PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN
|
|
|
- Doreen Hodge
- 10 years ago
- Views:
Transcription
1 PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION
2 CONTENTS The Challenge: Providing Single Sign-On to Amazon EC2 Applications... 3 Using Amazon Virtual Private Cloud... 3 Using Microsoft Active Directory Federation Services... 5 Running AD FS on Premises... 5 Using AD FS Using AD FS Running AD FS on Premises and in Amazon EC Using AD FS Using AD FS Another View: Providing Single Sign-On to Windows Azure Applications Conclusions For Further Reading About the Author
3 THE CHALLENGE: PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS Users hate having multiple passwords. Help desks hate multiple passwords too, since users forget them. Even IT operations people hate them, because managing and synchronizing multiple passwords is expensive and problematic. Providing single sign-on (SSO) lets users log in just once, then access many applications without needing to enter more passwords. It can also make organizations more secure by reducing the number of passwords that must be maintained. And for vendors of Software as a Service (SaaS), SSO can make their applications more attractive by letting users access them with less effort. Allowing SSO across as many applications as possible makes users happier, increases security, and lowers support costs. All of these are worthy goals. Yet providing SSO often takes work. And with the emergence of cloud platforms, new SSO challenges have appeared. For example, Amazon Web Services (AWS) provides the Amazon Elastic Compute Cloud (Amazon EC2). This technology lets a customer create Amazon Machine Images (AMIs) containing an operating system, applications, and more. The customer can then launch instances of those AMIs virtual machines to run applications on the Amazon cloud. Similarly, Microsoft provides Windows Azure, which lets customers run Windows applications on Microsoft s cloud. When an application running on a cloud platform needs to be accessed by a user in an on-premises Windows domain, giving that user single sign-on makes sense. Fortunately, there are several ways to do this. For applications running on Amazon EC2, the options fall into two categories: Use Amazon Virtual Private Cloud (Amazon VPC), which allows Amazon EC2 instances and the Windows applications they contain to be part of an on-premises Active Directory forest. Use Microsoft Active Directory Federation Services (AD FS), which relies on establishing trust relationships between the Amazon EC2 environment and an on-premises Windows domain. This paper provides an architectural overview of both approaches, describing when each one makes sense. USING AMAZON VIRTUAL PRIVATE CLOUD Amazon VPC is a straightforward idea: A group of one or more Amazon EC2 instances can be connected to an on-premises Windows domain using IPsec, the standard protocol for creating a virtual private network (VPN). Figure 1 illustrates this idea. 3
4 Figure 1: Amazon VPC allows applications running in Amazon EC2 instances to be part of an onpremises Active Directory forest. The Amazon EC2 instances in the Amazon VPC are assigned IP addresses that are compatible with the network infrastructure of the on-premises Windows domain. The result is much like a branch office connected via a VPN: The instances in Amazon EC2 appear to be part of the same network as the onpremises Windows domain. These instances belong to the same Active Directory forest as the on-premises Windows domain. There are three different approaches to combining the two worlds: Make the Amazon EC2 instances inside the VPC part of an existing on-premises Windows domain and site. This option doesn t require running a domain controller in the VPC, and it s the approach that Figure 1 shows. Make the Amazon EC2 instances inside the VPC a new site in an existing on-premises Windows domain. This option requires running Active Directory Domain Services in Amazon EC2. Make the Amazon EC2 instances inside the VPC a new domain in an existing on-premises Windows forest. This option also requires running Active Directory Domain Services in Amazon EC2. Figure 1 shows how identity information flows for the first option, creating a VPC without its own domain controller. Here, when a user in the on-premises domain wishes to access an application in the VPC, she authenticates herself and requests a Kerberos ticket for the application as usual (step 1). Once this ticket 4
