A Movie Streaming Application & ABC4Trust as Services in the Cloud. Dr. Anja Lehmann
|
|
|
- Ralph McCormick
- 10 years ago
- Views:
Transcription
1 A Movie Streaming Application & ABC4Trust as Services in the Cloud Dr. Anja Lehmann IBM Research Zurich A research project funded by the European Commission s 7th Framework Programme.
2 Lessons learned from the pilots... Lessons learned from the pilots Privacy-ABCs hard to deploy Demos are private hard to try out Smart card integration somewhat slow New demo Public demo Verifier and Issuer as cloud services New smart card prototyp and optimized integration 2 Dr. Anja Lehmann IBM Research Zurich
3 Alice wants to watch a movie I wish to see Alice in Wonderland Alice Movie Streaming Service 3 Dr. Anja Lehmann IBM Research Zurich
4 Alice wants to watch a movie Sure, if you have subscription & are older than 12 Alice Movie Streaming Service 4 Dr. Anja Lehmann IBM Research Zurich
5 Watching the movie with the traditional solution OK, here's my eid my subscription Alice Movie Streaming Service 5 Dr. Anja Lehmann IBM Research Zurich
6 Watching the movie with the traditional solution Aha, you are Alice Doe born on Dec 12, Waterdrive CH 8003 Zurich Single Expires Aug 4, 2018 Alice Mplex Customer # Premium Subscription Expires Jan 13, 2016 Movie Streaming Service 6 Dr. Anja Lehmann IBM Research Zurich
7 Watching the movie with the traditional solution This is a privacy and security problem! identity theft profiling discrimination Alice Aha, you are Alice Doe born on Dec 12, Waterdrive CH 8003 Zurich Single Expires Aug 4, 2018 Mplex Customer # Premium Subscription Expires Jan 13, 2016 Movie Streaming Service 7 Dr. Anja Lehmann IBM Research Zurich
8 Watching the movie with the traditional solution With OpenID and similar solutions, e.g., log-in with Facebook ok, I'm Alice Movie Streaming Service 8 Dr. Anja Lehmann IBM Research Zurich
9 Watching the movie with the traditional solution With OpenID and similar solutions, e.g., log-in with Facebook Aha, Alice is watching a 12+ movie Alice Movie Streaming Service 9 Dr. Anja Lehmann IBM Research Zurich
10 Watching the movie with the traditional solution With OpenID and similar solutions, e.g., log-in with Facebook Aha, Alice is watching a 12+ movie Aha, you are [email protected] born on Dec 12, 1998 Alice's friends are... Alice's public profile is Mplex Customer # Premium Subscription Expires Jan 13, 2016 Alice Movie Streaming Service 10 Dr. Anja Lehmann IBM Research Zurich
11 Privacy-ABCs solve this. When Alice authenticates to the Movie Streaming Service with Privacy-ABCs, all the service learns is that Alice and no more. has a subscription & is older than 12 Sure, if you have subscription & are older than 12 Movie Streaming Service 11 Dr. Anja Lehmann IBM Research Zurich
12 Privacy-protecting authentication with Privacy-ABCs Like PKI but does not send credential minimal attribute disclosure Alice valid subscription eid with age 12 Privacy-ABC eid & voucher Movie Streaming Service 12 Dr. Anja Lehmann IBM Research Zurich
13 Privacy-protecting authentication with Privacy-ABCs Like PKI but does not send credential minimal attribute disclosure Aha, you have subscription & are older than 12...enjoy the movie! Alice Privacy-ABC presentation token Movie Streaming Service 13 Dr. Anja Lehmann IBM Research Zurich
14 Let's watch a movie then! 14 Dr. Anja Lehmann IBM Research Zurich
15 ABC4Trust and the cloud helping Issuers and Service Provider to use Privacy-ABCs 15 Dr. Anja Lehmann IBM Research Zurich
16 ABC4Trust and the cloud request resource application layer Credential Wallet Browser/ Application presentation policy presentation token Application Access Control Engine policy layer User ABC Engine policy credential matcher storage Verifier ABC Engine policy token matcher storage evidence generation orchestration credential mgr evidence verification orchestration token mgr crypto layer Crypto Engine (e.g. Idemix) Sig Enc Com ZKP Crypto Engine (e.g. Idemix) Sig Enc Com ZKP all running in the cloud as a service 16 Dr. Anja Lehmann IBM Research Zurich
