Identity and Access Management & The Cloud, conflicting or collaborating? NetIQ - All Rights Reserved
|
|
|
- Bryce Boone
- 9 years ago
- Views:
Transcription
1 Identity and Access Management & The Cloud, conflicting or collaborating? NetIQ - All Rights Reserved
2 Agenda The cloud (re)defined Identity & Access Management infrastructures Conflicts Collaboration: products tips & tricks 2
3 The Cloud
4 What is the Cloud Wikipedia: Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of clouds as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts services with a user's data, software and computation over a network.
5 What is the Cloud
6 What is the Cloud Hybrid Public Google Apps, Salesforce.com O365 HRM-CRM SaaS Windows Azure, Google App Engine IBM IT Factory Heroku PaaS Amazon EC2, Rackspace Cloud IBM Blue Private Intranet software Windows Azure Platform Appliance Storage IaaS Servers DaaS? Networks VMWare, OpenStack, KVM Idaas?
7 We're talking about Identity & Access Hybrid Public Google Apps, Salesforce.com O365 HRM-CRM SaaS Windows Azure, Google App Engine IBM IT Factory Heroku PaaS Amazon EC2, Rackspace Cloud IBM Blue Private Intranet software Windows Azure Platform Appliance Storage IaaS Servers DaaS? Networks VMWare, OpenStack, KVM Idaas?
8 Hosted Software & the Cloud Public Google Apps, Salesforce.com O365 HRM-CRM Fake Cloud Providers HRM-CRM Hybrid SaaS Private Intranet software On Premise Let's treat them equally in the eyes of IAM
9 Software services for Education Google Apps Social media Google Apps, Salesforce.com O365 HRM-CRM Cloud & Hosted! O365 ADP RAET Blackboard Osiris Magister SOMToday It's Learning Banner Procuro Infinite Campus SIS PeopleSoft AFAS...
10 Why should we go to the Cloud Flexibiliteit Cost Control Access Anywhere Scalable On demand deployment Google Apps Social media O365 ADP RAET Blackboard Osiris Magister SOMToday It's Learning Banner Procuro PeopleSoft AFAS...
11 Why should we NOT go to the Cloud Loss of control over business assets (data) Dependency Lack of audibility Lack of transparancy Compliance Fail (new dutch law!) Migration, Backup and updates Security, privacy and compliancy Lack of automated processes I(dentification)A(uthenthication) A(utorisation)A(uditing) Google Apps Social media O365 ADP RAET Blackboard Osiris Magister SOMToday It's Learning Banner Procuro PeopleSoft AFAS...
12 And what if... The cloud is down (Real vs Fake) Updates changes usability Performance is poor The Bad Boys show up Google Apps Social media O365 ADP RAET Blackboard Osiris Magister SOMToday It's Learning Banner Procuro PeopleSoft AFAS...
13 Identity & Access Management Infrastructures
14 What is in the IAM Infrastructure Authentication Authorisation Identification Governance User provisioning Information Store Single Sign On Self service Compliancy Risk Management Role based management Claim Context Based Corporate Identity Federated Identity Law's and regulation Password Synchronisation Information Consistency Attestation WorkFlow (Businessflow) Access management & control Auditing Cloud
15 And what if... System users Employees Students Federation Systems Security Vault Access Management Authentication Services Presentation Identity Vault User interfaces Identity Management Queries Provisioning Monitoring, logging, auditing Authentication, federation, SSO Services App layer Data layer Self Service Other
16 Conflicting areas
17 Warning NetIQ - All Rights Reserved
18 What we get Corporate credentials in the cloud SaaS No single sign-on or strong authentication Compliance reporting Manual process Security Cost No reporting Business user experience IT Department Business flexibility
19 What we want SaaS Single sign-on and strong authentication Compliance reporting Automated process Security Full reporting Cost Business user experience Corporate credentials secured IT Department Business flexibility
20 Requirements for Cloud Services Automated (de)provisioning (Identity Management) Identification Authentication & Authorization (Access Management) (web) Single Sign On User Self Service Auditing Monitoring
21 NetIQ Products involved l Identity Manager Drivers BlackBoard (On Premise) Google Apps O365 SOAP JDBC (Over the internet?) CSV Scripting Access Manager or Cloud Access Federation Strong Authentication Sentinel edirectory l l l l l l l l l l l l
