globus Auth Browser Portal Web Server (Client) Globus Transfer HTTPS to Globus Endpoint Portal Endpoint Science DMZ Globus Connect Server will soon allow HTTPS access to endpoint storage Your web application can directly link to files on the Portal Endpoint Globus Auth and Transfer mediated security Restrict HTTPS access to files by particular users and groups 33
34 Globus Web App Integration 34
35 Globus Web App integration Web App Server (Client) (2) access_token 1 Globus Transfer Browser (1) id_token, access token 1 Globus Auth (5) access token 2 (3) Redirect (4) id_token, access token 2 Globus Web App OAuth2 Authorization Code Grant with Globus Auth Scopes: openid profile urn:globus:auth:scope:transfer.api.globus.org:all Globus Auth returns OIDC id_token & OAuth2 access token to client Web App Server can redirect browser to Globus Web App pages Globus Web App can be skinned to look like Web App Server Globus Web App provides special pages for selecting files and selecting a group Globus Auth provides single sign-on across multiple apps 35
36 Other resource servers 36
37 XSEDE services integration Browser Web App Server (Client) (1) id_token, access tokens Globus Auth (2) access_token 1 Globus Transfer (3) access_token 2 XSEDE services Globus Web App OAuth2 Authorization Code Grant with Globus Auth Scopes: openid profile urn:globus:auth:scope:transfer.api.globus.org:all urn:globus:auth:scope:api.xsede.org:all Globus Auth returns OIDC id_token & OAuth2 access tokens to client Globus Auth returns different access tokens for different resource servers Web App Server calls each resource server with appropriate access token 37
38 Add your own resource servers Web App Server (Client) Globus Transfer Browser (1) id_token, access tokens Globus Auth (3) Verify access_token 3 XSEDE services (2) access_token 3 Globus Web App Your service OAuth2 Authorization Code Grant with Globus Auth Scopes: openid profile urn:globus:auth:scope:transfer.api.globus.org:all urn:globus:auth:scope:api.xsede.org:all urn:globus:auth:scope:api.example.com:all Globus Auth returns OIDC id_token & OAuth2 access tokens to client Resource Server must register with Globus Auth Resource server policy can require identity from a particular identity provider 38
39 Both client and resource server Browser Web App Server (Client & Resource Server) (2) REST calls w/ access_token (3) Verify access_token Another Client (1) Get access_token Globus Auth Web App Server can be both a client and a resource server Another Client can use any OAuth2 grant with Globus Auth to get access_token for your Web App Server Scope: urn:globus:auth:scope:api.example.com:all 39
40 Dependent resource servers Web App Server (Client) Globus Transfer Browser (1) id_token, access tokens (2) access_token 3 (4) Dependent access_token 4 Globus Auth (3) Get dependent access tokens for access_token 3 Resource Server OAuth2 Dependent Token Grant with Globus Auth Scopes: openid profile urn:globus:auth:scope:api.example.com:all Resource Server registers its Globus Transfer dependency with Globus Auth Resource Server uses request access token to get dependent access tokens Resource Server uses dependent access token to call Globus Transfer 40
41 Mobile applications Globus Auth will be adding support for mobile apps Log in with Globus in mobile apps o RFC 7636: Extension to OAuth2 to allow OAuth2 Authorization Code Grant to work from mobile apps Mobile apps can call any resource server REST APIs that use Globus Auth ios and Android 41
42 An extensible platform for CI Apps Domain-independent and domain-specific services AWS, Google, Azure services Foundation services: Globus Auth, Groups, etc. Globus provides foundation and other services Community can extend to meet domain-specific and domain-independent needs 42
