Enable Your Applications for CAC and PIV Smart Cards
|
|
|
- Noel Foster
- 9 years ago
- Views:
Transcription
1 Enable Your Applications for CAC and PIV Smart Cards Executive Summary Since HSPD-2 was signed in 2004, government agencies have issued over 5 million identity badges. About 90% of government workers and contractors wear their identity around their neck. While most agencies are leveraging these for physical access, the challenge comes in trying to use them for logical access to systems. Today users still use multiple accounts and passwords to access systems. Ping Identity s solutions allow end users to use their PIV cards for seamless access to on-premise, hosted and cloud-based applications. This paper describes how agencies can leverage the card that hangs around user necks to be the key all applications.
2 Table of Contents Executive Summary... Deliver the Value of Smart Cards...3 OMB M--: Take HSPD-2 One Step Farther Realizing the Promise of Smart Cards... 3 CAC and PIV Integration Challenges....4 Government Infrastructures Complicate Smart-Card Integration... 4 Complex Behind-the-Scenes Functionality... 5 Commercial Off-the-Shelf (COTS) Solutions....5 What to Look for in a COTS Solution... 5 Why Choose PingFederate for Your COTS Solution... 6 Taking a Closer Look at PingFederate...7 How PingFederate Works % Adherence to Open Standards... 8 How the X.509 Integration Kit Works... 8 How Service Provider Integration Works... 9 Citrix XenApp Integration Kit... 9 CA SiteMinder Integration Kit... 9 SaaS Connectors... 0 Identity-Enabled Web Services... 0 Putting It All Together...0 Meeting OMB M-- Today and Tomorrow.... About Ping Identity... 2
3 HSPD-2 HSPD-2 calls for a mandatory, government-wide standard for secure and reliable forms of ID issued by the federal government to its employees and employees of federal contractors for access to federally-controlled facilities and networks. Deliver the Value of Smart Cards OMB M--: Take HSPD-2 One Step Farther In 20, the U.S. Government s Office of Management and Budget (OMB) sent an explicit directive to all federal agencies: Now that most government workers and contractors possess an X.509 smart card (CAC, PIV or PIV-I), step up your efforts to enable its use for accessing facilities and IT resources or risk losing funding. For government IT and security professionals, the stakes are high. The memorandum, known as OMB M--, mandates that funding for the development and maintenance of systems and resources new or existing is contingent on smart-card integration. With the stakes so high, now is the time to Understand why enabling applications to be smart-card compliant doesn t have to be difficult, expensive and time-consuming Learn how commercial off-the-shelf (COTS) solutions provide easy-to-implement, costeffective ways to address OMB M-- requirements Discover how PingFederate can help you meet the challenges of smart-card integration Realizing the Promise of Smart Cards The U.S. government s investment in X.509 smartcard technology is longstanding and considerable. The Department of Defense first deployed Common Access Cards (CACs) a decade ago. In 2004, Personal Identity Verification (PIV) and PIV-Interoperable (PIV-I) cards became a government-wide regulation with Homeland Security Presidential Directive 2 (HSPD-2), which called for multifactor authentication, digital signatures, encryption capabilities and a standardized background check for every government employee and contractor. Distributing PIV smart cards to employees and PIV-I smart cards to contractors across all federal agencies was the first step, but now attention has shifted to integrating applications into the PIV authentication infrastructure. With the huge variety of applications and architectures in use by government workers, creating agency-wide smartcard compatibility is a significant task. But to realize the promise of smart cards greater security, convenience and cost-savings enabling applications to accept PIV credentials is a necessity. 3