5 is granted (step 2), her browser or client application sends the ticket to the application in the VPC (step 3). This application then verifies the ticket and uses the information it contains (step 4). These are exactly the same steps that occur during Kerberos-based access to an application running in the user s on-premises domain there s no difference at all. This approach to providing SSO makes sense whenever a VPC makes sense. If the instances in Amazon EC2 are controlled by the same organization that controls the on-premises domain, for example, and if establishing a VPN connection between the two is feasible, making the VPC part of the domain can be a good solution. USING MICROSOFT ACTIVE DIRECTORY FEDERATION SERVICES Amazon VPC is a fine solution in some situations. There are other cases, however, in which providing SSO through a VPC isn t the best approach. Instead, using Active Directory Federation Services can make more sense. AD FS can be used in two ways: An AD FS server can run only on-premises, or AD FS servers can run both on-premises and in a public Amazon EC2 instance. This section takes a look at both possibilities, showing how they work and describing typical scenarios for each one. RUNNING AD FS ON PREMISES Running AD FS on premises is simpler than running it both on premises and in an Amazon EC2 instance. Accordingly, the place to start is by seeing how this works first with AD FS 1.1, then with AD FS 2.0. Using AD FS 1.1 Microsoft made AD FS part of Windows Server several years ago. As its name suggests, this technology can be used to provide identity federation and thus SSO across different identity scopes. Figure 2 shows one way to do federation between an on-premises Windows domain and an application running on Amazon EC2. 5
6 Figure 2: An application running in Amazon EC2 can allow browser access without requiring a separate login by trusting an on-premises AD FS 1.1 server. In this example, a user in an on-premises Windows domain wishes to access a Windows application running in Amazon EC2. Access to this application must go through the AD FS 1.1 Web agent, however, which an administrator has installed in the AMI for the Amazon EC2 instance in which the application is running. This application is configured to trust only identity information supplied by the AD FS 1.1 server in the on-premises Windows domain. When the browser attempts to access this application, the Web agent redirects the browser to the onpremises AD FS server (step 1). The browser supplies a Kerberos ticket to authenticate the user to this server, then requests a token to the Amazon EC2 application (step 2). This token is formatted using the Security Assertion Markup Language (SAML), and it contains information about this user. This information, known as claims, can include whatever the application needs. (The AD FS server must be configured to send the right claims for each application.) Here, for instance, the application might need to know the user s name, a list of roles she can act in, and more. Whatever claims are required, AD FS creates the requested token, digitally signs it, and returns it to the user (step 3). Once it has this SAML token, the browser sends it to the application (step 4). The Web agent then checks the token s signature to verify that it was issued by the trusted AD FS server. If the signature is correct, the claims in the token can be used by the application (step 5). 6
7 From the user s point of view, all of this is invisible. All she knows is that her attempt to access the application has succeeded. She can remain blissfully unaware of the exchanges needed to make this happen. This scenario assumes that the Amazon EC2 instance is running Windows. This isn t required, however. The protocol exchanges shown in Figure 2 are also possible for applications running in a Linux instance if the instance s administrator has installed an agent that supports the identity federation protocol implemented by the AD FS Web agent. This protocol is called WS-Federation, and companies such as Quest and Centrify currently provide Linux agents that support it. When does this approach make sense? Here are a couple of typical scenarios: Suppose an organization creates an application and runs it in Amazon EC2. Or maybe the organization buys an application and deploys it in one or more Amazon EC2 instances. In either case, installing the AD FS Web agent and configuring the application to trust the organization s on-premises AD FS server can provide users in that organization with single sign-on. If an organization s employees need to access an application running on Amazon EC2 from remote locations, such as a coffee shop, using AD FS as shown in Figure 2 can also make sense. Although the details get a bit more