Enterprise Single Sign-On

Size: px
Start display at page:

Download "Enterprise Single Sign-On"

Transcription

1 Enterprise Single Sign-On The Holy Grail of Computing Written by Quest Software, Inc.

2 Copyright Quest Software, Inc All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser's personal use without the written permission of Quest Software, Inc. WARRANTY The information contained in this document is subject to change without notice. Quest Software makes no warranty of any kind with respect to this information. QUEST SOFTWARE SPECIFICALLY DISCLAIMS THE IMPLIED WARRANTY OF THE MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Quest Software shall not be liable for any direct, indirect, incidental, consequential, or other damage alleged in connection with the furnishing or use of this information. TRADEMARKS All trademarks and registered trademarks used in this guide are property of their respective owners. World Headquarters 5 Polaris Way Aliso Viejo, CA info@quest.com U.S. and Canada: Please refer to our Web site for regional and international office information. Updated August 14, 2008

3 CONTENTS INTRODUCTION...1 THE CHALLENGE...2 ACTIVE DIRECTORY: THE FOUNDATION FOR ENTERPRISE SINGLE SIGN-ON...3 QUEST ONE IDENTITY SOLUTION S LAYERED APPROACH TO ADDRESSING THE CHALLENGES...4 PASSWORD SYNCHRONIZATION A TRADITIONAL APPROACH...5 ADVANTAGES OF PASSWORD SYNCHRONIZATION... 5 DISADVANTAGES OF PASSWORD SYNCHRONIZATION... 5 QUEST PASSWORD MANAGER SYNC... 6 EXTENDING ACTIVE DIRECTORY S SINGLE SIGN-ON BENEFITS TO OTHER PLATFORMS AND APPLICATIONS...8 SUPPORTING OTHER APPLICATIONS...9 A BLENDED SOLUTION TO A TOUGH CHALLENGE...10 PROTECTING HIGH-VALUE PASSWORDS...11 QUEST PRIVILEGE MANAGER FOR UNIX: EFFECTIVELY PROTECTING UNIX ROOT ACCESS.. 11 QUEST SAFEKEEPING SECURE MANAGEMENT OF PRIVILEGED ACCOUNTS QUEST DEFENDER: SOLVING THE MASTER KEY PROBLEM SUMMARY...14 ABOUT THE AUTHOR...16 ABOUT QUEST SOFTWARE, INC CONTACTING QUEST SOFTWARE CONTACTING QUEST SUPPORT... T 17 NOTES...18 i

4

5 Technical Brief INTRODUCTION The number of identities 1 we have to remember continues to grow. Gone are the mainframe days when we each had to remember only one identity. Evolution to client/server applications and the Internet has dramatically increased the number of identities we have to remember. Because of this increase, we have seen the emergence of a common challenge: keeping track of all of our passwords and system identities. IT managers are also struggling and asking questions such as: How do I reduce the help desk costs associated with forgotten passwords? How do I get my staff members not to write down their passwords on stickies? How do I secure, control, and audit the passwords associated with privileged accounts? The pursuit of enterprise single sign-on (SSO) 2 for the enterprise was born out of the costs associated with having so many user IDs and passwords the operational, security, and efficiency costs are significant. In this document, we discuss the challenges mentioned above in detail, how the Quest One Identity Solution, a set of enabling technologies that simplifies identity and access management, approaches enterprise single sign-on and a unique solution that addresses nearly all facets of the challenges. As enterprises become more complex and diverse, there has been a corresponding rise in the number of identities associated with any one individual. This causes identity and access management challenges. 1