4 ICAM Segment Architecture The ICAM segment architecture provides a comprehensive approach to identity, credential and access management. CAC and PIV Integration Challenges Government Infrastructures Complicate Smart-Card Integration The need to provide access to a diverse set of applications complicates smart-card integration for many federal agencies, including the DoD, intelligence community and civilian agencies. Virtualized Client/Server Applciations WAM-protected Applications Cloud-based Applications Web Services Government Workforce It s not unusual for a government worker to need access to Virtualized client/server applications via a Web browser Web Access Management (WAM) protected applications (e.g., CA SiteMinder, IBM Tivoli) Cloud-based applications (e.g., Google Concur, salesforce.com) Information-sharing applications that call identity-enabled Web services Other legacy government applications or systems Developing custom code to ready even one application for smart-card authentication is no small feat. For most government agencies, the quantity of resources people, time, money needed to meet smart-card compliance seems staggering. Fortunately, a variety of commercial off-the-shelf (COTS) products and technologies are available to help agencies meet the requirements of OMB M--. An agency needs to carefully weigh the costs and benefits of a COTS solution vs. custom development to determine which option best meets the needs of the agency. 4
5 FICAM Roadmap The Federal ICAM Roadmap and Implementation Guidance outlines the strategic vision for ICAM efforts and the steps for implementing the ICAM segment architecture. Complex Behind-the-Scenes Functionality To understand the challenges of enabling an application to accept smart-card credentials, consider the e-authentication model that NIST recommends in the NIST Special Publication Electronic Authentication Guideline. Government Agency PIV or CAC Authentication Credential Service Provider (CSP) SaaS Apps SAML configured for IdP and SP Roles On-premise Apps The left side of the diagram shows the steps required to set up smart-card authentication for a government worker. The worker registers () with a registration authority (RA). The RA vets the worker (2) and sends a registration confirmation (3) to a credential service provider (CSP). In turn, the CSP issues an identity token and credential (4) to be used for subsequent authentication events (e.g., accessing an application). The CSP maintains the credential; the worker maintains the smart card, which stores the token. The right side of the diagram shows the steps that must occur when the worker uses the smart card for authentication. The worker proves to a verifier that he or she possesses and controls the token through an authentication protocol exchange (A). The verifier interacts with the CSP (B) to validate the token and credential associated with the worker. The verifier then issues an identity assertion about the worker to the relying party (e.g., an application C). The relying party establishes an authenticated session with the worker (D). The workhorse in the NIST model is the verifier. Deploying a COTS solution that can fulfill the role of the verifier for a broad spectrum of applications can help you rapidly enable your agency applications to accept PIV credentials. Commercial Off-the-Shelf (COTS) Solutions What to Look for in a COTS Solution While the government does not require an agency to purchase a COTS solution or solution 5
6 PingFederate Highlights suite, agencies that consider this option need to answer several questions before deciding to purchase: How successfully will the product help us meet our service goals? Leverages agency investment in smart cards Meets mandates and requirements for funding Integrates today s onpremise and tomorrow s cloud applications Deploys rapidly How will the product integrate with our existing infrastructure? Is software licensing (or other cost-saving options) available? Does the solution use proprietary technology or is it based on open standards? With an eye on future needs, how adaptable is the solution? Does the solution support government initiatives and policies? Integrating an IT resource into the CAC and PIV authentication infrastructure can vary from simple to complex, depending on the type of resource, its age and ability to be updated, and the diversity of its user base. For example, transitioning some legacy applications might take months or more to complete and require extensive and costly custom development. So, it s important to make sure any COTS solution that you consider is robust enough so that you can enable most (if not all) of your agency resources simply, rapidly and cost-effectively. Why Choose PingFederate for Your COTS Solution PingFederate provides secure single sign-on (SSO) access to multiple applications and application architectures to all the types of applications a government worker typically uses. Working behind the scenes in the role of the verifier, PingFederate can conduct CAC or PIV user authentication exchange, validate the certificate with the credential service provider and securely pass the necessary identity information to the desired application to establish an authenticated session with the user. Government Agency SaaS Apps PIV or CAC Authentication Credential Service Provider (CSP) SAML configured for IdP and SP Roles On-premise Apps 6