complicated, it s possible to install an AD FS proxy that can use Forms authentication to let a remote user enter her domain credentials (i.e., her username and password). This AD FS proxy uses these to log the user into the Windows domain and returns a SAML token for the application she s trying to access. Her browser then presents this SAML token to the application, as in step 4 in Figure 2. AD FS 1.1 is a useful technology. Still, it has some limitations. For one thing, it supports only browsers. Smart clients, such as an application built with Windows Communication Foundation (WCF), can t use it effectively. AD FS 1.1 also lacks some of what s required to be a solid foundation for claims-based identity, a more general approach promoted by Microsoft, IBM, and others. As described next, AD FS 2.0 addresses these limitations. Using AD FS 2.0 AD FS 2.0 is backward compatible with AD FS 1.1. This means that the exchanges shown in Figure 2 would also work with AD FS 2.0, since this newer version also supports WS-Federation. Yet things change a bit with AD FS 2.0, as Figure 3 shows. 7
8 Figure 3: An application running in Amazon EC2 can allow access from browsers and other client applications without a separate login by trusting an on-premises AD FS 2.0 server. As the figure shows, this example is much like the previous one, as are the scenarios in which using it makes sense. Still, the differences are important. Along with the upgrade to an AD FS 2.0 server, notice that the AD FS 1.1 Web agent has been replaced with Windows Identity Foundation (WIF). These changes let AD FS 2.0 work with both browsers and non-browser clients, such as a WCF application, letting a wider range of applications offer single sign-on to their users. Notice also that in step 1, WIF can explicitly tell the browser or client what its requirements are for a token. This makes it possible to use an identity selector such as Windows CardSpace, giving the user the option of choosing which identity to use (a possibility that s not shown here). And WIF provides a more general interface for working with the claims in a token than does the AD FS 1.1 Web agent, something that s useful for quite a few applications. One more difference is that AD FS 2.0 implements something called a Security Token Service (STS). Rather than relying solely on browser redirects, as does WS-Federation, an STS accepts requests made using WS- Trust, a standard SOAP-based protocol. The AD FS 2.0 server also supports the SAML 2.0 protocol, another standard option for identity federation. Accordingly, this newer version of the technology can work with a wider range of non-microsoft products than its predecessor. In fact, all of the protocol exchanges shown in the figure are based on industry standards. This means that as in the previous scenario, this approach to identity federation can work with an Amazon EC2 instance running Linux. As before, an administrator can install a Linux agent in the instance s AMI that implements 8
9 the correct identity federation protocol. Alternatively, the creator of the Linux application could directly modify it to work with the SAML token it receives. Finally, while this example uses an AD FS 2.0 server to generate the SAML token, it s important to understand that IBM and other vendors also provide technologies that can be used to create these tokens. Claims-based identity is built on multi-vendor standards that are implemented by several different companies. The move to this new way of handling identity isn t a Microsoft-only effort. RUNNING AD FS ON PREMISES AND IN AMAZON EC2 So far, the application running in Amazon EC2 has been configured to trust an AD FS server in an onpremises Windows domain. This is fine for some situations, such as those where the Amazon EC2 application and the AD FS server are owned by a single organization. But what if it s a SaaS application accessed by users in several different organizations? Configuring this cloud application to trust each customer s on-premises Windows domain directly is problematic. A better approach is to create a Windows domain in Amazon EC2, then install an AD FS server in that domain. Once this is done, an application in this Amazon EC2 Windows domain can be configured to trust its own AD FS server rather than those in the on-premises domains of its users. This Amazon EC2 AD FS server, in turn, can then be configured to trust the AD FS servers in the on-premises domains that contain the users of these applications. AD FS servers are designed for this kind of cross-domain configuration, while individual applications are not. And once again, this can be done using either AD FS 1.1 or AD FS 2.0. Using AD FS 1.1 Having two separate domains with two instances of AD FS makes the situation slightly more complicated than those described earlier. This complexity is hidden from the user, of course, but understanding this scenario requires knowing what s really going on. Figure 4 shows the first steps in the process when AD FS 1.1 is used. 9