6 Enterprise Single Sign-On. The Holy Grail of Computing THE CHALLENGE We all experience this challenge: too many identities, resulting in too many passwords and too many user IDs to remember. Figure 1 - A typical enterprise environment The productivity, security, compliance, and help desk costs related to this explosion of identities are significant. Some costs are easy to calculate and some are harder. The most definable cost to organizations is the help desk expense associated with helping end-users reset forgotten passwords on the myriad systems to which they have access. Many organizations also have multiple help desks: a Windows help desk, a Unix help desk, a mainframe help desk, and help desks for applications such as SAP or Siebel. The Unix, mainframe, and application help desks are typically more expensive for companies to maintain due to the expertise required. Typically, it is the Unix administrator, mainframe operations staff, or application specialists that are called upon for password resets for those systems. Most organizations can easily calculate this cost. Not as easy to calculate, but potentially greater, are the invisible costs associated with the proliferation of identities. Many organizations do not have automated provisioning or de-provisioning systems. This means that identities of many end users are never deleted from all of the systems to which they had access. Other potential costs or security concerns include the propensity for end users to use a common password across systems, write down their passwords, or use passwords that are easy to guess. With multiple systems it is also difficult to have a common password security policy. With this proliferation of systems there is another side effect a proliferation of administrative, privileged, and superuser identities. How can this be controlled and audited? Also it is difficult to calculate the lost productivity for end users who must enter their credentials multiple times per day or who are on the phone with the help desk resetting their passwords. The net result is that the efficiency of both our automated systems and our workers suffer. 2

7 Technical Brief ACTIVE DIRECTORY: THE FOUNDATION FOR ENTERPRISE SINGLE SIGN-ON Nearly all corporate end users begins their day by logging into a Windows desktop or laptop and authenticating to Active Directory. In the United States, Active Directory is the primary directory for over 75% of enterprises. 3 The prevalence of Active Directory continues to increase globally. Since the launch of Active Directory with Windows 2000 Server, organizations have relied on it as the primary authentication for their end users. In fact, in most enterprise users must log on via Active Directory before they can access non-windows hosted applications such as SAP, Siebel, and Oracle; mainframe or mid-range systems; and other client-server applications. Active Directory already provides extensive capabilities for enabling enterprise single sign-on and provides options for strong authentication via smart cards to further secure an organization s environment. Most end users do not realize that their access and authentication to nearly every Microsoft server, web, and other Microsoft-hosted applications (e.g., Exchange, SQL Server, SharePoint, and IIS) occurs transparently without their having to re-enter credentials. Active Directory enables true single sign-on but only to Windowsbased and Windows-hosted applications. In a Windows-only environment, this reduced or single sign-on capability is enabled through Microsoft s use of the Kerberos security protocol. 4 It is logical to base any single sign-on effort around the users user IDs and passwords that they use when they log on to their Windows desktop each day. 3

8 Enterprise Single Sign-On. The Holy Grail of Computing QUEST ONE IDENTITY SOLUTION S LAYERED APPROACH TO ADDRESSING THE CHALLENGES Quest Software's Quest One Identity Solution leads the industry in innovation that helps organizations simplify identity and access management, including SSO for the enterprise. The Quest One approach, as described throughout the rest of this technical brief, calls for: Directory and identity consolidation based on Active Directory as the true Holy Grail of SSO Enterprise single sign-on as the ideal solution for applications that cannot be directly integrated Synchronization for situations where integration and enterprise single signon are not practical 4

9 Technical Brief PASSWORD SYNCHRONIZATION A TRADITIONAL APPROACH Many organizations have taken to synchronizing users Active Directory passwords across systems to which end users must log on. Unfortunately, password synchronization does not actually solve all of the challenges that we have discussed thus far. In particular, it does not enable single sign-on. With password synchronization, users can have a single password that provides access to multiple systems they use, but they still must log on every time to each system. Advantages of Password Synchronization End-users have just one password to remember, so passwords are forgotten less often. This reduces both help desk costs associated with forgotten passwords and the associated loss of productivity. Administrators can more easily implement a consistent password policy across synchronized systems. Password synchronization is a viable solution where security policy disallows enterprise single sign-on. Generally no user workstation modification is required to implement password synchronization. It is easier to extend to any given platform or application than enterprise single sign-on. Disadvantages of Password Synchronization End users have just one password to remember, which increases the chance it could be compromised and allow unauthorized users to have access to all systems to which the password is synchronized. Users must continue to log on to each system individually, resulting in inefficiency. Not all systems easily support bi-directional password synchronization. Implementation can be complex; agents are usually required on all target systems. Password policies may not be compatible across all systems, which can lead to a least secure policy (e.g., mainframe passwords are typically 8 characters maximum). There is no support for advanced or strong authentication (e.g.,, smart cards, tokens, and one-time passwords). No directory or identity consolidation is enabled, so the number of directories is not reduced. Password synchronization does not secure or audit administrative, privileged, or superuser identities. To summarize, password synchronization does not provide true single sign-on, but it does offer enterprises a first step towards reducing help desk costs. It also offers the opportunity to provide a broad-based solution that would fit almost any company. 5