22 Product Tips, Tricks & Pitfalls
23 edirectory
24 edirectory Scalable Edirectory (Security Vault Setup) EduRoam/VPN/Wifi l
25 IDM Drivers
26 Google Apps Driver Like AD Driver: very elaborated Easy to deploy Tip: keep all business logic local to IV; Synchronise results Alternative Scripting against interface Pitfalls Speed of development at Google Connection changes Many policies in the driver, difficult to change
27 O365 Driver Like AD Driver: very elaborated Easy to deploy Tip : keep all business logic local to IV. Synchronise results Specials with PSExecute Pitfalls Difference in On-Prem Hybrid & Cloud PSExecute limitations Hard to customize Comparison with DirSync ;-)
28 Blackboard Driver Like AD Driver: very elaborated because of Ease of Use Blackboard interface Uses special schema Tip: keep all business logic local to IV. Synchronize results Tip: Do Users, Courses & Enrollments
29 SOAP REST Driver Fall back for non dedicated drivers. Like LDAP/JDBC/CSV/Scripting etc Most commonly used for Cloud services (de)provisioning
30 Proper way to develop SOAP Driver Is a standard? No, it is a protocol specification. Examine WSDL Analyse data with SoapUI Build the Soap Output Transforms (xslt) Build the Soap Input Transforms (xslt) Build the rest of the logic No issue, no pitfalls...?!?
31 Soap output can be surprising...
32 Soap output can be surprising...
33 Soap output can be surprising...
34 Soap input can be surprising...
35 Soap input can be surprising... EventID
36 Soap input can be surprising...
37 Soap input can be surprising...
38 Soap input can be surprising...
39 Soap input can be surprising...
40 Flexibility
41 Flexibility
42 Authentication & Authorization
43 Products involved CloudAccess NetIQ Access Manager
44 CloudAccess Appliance with IDM/NAM IDP/Sentinel Had own delevopment track Great features: Mobile Apps External login Fallback for any SAML based application
45 CloudAccess Suited for CSP's or sites without NAM Focussed on Authentication en Autorisation
46 Access Manager
47 Access Manager Besides User/Browser 1 Google Apps (Service Provider) Access Manager (Identity Provider) User accesses Google Apps Google generates SAML request and redirects user to IdP. User logs into IdP and gets SAML response (assertion) User is redirected back to Google and sends SAML response Google verifies response and allows user into application
48 Access Manager
49 Access Manager
50 Access Manager Insanity: doing the same thing over and over again and expecting different results. Consensus of SAML configuration!!!
51 Access Manager l Federation configuration
52 Access Manager Like SOAP, protocol with many many implementations Compliancy to SAML Standards AuthContextClassRef, Weird implementations
53 NetIQ - All Rights Reserved
54 NetIQ - All Rights Reserved
55 This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright 2015 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States.
Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications
Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications Matt Weisberg Vice President & CIO, Weisberg Consulting, Inc. [email protected] Paul McKeith Technical Sales, Novell, Inc. [email protected]
The Who, What, When, Where and Why of IAM Bob Bentley
The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages
Strong authentication. NetIQ - All Rights Reserved
Strong authentication NetIQ - All Rights Reserved Agenda Strong authentication Demo 2 Questions about Identification / Authentication What is authentication? Identity verification, are you who you say
CAS8489 Delivering Security as a Service (SIEMaaS) November 2014
CAS8489 Delivering Security as a Service (SIEMaaS) November 2014 Usman Choudhary Senior Director [email protected] Rajeev Khanolkar CEO SecurView Agenda What is Security Monitoring? Definition & concepts
NetIQ Aegis Adapter for Databases
Contents NetIQ Aegis Adapter for Databases Configuration Guide May 2011 Overview... 1 Product Requirements... 1 Implementation Overview... 1 Installing the Database Adapter... 2 Configuring a Database
Executing Large-Scale Data Center Transformation Projects with PlateSpin Migrate 12
Executing Large-Scale Data Center Transformation Projects with PlateSpin Migrate 12 WHITE PAPER Table of Contents What are Data Center Transformation Projects?... 1 Introduction to PlateSpin Migrate...