10 Figure 4: Running an AD FS server in both the on-premises Windows domain and an Amazon EC2 Windows domain can simplify some identity federation situations. The process begins much as it did in the previous AD FS 1.1 scenario: The user accesses the application and is redirected to an AD FS server (step 1). This time, however, that redirect isn t to the AD FS server in the user s own Windows domain. Instead, the browser is redirected to an AD FS server in the application s domain, i.e., a Windows domain created in Amazon EC2. This is the only AD FS server that this application trusts, which means that the application will only accept SAML tokens signed by this server. Once it receives this redirect, the browser dutifully requests a SAML token from the AD FS server in the Windows domain running in Amazon EC2. When it does this, however, that server once again redirects the browser, this time back to the AD FS server in the user s own domain (step 2). To get a token for this application, the user must first present a token from her own AD FS server. To get this token, her browser authenticates her to the AD FS server in her own Windows domain, probably using a Kerberos ticket, and asks for the token she needs (step 3). The token she s asking for isn t to the application itself, however. Instead, it s a token that will prove her identity to the AD FS server in the application s domain. Once she gets this token (step 4), she can present it to that remote AD FS server to get what she really wants: a token for the application itself. Figure 5 shows how the second half of this process looks. 10
11 Figure 5: Because the application trusts only its own AD FS server, the browser must get a token from that server to access the application. Now that the user s browser has a token for the AD FS server in the Amazon EC2 domain, it can present this token to that server and request a token for the application the user wishes to access (step 5). The AD FS server running in Amazon EC2 verifies that the token it receives was signed by an AD FS server in a domain that it trusts, then issues the requested token (step 6). This new token is signed by the AD FS server in the Amazon EC2 domain, which means that the application in that domain will trust it. When the browser supplies this token (step 7), the Web agent can verify its signature, then pass the claims it contains on to the application. The application can then use those claims to make an authorization decision or for some other purpose (step 8). Notice that the AD FS server in the Amazon EC2 domain receives a SAML token in step 5, then issues another one in step 6. These two tokens might or might not contain the same claims. Suppose, for example, that this application is accessed by users in many different Windows domains, and the claims those users provide aren t exactly the same. One organization might use the string Manager to indicate that the user is in a managerial role, another might use Mgr, while a third uses the numeric code To make things more consistent, the AD FS server in the Amazon EC2 domain might convert all of these to Manager. This claims transformation makes life simpler for the application, since it no longer needs to deal with a diversity of ways to express the same thing. Using AD FS 2.0 The previous scenario uses AD FS 1.1, and so only browser clients are supported. As described earlier, AD FS 2.0 can support both browsers and other clients. Using this newer technology requires an Amazon EC2 11
12 instance running Windows Server 2008 the AD FS 2.0 server can t run on earlier Windows versions. Amazon EC2 now supports Windows Server 2008, however, which makes using AD FS 2.0 possible. The scenario is much like the one shown in Figures 4 and 5. The differences are straightforward: WIF replaces the AD FS 1.1 Web agent, and AD FS 2.0 servers replace the AD FS 1.1 servers. Doing this brings all of the advantages of claims-based security, including support for browser and non-browser clients as well as a more general way for applications to work with claims. Going forward, federation-based SSO projects using Windows Server 2008 should use AD FS 2.0 and WIF rather than their predecessors. ANOTHER VIEW: PROVIDING SINGLE SIGN-ON