10 Enterprise Single Sign-On. The Holy Grail of Computing Quest Password Manager Sync Quest Password Manager, when coupled with synchronization, can improve a password synchronization solution by enabling end users to reset their own password and synchronize their passwords across multiple platforms. This helps to further reduce help desk costs and improve productivity. Platforms and applications that are supported for password synchronization include: Digital Unix Digital OpenVMS HP-UX IBM AIX IBM AS/400 (i Series) IBM OS/390 Sun Solaris Linux Novell Netware NDS 5.x and 6.x IBM DB2 IBM Directory Server Lotus Domino Microsoft IIS Web Server Microsoft SQL Server Netscape Directory Server Oracle SAP R/3 Sybase SQL Server IBM RACF CA Top Secret CA ACF2 Microsoft Active Directory 6

11 Technical Brief Combining Quest Password Manager with synchronization provides both cross-platform password resets as well as classic password synchronization 7

12 Enterprise Single Sign-On. The Holy Grail of Computing EXTENDING ACTIVE DIRECTORY S SINGLE SIGN-ON BENEFITS TO OTHER PLATFORMS AND APPLICATIONS Quest One Identity Solution enhances and extends the capabilities of Active Directory. This also extends to enterprise single sign-on. Our solutions require Active Directory and expect it will be the primary directory for user authentication. By utilizing Active Directory as the foundation for enterprise single sign-on, customers can benefit from the security and interoperability that Kerberos provides. Quest One extends Active Directory s benefits to other platforms and applications by providing integration software that leverages Active Directory s Kerberos protocol. Platforms and applications that support Kerberos (e.g., Unix, Linux, Java, SAP, IBM DB2, Oracle, telnet, VMWare, and Apple OS X) can be integrated with Active Directory. This allows end users to have a true single sign-on experience that starts and ends with logging in to Active Directory. The experience is as seamless as it would be in a Windows-only environment: no additional log-on screens are presented. In fact, one of the primary benefits of extending Active Directory to support other platforms and applications in this fashion is that end users Active Directory credentials can be used for authentication. This means that the directories that were previously used for authentication can now be consolidated into Active Directory. This in itself provides significant benefits: fewer directories to manage, fewer moving parts, and no requirement to synchronize those old directories, to name a few. In addition, through Group Policy it is possible to control password security policy settings such as maximum password age, minimum password length, requirements for password complexity, and smart card use. The security benefit of being able to automate the enforcement of a common password security policy across multiple platforms cannot be underestimated. Another benefit is realized when an Active Directory account is suspended or deleted; all access to any other platform that was extended through the use of Kerberos is automatically revoked. There is no need to de-provision accounts in those systems. Quest Authentication Services delivers this functionality. From an enterprise single sign-on perspective, it is important that any solution that a customer purchases will include support for other platforms. Quest Authentication Services enables Unix and Linux clients or servers to fully participate in an enterprise single sign-on strategy. Other enterprise single sign-on products support only Windows clients. Today, a company is bound to have more than just Windows desktops. Quest Single Sign-on for Java provides the same capabilities and benefits for J2EE servers and Java-based applications. This is something that is also not typically available via other enterprise single sign-on solutions. These products also enable the use of Active Directory groups as a means to perform access control checks or authorization based on group membership. Quest enables organizations to extend the use of Active Directory-based identities to non-windows platforms without having to install cumbersome identity management frameworks or synchronization tools. Organizations continue to use Active Directory normally; it has just been extended to support additional platforms or applications. 8