7 PingFederate Cloud identity management platform for cloud single sign-on (SSO), automated cloud user provisioning and API security. Built on open standards and security technologies such as HTTP, HTTPS, SSL, TLS, SAML and PKI, PingFederate is designed specifically to help extend existing applications and its robust. Commercial integration kits support all leading identity management vendors and applications to enable rapid deployment into your existing infrastructure. The solution offers an SDK so that you can create custom adapters for systems that do not have an integration kit. PingFederate works with more than 200 SaaS partners out of the box. In addition to its core federated identity and SAML-based SSO capabilities, PingFederate also enables secure mobile access, automated cloud user provisioning and API security. Taking a Closer Look at PingFederate How PingFederate Works PingFederate is standalone, enterprise software. It provides an administration console and management services, runtime services and extensive logging and monitoring capabilities. But the most significant PingFederate feature and the reason WHY you can implement the software in days in most government environments is the rich set of integration capabilities that comes with the product. Administration Console Management Services Integration Kits SaaS Connectors Cloud Identity Connectors Token Translators CloudDesktop Cloud Single Cloud Sign-On Single & Federated Sign-On Identity Secure Mobile Access Automated Cloud User Provisioning API Security Runtime Services Logging & Monitoring PingFederate provides turnkey integration kits for more than 30 identity and application infrastructures. For CAC and PIV smart card integration, you use the X.509 integration kit, but PingFederate provides integration kits for Microsoft AD, CA SiteMinder, LDAP and many other identity provider environments, as well as an SDK for agentless integration. On the service provider side, PingFederate integrates with Java,.NET and PHP application environments; Web and application servers such as Apache or Microsoft IIS; WAM systems such as CA SiteMinder, Oracle OAM and IBM TAM; and commercial applications such as Citrix and Microsoft SharePoint. 7
8 PingFederate X.509 Certificate Integration Kit First Mile The Cloud Last Mile Certification provides an identity Identity Provider Service Provider provider (IdP) adapter that lets a PingFederate IdP server perform X.509 certificate authentication for SSO to service provider applications. Identity Mgmt. Systems Oracle OAM, IBM TAM, Active Directory, LDAP, Windows IWA Strong Auth Symantec VIP, RSA SecureID, RSA Adaptive Authentication, PhoneFactor, X.509 Custom Apps Java,.NET, PHP, Agentless Employees Browser 2 3 SAML OAuth OpenID WS-Trust WS-Federation Custom Apps Java,.NET, PHP, Agentless Web & App Servers Apache, Microsoft IIS, SAP NetWeaver, WebLogic, WebSphere Identity Mgmt. Systems Oracle OAM IBM TAM Commercial Apps Citrix SharePoint Firewall 00% Adherence to Open Standards PingFederate provides integrated support for all predominant open communications standards SAML, OAuth, OpenID, WS-Trust and WS-Federation to meet the needs of a wide range of government environments. SAML, an XML-based standard for communicating identity information between organizations, is the most accepted protocol for communicating identities across the Internet. Because of PingFederate s SAML-based capabilities, more than 200 partners have teamed with Ping Identity to deliver Tier SSO solutions. How the X.509 Integration Kit Works Consider a typical scenario in which a government worker logs on with a CAC or PIV smart card then requests an application through a Web portal. The X.509 integration kit, which installs with PingFederate, lets PingFederate acquire the user s certificate directly from the Web browser via SSL () The Cloud Next, PingFederate authenticates and validates Enterprise the certificate (2). Finally, PingFederate bundles up Certificate Manager SAML OAuth OpenID WS-Trust WS-Federation 3 all the user attributes from the certificate and other sources (e.g., a directory) into a secure SAML Employees Browser x.509 assertion and sends it to Firewall the requested application, authenticating the user (3). 8