TO WINDOWS AZURE APPLICATIONS Microsoft s Windows Azure is similar in some ways to Amazon EC2. Unsurprisingly, applications running on Windows Azure can also provide single sign-on to users in an on-premises Windows domain. For example, a developer can create a Windows Azure application that uses Windows Identity Foundation, much like the scenario shown earlier in Figure 3. This application can then be configured to trust an onpremises AD FS 2.0 server. And while running an AD FS 2.0 server on Windows Azure isn t possible today, it is possible to build a custom STS for Windows Azure using WIF. CONCLUSIONS Single sign-on is important. Simplifying the lives of users is a good thing, as is reducing cost and complexity. Cloud platforms are also important, since they re being pressed into service by more and more organizations. The implication is clear: Providing single sign-on from on-premises Windows domains to cloud-based applications is about to become a requirement. For applications running on Amazon EC2, there are several ways to do this. Which choice is best depends on the exact problem to be solved. Yet whatever option you choose, you can look forward to the same things: happier users and lower costs. FOR FURTHER READING Amazon Virtual Private Cloud: Microsoft Patterns & Practices: A Guide for Claims-Based Identity and Access Control ABOUT THE AUTHOR David Chappell is Principal of Chappell & Associates ( in San Francisco, California. Through his speaking, writing, and consulting, he helps people around the world understand, use, and make better decisions about new technologies. 12
CLAIMS-BASED IDENTITY FOR WINDOWS
CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with
WINDOWS AZURE NETWORKING
WINDOWS AZURE NETWORKING The easiest way to connect to Windows Azure applications and data is through an ordinary Internet connection. But this simple solution isn t always the best approach. Windows Azure
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
Extend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
Identity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
THE WINDOWS AZURE PROGRAMMING MODEL
THE WINDOWS AZURE PROGRAMMING MODEL DAVID CHAPPELL OCTOBER 2010 SPONSORED BY MICROSOFT CORPORATION CONTENTS Why Create a New Programming Model?... 3 The Three Rules of the Windows Azure Programming Model...
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015
Managing Your Microsoft Windows Server Fleet with AWS Directory Service May 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational
SELLING SHAREPOINT ENGAGEMENTS IN THE CLOUD ERA A GUIDE FOR MICROSOFT SI PARTNERS
SELLING SHAREPOINT ENGAGEMENTS IN THE CLOUD ERA A GUIDE FOR MICROSOFT SI PARTNERS Sponsored by Microsoft Corporation 1/ Selling SharePoint Online 2/ Selling SharePoint Farms on Windows Azure 3/ Selling
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Copyright 2014 http://itfreetraining.com
This video will look the different versions of Active Directory Federation Services. This includes which features are available in each one and which operating system you need in order to use these features.
WINDOWS AZURE EXECUTION MODELS
WINDOWS AZURE EXECUTION MODELS Windows Azure provides three different execution models for running applications: Virtual Machines, Web Sites, and Cloud Services. Each one provides a different set of services,
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
What s New in Centrify Privilege Service Centrify Identity Platform 15.4
CENTRIFY PRIVILEGE SERVICE WHAT S NEW What s New in Centrify Privilege Service Centrify Identity Platform 15.4 Centrify Privilege Service Centrify Privilege Service is a cloud-based password and access
Agenda. Federation using ADFS and Extensibility options. Office 365 Identity overview. Federation and Synchronization
Agenda Office 365 Identity overview 1 Federation and Synchronization Federation using ADFS and Extensibility options 2 3 What s New in Azure AD? Cloud Business App - Overview 4 Identity Management is
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
OVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
Office 365 deploym. ployment checklists. Chapter 27
Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
Speeding Office 365 Implementation Using Identity-as-a-Service
August 2015 www.sarrelgroup.com [email protected] Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
THE BENEFITS AND RISKS OF CLOUD PLATFORMS
THE BENEFITS AND RISKS OF CLOUD PLATFORMS A GUIDE FOR BUSINESS LEADERS DAVID CHAPPELL JANUARY 2011 SPONSORED BY MICROSOFT CORPORATION Cloud platforms are a fundamental part of the move to cloud computing.