43 Come to Chicago in April to learn more!
44 Summary Globus no longer requires a Globus username and password Globus Auth makes it easy to: add user login to your web app integrate with Globus, XSEDE, and other services add OAuth2 support to your service s REST API create services to leverage other services 44
45 Together we can create an integrated ecosystem of services and applications for the research and education community 45
46 Thank you to our sponsors! U. S. DEPARTMENT OF ENERGY 46
Globus Research Data Management: Introduction and Service Overview
Globus Research Data Management: Introduction and Service Overview Kyle Chard [email protected] Ben Blaiszik [email protected] Thank you to our sponsors! U. S. D E P A R T M E N T OF ENERGY 2 Agenda
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
Enterprise Access Control Patterns For REST and Web APIs
Enterprise Access Control Patterns For REST and Web APIs Francois Lascelles Layer 7 Technologies Session ID: STAR-402 Session Classification: intermediate Today s enterprise API drivers IAAS/PAAS distributed
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
ACR Connect Authentication Service Developers Guide
ACR Connect Authentication Service Developers Guide Revision History Date Revised by Version Description 29/01/2015 Sergei Rusinov 1.0 Authentication using NRDR account Background The document describes
Onegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
SINGLE & SAME SIGN-ON ASPECTS
SINGLE & SAME SIGN-ON ASPECTS OF AZURE ACTIVE DIRECTORY Harold Baele Senior ICT Trainer JULY 2, 2015 SLIDE 1 TRAINER INFO Harold Baele MCT at RealDolmen Education [email protected] - @hbaele
OpenID connect @ Deutsche telekom. Dr. Torsten Lodderstedt, Deutsche Telekom AG
OpenID connect @ Deutsche telekom Dr. Torsten Lodderstedt, Deutsche Telekom AG service ecosystem and Telekom Login Dr. Torsten Lodderstedt / OpenID Workshop @ IIW #18 2014-05-05 2 Open Standards: Our History
OAuth 2.0: Theory and Practice. Daniel Correia Pedro Félix
OAuth 2.0: Theory and Practice Daniel Correia Pedro Félix 1 whoami Daniel Correia Fast learner Junior Software Engineer Passionate about everything Web-related Currently working with the SAPO SDB team
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
How to Extend Identity Security to Your APIs
How to Extend Identity Security to Your APIs Executive Overview The number of users and devices requesting access to applications is growing exponentially and enterprises are scrambling to adapt their
Security and ArcGIS Web Development. Heather Gonzago and Jeremy Bartley
Security and ArcGIS Web Development Heather Gonzago and Jeremy Bartley Agenda Types of apps Traditional token-based authentication OAuth2 authentication User login authentication Application authentication
OAuth 2.0. Weina Ma [email protected]
OAuth 2.0 Weina Ma [email protected] Agenda OAuth overview Simple example OAuth protocol workflow Server-side web application flow Client-side web application flow What s the problem As the web grows, more
Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011
Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
Traitware Authentication Service Integration Document
Traitware Authentication Service Integration Document February 2015 V1.1 Secure and simplify your digital life. Integrating Traitware Authentication This document covers the steps to integrate Traitware
Login with Amazon. Getting Started Guide for Websites. Version 1.0
Login with Amazon Getting Started Guide for Websites Version 1.0 Login with Amazon: Getting Started Guide for Websites Copyright 2016 Amazon Services, LLC or its affiliates. All rights reserved. Amazon
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
EHR OAuth 2.0 Security
Hospital Health Information System EU HIS Contract No. IPA/2012/283-805 EHR OAuth 2.0 Security Final version July 2015 Visibility: Restricted Target Audience: EHR System Architects EHR Developers EPR Systems
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its
OAuth: Where are we going?
OAuth: Where are we going? What is OAuth? OAuth and CSRF Redirection Token Reuse OAuth Grant Types 1 OAuth v1 and v2 "OAuth 2.0 at the hand of a developer with deep understanding of web security will likely
OpenID Connect 1.0 for Enterprise
OpenID Connect 1.0 for Enterprise By Paul Madsen Executive Overview In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity
How To Write A Blog Post On Globus
Globus Software as a Service data publication and discovery Kyle Chard, University of Chicago Computation Institute, [email protected] Jim Pruyne, University of Chicago Computation Institute, [email protected]
globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory
globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory Types of integration Resource integration Connect campus, project,
Login with Amazon. Developer Guide for Websites
Login with Amazon Developer Guide for Websites Copyright 2014 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs Executive Overview A key technical underpinning of the Cloud is the Application Programming Interface (API). APIs provide consistent
SETTING UP YOUR JAVA DEVELOPER ENVIRONMENT
SETTING UP YOUR JAVA DEVELOPER ENVIRONMENT Summary This tipsheet describes how to set up your local developer environment for integrating with Salesforce. This tipsheet describes how to set up your local
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
HOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010
OpenID Single Sign On and OAuth Data Access for Google Apps Ryan Boyd @ryguyrg Dave Primmer May 2010 Why? View live notes and questions about this session on Google Wave: http://bit.ly/magicwave Agenda
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:
Comparative analysis - Web-based Identity Management Systems
Comparative analysis - Web-based Identity Management Systems Oscar Manso, Morten Christiansen and Gert Mikkelsen THE ALEXANDRA INSTITUTE 15 December 2014 2/45 Contents 1. Introduction... 2 2. Current State
Enabling SSO for native applications
Enabling SSO for native applications Paul Madsen Ping Identity Session ID: IAM F42B Session Classification: Intermediate Mobile Modes Source - 'How to Connect with Mobile Consumers' Yahoo! Overview Enterprise