9 How Service Provider Integration Works In the service provider role, PingFederate receives and decodes the security token. The various integration kits then enable the target application to consume the user information and use it to set up a valid session or other security context for the user. Citrix XenApp Integration Kit For example, consider what happens with the Citrix XenApp (a virtualized client/server application) integration kit. SAML 2 Plugin Service Provider Once the SAML assertion arrives, PingFederate uses an IIS server to generate an XenApp equivalent Kerberos ticket. XenApp uses the Kerberos ticket to authenticate the user and establish a user session. CA SiteMinder Integration Kit The PingFederate SiteMinder (a WAMprotected application) Service Provider integration kit works SAML Plugin differently. In this case, 2 once the SAML assertion arrives (), PingFederate instructs SiteMinder Policy Server to generate an SiteMinder SMSESSION cookie (2). PingFederate then redirects the user to the application where the SiteMinder Web Agent extracts and validates the SMSESSION cookie (3). 9
10 HSPD-2 Credentials Through 9//20 Employees: 4,270,560 (9%) Contractors: 846,365 (8%) Total: 5,6,925 (89%) IDManagement.gov SaaS Connectors The connectors supporting Google and other SaaS applications take advantage of the fact that these applications support SAML natively. In this case, PingFederate is involved only on the identity provider side. When a government worker logs on with a CAC or PIV card then clicks a link for Google Apps or Gmail in the Web portal, the link redirects the user to PingFederate (), which validates the user identity (2). PingFederate sends a SAML assertion directly Identity Provider The Cloud Directory Employees Browser SAML apps Provisioning Plugin Firewall to the Google application, and the application completes the SAML processing, establishes a secure session with the user and redirects the user to the application. Identity-Enabled Web Services In the case of identityenabled Web services, PingFederate supports both SOAP-based and REST-ful APIs. In the SOAP case, PingFederate receives the X.509 certificate from a Web service client and uses a security token service to translate the certificate into a SAML assertion that it places in the SOAP header. SAML is the protocol of choice because it s designed to be portable and secure in hostile environments. When the Web service provider receives the SAML assertion, it can make a quick, complete determination about whether the request is authorized. Clients Browser SOAP APIs Service Provider RESTful APIs PingFederate also supports the OAuth 2 standard for REST-based Web services, which numerous government agencies are starting to use. 0
11 Putting It All Together Meeting OMB M-- Today and Tomorrow The mandates of OMB M-- have raised the bar for enabling the usefulness of CAC and PIV credentials in federal agencies. Agencies that have made significant progress issuing smart cards must leverage that investment today and going forward. A multitude of ways exist for agencies to adapt their logical access control systems (LACS) infrastructure to accommodate CAC and PIV cards for authentication, including a variety of solution alternatives and implementation approaches. Analyzing the costs, benefits and timeliness of custom development, COTS solutions or some combination of both is a critical part of agency s transition plan. Taking a close look at the capabilities of Ping Identity s PingFederate for CAC and PIV enablement can benefit many government agencies. We invite you to visit our website and contact us for more information. About Ping Identity Ping Identity provides cloud identity security solutions to the world s foremost companies, government organizations and cloud businesses. For more information, dial U.S. toll-free or , [email protected] or visit pingidentity.com/gov. 8/ Ping Identity Corporation. All rights reserved. Ping Identity, PingFederate, PingFederate Express, PingConnect, PingOne, PingEnable, the Ping Identity logo, SignOn. com, Auto-Connect and Single Sign-On Summit are registered trademarks, trademarks or servicemarks of Ping Identity Corporation. All other product and service names mentioned are the trademarks of their respective companies.
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
PingFederate. SSO Integration Overview
PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,
Connecting Users with Identity as a Service
Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service
CA Single Sign-On Migration Guide
CA Single Sign-On Migration Guide Web access management (WAM) systems have been a part of enterprises for decades. It is critical to control access and audit applications while reducing the friction for
PingFederate. Integration Overview
PingFederate Integration Overview 2008 Ping Identity Corporation. All rights reserved. Part Number 3007-321 January, 2008 Ping Identity Corporation 1099 18th Street, Suite 2950 Denver, CO 80202 U.S.A.
UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS. Single Sign-On (SSO) Solution
UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS Single Sign-On (SSO) Solution For University Information Systems (UIS) May 9, 2013 2 University of Colorado
Identity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Pick Your Identity Bridge
Pick Your Identity Bridge Options for connecting users and resources across the hybrid cloud Executive Overview Enterprises are increasing their use of software as a service (SaaS) for two principal reasons:
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
white paper 5 Steps to Secure Internet SSO Overview
5 Steps to Secure Internet SSO Overview This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated
How to Extend Identity Security to Your APIs
How to Extend Identity Security to Your APIs Executive Overview The number of users and devices requesting access to applications is growing exponentially and enterprises are scrambling to adapt their
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
The Role of Identity Enabled Web Services in Cloud Computing
The Role of Identity Enabled Web Services in Cloud Computing April 20, 2009 Patrick Harding CTO Agenda Web Services and the Cloud Identity Enabled Web Services Some Use Cases and Case Studies Questions
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
Extend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
OpenID Connect 1.0 for Enterprise
OpenID Connect 1.0 for Enterprise By Paul Madsen Executive Overview In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity
Identity Implementation Guide
Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com
MOBILITY Transforming the mobile device from a security liability into a business asset. pingidentity.com Table of Contents Introduction 3 Three Technologies That Securely Unleash Mobile and BYOD 4 Three
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107
Okta Identity Management for Portals Built on Salesforce.com An Architecture Review Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 Okta: A Platform for Cloud
CA CloudMinder. Getting Started with SSO 1.5
CA CloudMinder Getting Started with SSO 1.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs Executive Overview A key technical underpinning of the Cloud is the Application Programming Interface (API). APIs provide consistent
Customer Identity and Access Management (CIAM) Buyer s Guide
Customer Identity and Access Management (CIAM) Buyer s Guide Shifting Marketplace Over the last five years, there has been a major shift in how enterprises need to look at and secure customer identities
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
How To Manage A Plethora Of Identities In A Cloud System (Saas)
TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM
FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM Four Pillars that HSPD-12 Programs must consider for a secure, efficient, interoperable PIV enterprise deployment. Continued HSPD-12 Implementation under OMB
DEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
Federated Identity and Single Sign-On using CA API Gateway
WHITE PAPER DECEMBER 2014 Federated Identity and Single Sign-On using Federation for websites, Web services, APIs and the Cloud K. Scott Morrison VP Engineering and Chief Architect 2 WHITE PAPER: FEDERATED
Cloud SSO and Federated Identity Management Solutions and Services
Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT Executive Overview SAML (Security Assertion Markup Language) is a standard that facilitates the exchange of security information. Developed by
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Simple Cloud Identity Management (SCIM)
Simple Cloud Identity Management (SCIM) Abstract The Simple Cloud Identity Management (SCIM) specification defines a simple, RESTful protocol for identity account management operations. SCIM s model is
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access
IBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
How to Get to Single Sign-On
How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in
Flexible Identity Federation
Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
Identity in the Cloud
White Paper Identity in the Cloud Use the cloud without compromising enterprise security Table of Contents The Cloud Conundrum 3 Managing Cloud Identity 3 The Identity Lifecycle 4 SaaS Single Sign-On 4
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
The Challenges of Web single sign-on
Serge Vereecke Security Architect IBM Security Services [email protected] The Challenges of Web single sign-on GSE Event September 7, 2012 Agenda Single sign-on technology Why single sign-on Challenges
HOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
Access Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
NetworkingPS Federated Identity Solution Solutions Overview
NetworkingPS Federated Identity Solution Solutions Overview OVERVIEW As the global marketplace continues to expand, new and innovating ways of conducting business are becoming a necessity in order for
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses
STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with
2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
Increase the Security of Your Box Account With Single Sign-On
A Box White Paper Increase the Security of Your Box Account With Single Sign-On Box s high level of security, 24x7 support and 99.9% uptime are critical for us. The biggest benefits are the reliability
SAML 101. Executive Overview WHITE PAPER
SAML 101 Executive Overview Today s enterprise employees use an ever-increasing number of applications, both enterprise hosted and in the Cloud, to do their jobs. What s more, they are accessing those
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems [email protected]
Mobile Identity and Edge Security Forum Sentry Security Gateway Jason Macy CTO, Forum Systems [email protected] Evolution Evolution of Enterprise Identities Cloud Computing Iaas Infrastructure as a Service
Internet Information Services Integration Kit. Version 2.4. User Guide
Internet Information Services Integration Kit Version 2.4 User Guide 2014 Ping Identity Corporation. All rights reserved. PingFederate Internet Information Services User Guide Version 2.4 June, 2014 Ping
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
White paper Contents
Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Management Challenges of Software
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.
KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings [email protected] October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
Okta White paper Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-dint-053013 Table of Contents
RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION
RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities. With so
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple how-to whitepapers will
Securing Web Services From Encryption to a Web Service Security Infrastructure
Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager
TrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
How to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
Federal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process
Federal Identity, Credentialing, and Access Management Identity Scheme Adoption Process Version 1.0.0 Release Candidate July 8, 2009 ii Document History Status Release Date Comment Audience Draft 0.0.1