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
Implementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
How To Create A Virtual Private Cloud On Amazon.Com
Amazon Web Services Hands-On Virtual Private Computing 1 Overview Amazon s Virtual Private Cloud (VPC) allows you to launch AWS resources in a virtual network that you define. You can define an environment
Course 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
GIS IN THE CLOUD THE ESRI EXAMPLE DAVID CHAPPELL SEPTEMBER 2010 SPONSORED BY ESRI
GIS IN THE CLOUD THE ESRI EXAMPLE DAVID CHAPPELL SEPTEMBER 2010 SPONSORED BY ESRI CONTENTS Contents... 2 Cloud Computing Basics... 3 Cloud Applications and Cloud Platforms... 3 An Example Cloud Platform:
Selling Windows Azure Projects IT INFRASTRUCTURE
Selling Windows Azure Projects IT INFRASTRUCTURE A GUIDE FOR MICROSOFT SI PARTNERS Sponsored by Microsoft Corporation 1/ Why Should You Sell Infrastructure Projects that Use Windows Azure? 2/ Why Sell
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
WINDOWS AZURE AND WINDOWS HPC SERVER
David Chappell March 2012 WINDOWS AZURE AND WINDOWS HPC SERVER HIGH-PERFORMANCE COMPUTING IN THE CLOUD Sponsored by Microsoft Corporation Copyright 2012 Chappell & Associates Contents High-Performance
INTRODUCING THE WINDOWS AZURE PLATFORM
INTRODUCING THE WINDOWS AZURE PLATFORM DAVID CHAPPELL OCTOBER 2010 SPONSORED BY MICROSOFT CORPORATION CONTENTS An Overview of the Windows Azure Platform... 3 Windows Azure... 4 SQL Azure... 6 Windows Azure
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
Office 365 deployment checklists
Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
Load Balancing Microsoft AD FS. Deployment Guide
Load Balancing Microsoft AD FS Deployment Guide rev. 1.1.1 Copyright 2002 2015 Loadbalancer.org, Inc. Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org Software
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
Securing Cloud Applications Using Windows Azure Access Control
Securing Cloud Applications Using Windows Azure Access Control January 20, 2012 Keith Franklin Director of Cloud and.net Services 2009 SPR Companies. All rights reserved. Table of Contents MPS Partners
WINDOWS AZURE DATA MANAGEMENT
David Chappell October 2012 WINDOWS AZURE DATA MANAGEMENT CHOOSING THE RIGHT TECHNOLOGY Sponsored by Microsoft Corporation Copyright 2012 Chappell & Associates Contents Windows Azure Data Management: A
Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015
Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding
Single sign-on for ASP.Net and SharePoint
Single sign-on for ASP.Net and SharePoint Author: Abhinav Maheshwari, 3Pillar Labs Introduction In most organizations using Microsoft platform, there are more than one ASP.Net applications for internal
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT Executive Overview SAML (Security Assertion Markup Language) is a standard that facilitates the exchange of security information. Developed by
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
FortyCloud Installation Guide. Installing FortyCloud Gateways Using AMIs (AWS Billing)
FortyCloud Installation Guide Installing FortyCloud Gateways Using AMIs (AWS Billing) Date Version Changes 9/29/2015 2.0 2015 FortyCloud Ltd. 15 Berkshire Road Mansfield, MA 02048 USA 1 P a g e Introduction
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
Integrating Active Directory Federation Services (ADFS) with Office 365 through IaaS
www.thecloudmouth.com Integrating Active Directory Federation Services (ADFS) with Office 365 through IaaS A White Paper Loryan Strant Office 365 MVP Introduction This purpose of this whitepaper is to
WHAT IS AN APPLICATION PLATFORM?