17 ABC4Trust and the cloud request resource application layer Credential Wallet Browser/ Application presentation policy presentation token Application Access Control Engine policy layer User ABC Engine policy credential matcher storage Verifier ABC Engine policy token matcher storage evidence generation orchestration credential mgr evidence verification orchestration token mgr crypto layer Crypto Engine (e.g. Idemix) Sig Enc Com ZKP Crypto Engine (e.g. Idemix) Sig Enc Com ZKP all running in the cloud as a service 17 Dr. Anja Lehmann IBM Research Zurich
18 Benefits of running ABC4Trust services in the cloud Cloud services reduce the complexity for Issuer and Verifier No complex installation and configuration of the ABC4Trust components No maintenance Cloud offers tools to simplify service integration, e.g.: Issuer: Interface to LDAP etc. credential specs can be derived automatically Service Provider: Integration tools for access control, MySQL, preconfigured PKI Issuance as a Service Verification as a Service 18 Dr. Anja Lehmann IBM Research Zurich
19 Benefits of running ABC4Trust services in the cloud Relying on cloud/web services is already common deployment model Use of external service for authorization is common practice (e.g. Facebook login) simple integration/migration Small business often rely on cloud infrastructure anyway Issuer and Verifier could run their own cloud Issuance as a Service Verification as a Service 19 Dr. Anja Lehmann IBM Research Zurich
20 Drawbacks of running ABC4Trust services in the cloud Cloud provider learn user attributes during issuance and verification But Privacy-ABCs already help to minimize the revealed information (less PII) No need for single provider as in OpenID/Facebook Multiple issuance/verification services reduce trust requirements Issuance as a Service Verification as a Service 20 Dr. Anja Lehmann IBM Research Zurich
21 ABC4Trust and the cloud request resource application layer Credential Wallet Browser/ Application presentation policy presentation token Application Access Control Engine policy layer User ABC Engine policy credential matcher storage Verifier ABC Engine policy token matcher storage evidence generation orchestration credential mgr evidence verification orchestration token mgr crypto layer Crypto Engine (e.g. Idemix) Sig Enc Com ZKP Crypto Engine (e.g. Idemix) Sig Enc Com ZKP all running in the cloud as a service 21 Dr. Anja Lehmann IBM Research Zurich
22 ABC4Trust and the cloud request resource application layer Credential Wallet Browser/ Application presentation policy presentation token Application Access Control Engine policy layer User ABC Engine policy credential matcher storage Verifier ABC Engine policy token matcher storage evidence generation orchestration credential mgr evidence verification orchestration token mgr crypto layer Crypto Engine (e.g. Idemix) Sig Enc Com ZKP Crypto Engine (e.g. Idemix) Sig Enc Com ZKP web-based user wallet all running in the cloud as a service 22 Dr. Anja Lehmann IBM Research Zurich
23 Web-based user wallet Benefits: No dedicated software needed access via Browser Credentials can be used from multiple devices User has choice of whom to trust no need for single entity as in OpenID Drawbacks: User has to trust the wallet provider with all data Verifier has to trust wallet provider to properly protect credential access Wallet on user device (e.g. phone) still preferable! Issuance as a Service User Wallet Verification as a Service 23 Dr. Anja Lehmann IBM Research Zurich
24 Summary Cloud is just a deployment model that makes integration easier helps to get Privacy-ABCs started and privacy & security is better than with currently used mechanisms Demo: idemixdemo.zurich.ibm.com Twitter Chat 28 January at 16:00 CET (Data Privacy Day) How: You just need a Twitter handle and use #identitymixer What: Live discussion & exciting news about Identity Mixer Anja Lehmann: [email protected] Jan Camenisch: [email protected] Links Dr. Anja Lehmann IBM Research Zurich
Public Key Infrastructure
UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported
NOK NOK LABS AUTHENTICATION & OTT SERVICES
NOK NOK LABS AUTHENTICATION & OTT SERVICES RAJIV DHOLAKIA VP PRODUCTS & BUSINESS DEVELOPMENT 1 NOK NOK LABS The authentication challenge A DILEMMA UNTIL WE CAN TRULY RECOGNIZE PEOPLE ONLINE, IN REAL TIME...