The Challenges of Administering Active Directory
The Challenges of Administering Active Directory As Active Directory s role in the enterprise has drastically increased, so has the need to secure the data it stores and to which it enables access. The
Security and HIPAA Compliance
Contents Meeting the Challenge of HIPAA...3 Key areas of risk...3 Solutions for meeting the challenge of HIPAA...5 Mapping to HIPAA...5 Conclusion...7 About NetIQ...7 About Attachmate...7 Security and
NetIQ Update October 31, 2013 Michel van der Laan
NetIQ Update October 31, 2013 Michel van der Laan Regional Director Attachmate Group Company Facts Global Organization: 3,600 employees in 30+ countries Strong Financial Position: Revenue $1.1 billion
Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager. Best Practices and Reference Architecture
Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager Best Practices and Reference Architecture WHITE PAPER Table of Contents Introduction.... 1 Why monitor PlateSpin Protect
NetIQ Aegis Adapter for VMware vcenter Server
Contents NetIQ Aegis Adapter for VMware vcenter Server Configuration Guide May 2011 Overview... 1 Product Requirements... 1 Supported Configurations... 2 Implementation Overview... 2 Ensuring Minimum Rights
Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection
Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection Take the Effort Out of Log Management and Gain the Actionable Information You Need to Improve Your Organisation s
NetIQ Access Manager. Developer Kit 3.2. May 2012
NetIQ Access Manager Developer Kit 3.2 May 2012 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON DISCLOSURE
Virtualization Management Survey Analysis White Paper August 2008
Contents Introduction Survey Results and Observations... 3 Virtualization Management Survey Analysis White Paper August 2008 Conclusion... 11 About NetIQ... 11 About Attachmate... 11 Over a six week period
Real-Time Security for Active Directory
Real-Time Security for Active Directory Contents The Need to Monitor and Control Change... 3 Reducing Risk and Standardizing Controls... 3 Integrating Change Monitoring... 4 Policy Compliance... 4 The
A Practical Guide to Cost-Effective Disaster Recovery Planning
A Practical Guide to Cost-Effective Disaster Recovery Planning Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. With the two traditional approaches
NetIQ Präsentation. 9. Oktober 2012. Otto W. Schäfer. Account Manager [email protected]
NetIQ Präsentation 9. Oktober 2012 Otto W. Schäfer Account Manager [email protected] 2 2011 NetIQ Corporation. All rights reserved. The Attachmate Group, Inc. Unternehmenskennzahlen Globales Unternehmen:
TUT8173 Best Practices for Security Monitoring in Distributed Environments November 2014
TUT8173 Best Practices for Security Monitoring in Distributed Environments November 2014 Chris Patzer ZF Norbert Klasen NetIQ Agenda Sentinel Deployment Scenarios Case Study: ZF Lessons Learned 2 Infrastructure
Hybrid Cloud Identity and Access Management Challenges
Hybrid Cloud Identity and Access Management Challenges Intro: Timothy P. McAliley [email protected] Microsoft Premier Field Engineer, SQL Server, Washington, DC CISA, CISM, CISSP, ITIL V3,
CAS8491 Data Center Transformation as Service
CAS8491 Data Center Transformation as Service Gary Ardito Chief Architect Cloud Service Provider Solutions Pradeep Chaturvedi Product Management Agenda Workload Migration Challenges PlateSpin Recon PlateSpin
Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security
Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security A key capability of any information security program is the ability to rapidly detect and help correct data breaches.