13 Technical Brief SUPPORTING OTHER APPLICATIONS Unfortunately, support of Kerberos for authentication is not universal; many applications still do not support Kerberos. Quest s Enterprise Single Sign-on product is the answer for these applications. Quest Enterprise Single Sign-on frees users from having to remember passwords for their applications. Once authenticated to Windows via a password or two-factor authentication, a user's access rights for password-protected information resources are managed by Quest Enterprise Single Sign-on. No matter which technology is used, including the web, you can integrate access to new applications with a couple of clicks in a graphical user interface. This drastically reduces the numbers of calls due to forgotten passwords and the associated help desk costs. 9

14 Enterprise Single Sign-On. The Holy Grail of Computing A BLENDED SOLUTION TO A TOUGH CHALLENGE Quest understands that customers want a single sign-on solution that supports many platforms and applications. Quest One s products provide the most secure and broadest possible support of applications and platforms in the industry today. Quest One enables a true single sign-on experience that includes significant applications like SAP. They are the only extensive single sign-on solutions that support Linux and Unix desktops, Java web applications, and J2EE servers. Quest One offers a comprehensive collection of solutions ranging from password synchronization to integration with Active Directory and enterprise single sign-on. Once authenticated by Active Directory, end -user access rights for passwordprotected information resources can be managed by Quest Enterprise Single Signon. The software automatically recognizes password-protected applications and web sites, looks up the end users credentials stored in Active Directory, automatically fills in the prompts (users IDs and passwords) on the screen, and log the users in. There are significant advantages to the Quest approach to enterprise single sign-on: 10 Improves users productivity and decreases help desk costs Supports the widest range of password protected applications and web sites Supports Microsoft s Windows 2000, XP, and Vista desktop clients; Unix and Linux desktop clients and servers; and J2EE servers and applications Utilizes Active Directory as the foundation for enterprise single sign-on; no additional directories or databases are required Enables the consolidation of Unix, Linux, NIS, and other directories with Active Directory, reducing the number of directories that must be managed Manages all enterprise single sign-on users via Active Directory Users and Computers (ADUC) and Active Directory group membership Integrates with Group Policy for easier administration and policy control Integrates with Quest Defender and other leading two-factor authentication hardware and software tokens for the strongest protection of an end users credentials Easily integrates new applications or web sites

15 Technical Brief PROTECTING HIGH-VALUE PASSWORDS Most enterprises that implement password synchronization or enterprise single sign-on do not apply these practices to their high value passwords or identities. 5 In addition, neither of these practices control access to or audit the activities related to high value identities. In many companies, it is common for an administrative password (e.g., root on Unix or Linux) to be shared among trusted individuals. But how are activities audited? And who is using a high value identity and for what reason? It is becoming increasingly important for companies to prove who has access to a privileged account, why they are using that account, who granted them access, and what they use the account to do. Another common problem is that of the master key : once a company has implemented single sign-on, how does it protect that one credential that is the master key to all systems and applications? Quest Privilege Manager for Unix: Effectively Protecting Unix Root Access Quest Privilege Manager for Unix brings accountability and security to Unix by enabling system administrators to delegate users authority. The organization can then implement reasonable security controls without impacting the ability of users to perform their daily work. With Privilege Manager, responsibility for adding accounts, fixing printer queues, and other routine job functions can safely be delegated to individuals or groups without disclosing the root password. This protects the full power of root (such as deleting critical files, modifying databases or file permissions, and reformatting disks) from potential misuse or abuse and an organization's valuable information is not compromised: Privilege Manager allows only authorized users to access files, directories, and third-party applications and accounts, such as financial records. Privilege Manager can also record all Unix session activity, log all keystrokes, and display output for any user. This indelible audit trail, combined with the safe partitioning of root functionality, provides an extremely secure means of controlling the power of root. Organizations always know exactly what activity is being performed by the root account, as well as who did it and where and when it occurred. 11