How To Use Kiteworks On A Microsoft Webmail Account On A Pc Or Macbook Or Ipad (For A Webmail Password) On A Webcomposer (For An Ipad) On An Ipa Or Ipa (For
GETTING STARTED WITH KITEWORKS DEVELOPER GUIDE Version 1.0 Version 1.0 Copyright 2014 Accellion, Inc. All rights reserved. These products, documents, and materials are protected by copyright law and distributed
Identity Implementation Guide
Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
WHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO)
WHITEPAPER NAPPS: A Game-Changer for Mobile Single Sign-On (SSO) INTRODUCTION The proliferation of mobile applications, including mobile apps custom to an organization, makes the need for an SSO solution
Web 2.0 Lecture 9: OAuth and OpenID
Web 2.0 Lecture 9: OAuth and OpenID doc. Ing. Tomáš Vitvar, Ph.D. [email protected] @TomasVitvar http://www.vitvar.com Leopold-Franzens Universität Innsbruck and Czech Technical University in Prague Faculty
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
IBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
Authenticate and authorize API with Apigility. by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team
Authenticate and authorize API with Apigility by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team About me Enrico Zimuel (@ezimuel) Software Engineer since 1996 PHP Engineer at Zend Technologies
Cloud Powered Mobile Apps with Azure
Cloud Powered Mobile Apps with Azure Malte Lantin Technical Evanglist Microsoft Azure Agenda Mobile Services Features and Demos Advanced Features Scaling and Pricing 2 What is Mobile Services? Storage
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
Contents. 2 Alfresco API Version 1.0
The Alfresco API Contents The Alfresco API... 3 How does an application do work on behalf of a user?... 4 Registering your application... 4 Authorization... 4 Refreshing an access token...7 Alfresco CMIS
Extend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
OAuth Guide Release 6.0
[1]Oracle Communications Services Gatekeeper OAuth Guide Release 6.0 E50767-02 November 2015 Oracle Communications Services Gatekeeper OAuth Guide, Release 6.0 E50767-02 Copyright 2012, 2015, Oracle and/or
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
Globus Research Data Management: Endpoint Configuration and Deployment. Steve Tuecke Vas Vasiliadis
Globus Research Data Management: Endpoint Configuration and Deployment Steve Tuecke Vas Vasiliadis Presentations and other useful information available at globusworld.org/tutorial 2 Agenda Globus Connect
Flexible Identity Federation
Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
The Role of Identity Enabled Web Services in Cloud Computing
The Role of Identity Enabled Web Services in Cloud Computing April 20, 2009 Patrick Harding CTO Agenda Web Services and the Cloud Identity Enabled Web Services Some Use Cases and Case Studies Questions
Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps
Sofia Event Center 14-15 May 2014 Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps Radi Atanassov SharePoint MCM & MVP
Mashery OAuth 2.0 Implementation Guide
Mashery OAuth 2.0 Implementation Guide June 2012 Revised: 7/18/12 www.mashery.com Mashery, Inc. 717 Market Street, Suite 300 San Francisco, CA 94103 Contents C hapter 1. About this Guide...5 Introduction...
Audience Profile This course is intended for any developer that is tasked with creating applications that interface with O365.
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: [email protected] Web: www.discoveritt.com Course MS55083A Developing for Office 365 Length: 5 Days
SECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for
BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
Using ArcGIS with OAuth 2.0. Aaron Parecki @aaronpk CTO, Esri R&D Center Portland
Using ArcGIS with OAuth 2.0 Aaron Parecki @aaronpk CTO, Esri R&D Center Portland Before OAuth Apps stored the user s password Apps got complete access to a user s account Users couldn t revoke access to
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Samsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
UMA in Health Care: Providing Patient Control or Creating Chaos?
SESSION ID: IDY-F03 UMA in Health Care: Providing Patient Control or Creating Chaos? David Staggs JD, CISSP Technologist / IP Attorney Staggs PLLC UMA Value Proposition User Managed Access (UMA) brings
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.
Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori
IBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Centrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
Axway API Portal. Putting APIs first for your developer ecosystem
Axway API Portal Putting APIs first for your developer ecosystem To fully embrace an API-first strategy, it s no longer enough to simply develop and deploy APIs. Organizations need broad API management
OAuth 2.0 andinternet Standard. Torsten Lodderstedt Deutsche Telekom AG
OAuth 2.0 andinternet Standard Protocols Torsten Lodderstedt Deutsche Telekom AG Whatshallweaimfor? make OAuth the authorization framework of choice for any internet standard protocol, such as WebDAV,
SAP HANA Cloud Platform Security Tutorial Securing your Web API with OAuth 2.0
Securing your Web API with OAuth 2.0 TABLE OF CONTENTS INTRODUCTION TO OAUTH 2.0... 3 OAuth Protocol... 4 Delegated Authentication... 6 Why OAuth?... 7 BUSINESS SCENARIO... 7 Mobile use case... 8 Integration
My Stuff Everywhere Your Content On Any Screen
Technical Brief Bob Lund, Distinguished Technologist, CableLabs September, 2014 My Stuff Everywhere Your Content On Any Screen The My Stuff Everywhere Concept The My Stuff Everywhere (MSE) concept is simple
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Android In The Cloud: A New PaaS Computing Platform
ASCENDER TECHNOLOGIES LTD. Android In The Cloud: A New PaaS Computing Platform Joel Isaacson [email protected] +972 50.597.5146 www.ascender.com/remote-graphics www.ascender.com/remote-graphics [email protected]
Remote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
Glinda Cummings World Wide Tivoli Security Product Manager
Featured Speaker IBM Security Solutions! Glinda Cummings World Wide Tivoli Security Product Manager 2010 IBM Corporation IBM Security Solutions! How IBM defines Cloud Computing IBM Security Solutions!
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