Authentication: Password Madness
Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the
2-FACTOR AUTHENTICATION WITH
2-FACTOR AUTHENTICATION WITH 2X JUNE 2014 Two-Factor Authentication and Authy What is Two-Factor Authentication? Two-Factor Authentication is a process involving two stages to verify the identity of someone
Service Description. 3SKey. Connectivity
Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey
D6.2 Necessary hardware and software package for the school pilot deployment
Attribute-Based Credentials for Trust D6.2 Necessary hardware and software package for the school pilot deployment Joerg Abendroth, Souheil Bcheri, Kasper Damgaard, Hamza Ghani, Jesus Luna, Gert Læssøe
The University Course Evaluation pilot
The University Course Evaluation pilot Yannis Stamatiou, Computer Technology Institute (CTI) & Press Diophantus Trust in the Digital World Enabling the Economics of Trust 7 8 April 2014, Vienna, Austria
Business Banking Customer Login Experience for Enhanced Login Security
Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification
Scalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
D7.1 Application Description for Students
Attribute-Based Credentials for Trust D7.1 Application Description for Students Joerg Abendroth, Vasiliki Liagkou, Apostolis Pyrgelis, Christoforos Raptopoulos, Ahmad Sabouri, Eva Schlehahn, Yannis Stamatiou,
Can We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
Digital Identity Management
Digital Identity Management Roohul Halim Syed Atif Shaharyar Email: {rooha433, syesh740}@student.liu.se Supervisor: Anna Vapen, {[email protected]} Project Report for Information Security Course Linköpings
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
BYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity
BYE BYE PASSWORDS The Future of Online Identity Hans Zandbelt Sr. Technical Architect CTO Office - Ping Identity 2015 Copyright 2014 Ping Identity Corp. All rights reserved. 1 Agenda 1 2 3 Cloud & Mobile:
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
Lecture VII : Public Key Infrastructure (PKI)
Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT. How to Create a Frictionless, Secure Customer Identity Management Strategy
SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT How to Create a Frictionless, Secure Customer Identity Management Strategy PART 1: WHAT IS SAML? SAML in Context Security Assertion Markup Language
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Account Activation. Guide
Account Activation Guide Table of Contents Introduction... 3 Activating Your Account... 3 Activation Step 1: Identity Verification... 3 Activation Step 2: User Information... 5 Verify Account Information...
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
A trusted identity management system is not only essential for ensuring your customers safety and confidence.
A trusted identity management system is not only essential for ensuring your customers safety and confidence. With the new EU legislation, high protection of personal data has become a pressing need. Side
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Apache Milagro (incubating) An Introduction ApacheCon North America
Apache Milagro (incubating) An Introduction ApacheCon North America Apache Milagro will establish a new independent security framework for the Internet A Distributed Cryptosystem Secure the Future of the
Agent and Broker Participation in the Federally-facilitated Marketplace (FFM): An Overview for States
Agent and Broker Participation in the Federally-facilitated Marketplace (FFM): An Overview for States Presented on: June 3, 2014 Centers for Medicare & Medicaid Services (CMS) Center for Consumer Information
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
Digital Credentials CLAIM YOUR BADGE!
Digital Credentials CLAIM YOUR BADGE! Why Use Digital Credentials? To market your credentials This is an important means of empowering you to promote yourself professionally and communicate the value of
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
Taylor & Francis Online Mobile FAQs
Taylor & Francis Online Mobile FAQs ACCESS Q. How do I access Taylor & Francis Online Mobile? A. Open the browser on your mobile device and enter the URL www.tandfonline.com. As you are accessing the site
360 Online authentication
360 Online authentication Version October 2015 This document will help you set up a trust for authentication of 360 Online users between Azure Access Control Service and either Office 365 or Active Directory
Whitepaper on identity solutions for mobile devices
Whitepaper on identity solutions for mobile devices How software and hardware features of modern mobile devices can improve the security and user experience of your software Author: Jonas Lindstrøm The
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
ADFS for. LogMeIn and join.me authentication
ADFS for LogMeIn and join.me authentication ADFS for join.me authentication This step-by-step guide walks you through the process of configuring ADFS for join.me authentication. Set-up Overview 1) Prerequisite:
Secure Your Enterprise with Usher Mobile Identity
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
EMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
McAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
Guide to building a secure and trusted BYOID environment
e-healthcare e-gaming e-insurance e-commerce e-banking e-government Guide to building a secure and trusted BYOID environment Bring-Your-Own-Identity is not new. People have been using their social media
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO
E-Guide HOW MICROSOFT AZURE AD USERS CAN EMPLOY SearchSecurity HOW MICROSOFT AZURE AD USERS CAN EMPLOY T echnology journalist David Strom explaims how to use Azure Active Directory and Azure Multifactor
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
McAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
ACCESSING MICROSOFT OFFICE 365 FREE STUDENT RESOURCES
ACCESSING MICROSOFT OFFICE 365 FREE STUDENT RESOURCES Download and Installation instructions 1. Go here and sign into Office 365 with your username and password. Username: [email protected]
No additional requirements to use the PIV I card for physical facility access have been identified.