Identity and Access Management for the Hybrid Enterprise
Identity and Access Management for the Hybrid Enterprise Redmond Identity Summit 2014 Directories Devices Identity Keith Brintzenhofe Microsoft Corporation Thank You to our Sponsors Gold Silver Plus Silver
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Installation and Configuration Guide. NetIQ Security and Compliance Dashboard
Installation and Configuration Guide NetIQ Security and Compliance Dashboard June 2011 Legal Notice NetIQ Secure Configuration Manager is covered by United States Patent No(s): 5829001, 7093251. THIS DOCUMENT
Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management
Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
NetIQ AppManager for Cisco Interactive Voice Response. Management Guide
NetIQ AppManager for Cisco Interactive Voice Response Management Guide February 2009 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
SECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
Guideline on Implementing Cloud Identity and Access Management
CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National
NetIQ AppManager for Cisco Intelligent Contact Management. Management Guide
NetIQ AppManager for Cisco Intelligent Contact Management Management Guide February 2012 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE
NetIQ AppManager ResponseTime for Microsoft Active Directory Management Guide
NetIQ AppManager ResponseTime for Microsoft Active Directory Management Guide August 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
How To Compare Cloud Computing To Cloud Platforms And Cloud Computing
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
NetIQ AppManager for NetBackup UNIX
NetIQ AppManager for NetBackup UNIX Management Guide January 2008 Legal Notice NetIQ AppManager is covered by United States Patent No(s): 05829001, 05986653, 05999178, 06078324, 06397359, 06408335. THIS
For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.
Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents
Course 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
SOA and Cloud in practice - An Example Case Study
SOA and Cloud in practice - An Example Case Study 2 nd RECOCAPE Event "Emerging Software Technologies: Trends & Challenges Nov. 14 th 2012 ITIDA, Smart Village, Giza, Egypt Agenda What is SOA? What is
Configuring Salesforce
Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
User Guide. Directory and Resource Administrator Exchange Administrator. Directory and Resource Administrator Exchange Administrator User Guide
Directory and Resource Administrator Exchange Administrator User Guide User Guide Directory and Resource Administrator Exchange Administrator September 2010 Legal Notice NetIQ Directory Resource Administrator
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
Configuring Parature Self-Service Portal
Configuring Parature Self-Service Portal Chapter 2 The following is an overview of the steps required to configure the Parature Self-Service Portal application for single sign-on (SSO) via SAML. Parature
Extend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
Novell Access Manager
Novell Access Manager Product Overview Kiran Mova Agenda Introduction Architecture IDP AG SSL VPN Administration Console How it works? Web SSO Federation SSO Protect HTTP Resources Protect non-http Resources
Identity Implementation Guide
Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Implementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
QLIKVIEW AND THE CLOUD
QLIKVIEW AND THE CLOUD A QlikView Technology White Paper July 2012 qlikview.com Table of Contents Overview 4 Who Is This Paper For? 4 Cloud Terminology and QlikView 5 Software as a Service - SaaS 6 QlikView
Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015
Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents
Architectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
Manage all your Office365 users and licenses
Manage all your Office365 users and licenses Delegate 365 White Paper Authors: Toni Pohl, Martina Grom Version: 1.2 of December 2014 atwork information technology gmbh. All rights reserved. For information
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
NetIQ Identity Manager Setup Guide
NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
User Guide. NetIQ VigilEnt Policy Center. August 2011
User Guide NetIQ VigilEnt Policy Center August 2011 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE
The Private Cloud Your Controlled Access Infrastructure
White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
Cloud Computing. Chapter 5 Identity as a Service (IDaaS)
Cloud Computing Chapter 5 Identity as a Service (IDaaS) Learning Objectives Describe challenges related to ID management. Describe and discuss single sign-on (SSO) capabilities. List the advantages of
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Configuring user provisioning for Amazon Web Services (Amazon Specific)
Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107
Okta Identity Management for Portals Built on Salesforce.com An Architecture Review Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 Okta: A Platform for Cloud
Trust but Verify. Vincent Campitelli. VP IT Risk Management
Trust but Verify Vincent Campitelli VP IT Risk Management McKesson Corporation Trust but Verify Cloud Security 3 Agenda Cloud Defined Cloud Opportunities Cloud Challenges What s Different? How to Verify