David Chappell December 2011 WHAT IS AN APPLICATION PLATFORM? Sponsored by Microsoft Corporation Copyright 2011 Chappell & Associates Just about every application today relies on other software: operating
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory
WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering
Designing and Implementing a Server Infrastructure
Course 20413C: Designing and Implementing a Server Infrastructure Course Details Course Outline Module 1: Planning Server Upgrade and Migration This module explains how to plan a server upgrade and migration
Hybrid Cloud Identity and Access Management Challenges
Hybrid Cloud Identity and Access Management Challenges Intro: Timothy P. McAliley [email protected] Microsoft Premier Field Engineer, SQL Server, Washington, DC CISA, CISM, CISSP, ITIL V3,
Cloud SSO and Federated Identity Management Solutions and Services
Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity
AVG Business Secure Sign On Active Directory Quick Start Guide
AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and
A SHORT INTRODUCTION TO CLOUD PLATFORMS
A SHORT INTRODUCTION TO CLOUD PLATFORMS AN ENTERPRISE-ORIENTED VIEW DAVID CHAPPELL AUGUST 2008 SPONSORED BY MICROSOFT CORPORATION COPYRIGHT 2008 CHAPPELL & ASSOCIATES CONTENTS Defining Terms: What is a
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
SINGLE & SAME SIGN-ON ASPECTS
SINGLE & SAME SIGN-ON ASPECTS OF AZURE ACTIVE DIRECTORY Harold Baele Senior ICT Trainer JULY 2, 2015 SLIDE 1 TRAINER INFO Harold Baele MCT at RealDolmen Education [email protected] - @hbaele
Every Silver Lining Has a Vault in the Cloud
Irvin Hayes Jr. Autodesk, Inc. PL6015-P Don t worry about acquiring hardware and additional personnel in order to manage your Vault software installation. Learn how to spin up a hosted server instance
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)
Microsoft Azure Multi-Factor authentication (Concept Overview Part 1) In this Document we will discuss the concept of Azure Multifactor Authentication (MFA) concept, when and how you can use it and what
QLIKVIEW AND THE CLOUD
QLIKVIEW AND THE CLOUD A QlikView Technology White Paper July 2012 qlikview.com Table of Contents Overview 4 Who Is This Paper For? 4 Cloud Terminology and QlikView 5 Software as a Service - SaaS 6 QlikView
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE MODULE 1: PLANNING SERVER UPGRADE AND MIGRATION This module explains how to plan a server upgrade and migration strategy. Considerations
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Swivel Secure and the Cloud
Swivel Secure and the Cloud Authentication for Cloud Application Abstract This document describes the issues relating to authenticating to cloud applications and how the Swivel authentication platform
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
HOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
Microsoft Office 365 Using SAML Integration Guide
Microsoft Office 365 Using SAML Integration Guide Revision A Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
CLUSTER COMPUTING TODAY
David Chappell June 2011 CLUSTER COMPUTING TODAY WHAT S CHANGED AND WHY IT MATTERS Sponsored by Microsoft Corporation Copyright 2011 Chappell & Associates One way to make an application run faster is to
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
SAML single sign-on configuration overview
Chapter 46 Configurin uring Drupal Configure the Drupal Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with a Drupal-based web application. Configuration also specifies
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services
1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Quality Management Consultancy
Microsoft Active Directory Domain Objectives:- Learn what s new and what s updated in Active Directory Domain Services Install, upgrade and configure Windows Server 2012 Domain Controllers Work with the
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos
Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website:
Azure Active Directory
Azure Active Directory Your Cloud Identity Brian Mansure Azure Specialist [email protected] Agenda What Azure Active Directory is What Azure Active Directory is not Hybrid Identity Features Roadmap
Single Sign-On: Reviewing the Field
Outline Michael Grundmann Erhard Pointl Johannes Kepler University Linz January 16, 2009 Outline 1 Why Single Sign-On? 2 3 Criteria Categorization 4 Overview shibboleth 5 Outline Why Single Sign-On? Why
Active Directory Services with Windows Server 10969B; 5 days, Instructor-led
Active Directory Services with Windows Server 10969B; 5 days, Instructor-led Course Description Get hands on instruction and practice administering Active Directory technologies in Windows Server 2012
WHITE PAPER. Active Directory and the Cloud
WHITE PAPER Active Directory and the Cloud HyperOffice, 2011 What is Active Directory? What are its benefits? Active Directory (AD) is a directory service created by Microsoft. Active Directory is popularly
SELLING PROJECTS ON THE MICROSOFT BUSINESS ANALYTICS PLATFORM
David Chappell SELLING PROJECTS ON THE MICROSOFT BUSINESS ANALYTICS PLATFORM A PERSPECTIVE FOR SYSTEMS INTEGRATORS Sponsored by Microsoft Corporation Copyright 2014 Chappell & Associates Contents Business