1. The RFI request document regarding Driver Authentication states that "any one or more of the following methods" will be required: Personal Identification Number (PIN) Non Federal Personal Identity Verification
Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
Entrust Managed Services PKI Administrator Guide
Entrust Managed Services PKI Entrust Managed Services PKI Administrator Guide Document issue: 3.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered
The Password Problem Will Only Get Worse
The Password Problem Will Only Get Worse New technology for proving who we are Isaac Potoczny-Jones Galois & SEQRD [email protected] @SyntaxPolice Goals & Talk outline Update the group on authentication
SAFE Digital Signatures in PDF
SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
Understanding Your Customer Journey by Extending Adobe Analytics with Big Data
SOLUTION BRIEF Understanding Your Customer Journey by Extending Adobe Analytics with Big Data Business Challenge Today s digital marketing teams are overwhelmed by the volume and variety of customer interaction
IT Exam Training online / Bootcamp
DumpCollection IT Exam Training online / Bootcamp http://www.dumpcollection.com PDF and Testing Engine, study and practice Exam : 70-534 Title : Architecting Microsoft Azure Solutions Vendor : Microsoft
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
SINGLE & SAME SIGN-ON ASPECTS
SINGLE & SAME SIGN-ON ASPECTS OF AZURE ACTIVE DIRECTORY Harold Baele Senior ICT Trainer JULY 2, 2015 SLIDE 1 TRAINER INFO Harold Baele MCT at RealDolmen Education [email protected] - @hbaele
000-596. IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam. http://www.examskey.com/000-596.html
IBM 000-596 IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam TYPE: DEMO http://www.examskey.com/000-596.html Examskey IBM 000-596 exam demo product is here for you to
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
2015-11-02. Electronic Payments Part 1
Electronic Payments Part Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN4 - Advanced
Important Information
June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com
General tips for increasing the security of using First Investment Bank's internet banking
General tips for increasing the security of using First Investment Bank's internet banking Dear Clients, First Investment Bank (Fibank, the Bank) provides you with high level of protection and security
How to Extend Identity Security to Your APIs
How to Extend Identity Security to Your APIs Executive Overview The number of users and devices requesting access to applications is growing exponentially and enterprises are scrambling to adapt their
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
Entrust Managed Services PKI
Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
Electronic Prescribing System (EPCS)
Electronic Prescribing System (EPCS) In order to use EPCS in Wells Px3, the following steps must be completed: 1. Each prescriber who wants to use EPCS completes the signup process 2. Practice sets the
Cloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
Lecture 10 - Authentication
Lecture 10 - Authentication CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Kerberos: What to know 1) Alice T rent : {Alice + Bob
ADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
An Identity Management Survey. on Cloud Computing
Int. Journal of Computing and Optimization, Vol. 1, 2014, no. 2, 63-71 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijco.2014.458 An Identity Management Survey on Cloud Computing Ardi BENUSI
Digital Identity Management
Digital Identity Management Techniques and Policies E. Bertino CS Department and ECE School CERIAS Purdue University [email protected] Digital Identity Management What is DI? Digital identity (DI)
Department of Defense PKI Use Case/Experiences
UNCLASSIFIED//FOR OFFICIAL USE ONLY Department of Defense PKI Use Case/Experiences PKI IMPLEMENTATION WORKSHOP Debbie Mitchell DoD PKI PMO [email protected] UNCLASSIFIED//FOR OFFICIAL USE ONLY Current
Identity, Credential, and Access Management. Open Solutions for Open Government
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management www.idmanagement.gov Open Solutions for Open Government Judith Spencer Co-Chair, ICAM
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Adobe PDF for electronic records
White Paper Adobe PDF for electronic records Digital signatures and PDF combine for definitive electronic records and transactions Contents 1 PDF and electronic records 2 Digital certification 3 Validating