16 Enterprise Single Sign-On. The Holy Grail of Computing Quest SafeKeeping Secure Management of Privileged Accounts Administrative, privileged, or superuser passwords no matter the platform, application or appliance for which they re used present a unique set of management challenges. These credentials are typically role-based and shared between several users, which can lead to mismanagement. Although many organizations have procedural controls and policies governing the use of these credentials, monitoring can be costly and time-consuming when the number and range of systems is large. Often the procedures and policies are not followed. Quest s SafeKeeping delivers a solution to the management of the shared account credentials by providing a secure, automated mechanism for the request, authorization, release, and change of shared credentials. Once a shared account is managed by SafeKeeping-, a password change for the credentials on it is scheduled. The new password is selected in accordance with SafeKeeping s userdefined strong password policies. A single individual will not know the password until it is issued following a successfully authorized release request. All SafeKeeping s actions are fully audited to ensure conformance with compliance requirements. Quest Defender: Solving the Master Key Problem A common security concern with enterprise single sign-on projects is how to handle the master key problem. Once an organization implements single or reduced signon, a compromised user credential becomes a critical security concern. A compromised Active Directory user ID and password makes it possible for an unauthorized user to access any Windows or single sign-on integrated application or platform. Therefore, multi-factor authentication is essential. There are three universally recognized factors for authenticating individuals: 1. Something you know, such as a password or PIN 2. Something you have, such as a mobile phone, credit card, or hardware security token 3. Something you are, such as a fingerprint, a retinal scan, or other biometric Most often, individuals are authenticated using the first method: something you know, which typically is a password. However, when an enterprise wants to protect privileged accounts or secure the passwords of enterprise single sign-on users, it is common to add a second factor something you have. Common implementations of two-factor authentication use something you know (a password) as the first factor and something you have (a physical device of some nature) as the second factor. 12

17 Technical Brief Quest Defender provides a unified, vendor-neutral, and token-agnostic authentication infrastructure that can grow and adapt with the ever-changing requirements of the business. The biometric technology of Defender can supplement the one-time password. This provides a secure solution for a simple two-factor or complex three-factor authentication. Defender uniquely authenticates authorized users, grants access to important information and resources, and protects corporate assets from unauthorized use. While other authentication solutions employ their own proprietary databases, Defender integrates seamlessly with Microsoft s Active Directory and uses Active Directory as its data repository. This ensures that the proven business benefits of cost avoidance and cost reduction are maintained throughout the security infrastructure. One of the most important benefits of this integration is that the familiar Active Directory users and computers administration tool is used to manage the entire Defender environment. Because Defender is totally integrated with Microsoft Active Directory, all of the well-known Active Directory benefits, including scalability, replication, high availability, and automated backup, apply to Defender. Existing Windows users are simply assigned Defender policies and tokens to become Defender users. To further ease administration, the Defender Token Self- Registration Service enables Windows users to assign their own tokens. The installation of Defender does not affect the functionality of Windows; domain policies and log-ins, for example, remain under the control of Windows. Two-factor authentication for Windows log-ins can be optionally enabled by means of the Defender Desktop Login component. End users who use BlackBerries, ipaqs, or Pocket PCs can use these devices as their second factor. Defender soft tokens are available for these devices and for use with standalone laptops or desktops. Quest One also supports the use of smart cards for credential security with Defender and other Quest One products, including Quest Authentication Services. 13

18 Enterprise Single Sign-On. The Holy Grail of Computing SUMMARY Quest One Identity Solution provides a unique solution that enables customers to truly achieve secure enterprise single sign-on within their heterogeneous environment. It is now possible to leverage an Active Directory user ID and password to access all enterprise applications, systems, and servers, even in an environment that includes Windows, Unix, Linux, Java, Apple Mac OS X, and mainframes. All aspects of the Quest One solution are managed from within Windows and Active Directory using the native tools that you have come to know and rely on over the years. There is no need to deploy new directories or databases. You can also protect the single key to your kingdom by deploying and integrating strong two-factor authentication using Quest Defender. High value administrative and application passwords can be protected by Quest Privilege Manager for Unix or Quest SafeKeeping. Quest One s solutions for enterprise single sign-on offer the broadest, most secure, and most deeply integrated solution with Active Directory available on the market today. 14

19 Technical Brief 15

20 Enterprise Single Sign-On. The Holy Grail of Computing ABOUT THE AUTHOR Jackson Shaw joined Quest Software as part of its acquisition of Vintela. Shaw oversees product direction, strategy, and go-to-market activities for all Identity and Access Management products. With more than 15 years of experience, Shaw was a key member of the identity and access management marketing team for the Windows server marketing group at Microsoft. He was responsible for product planning and marketing for Microsoft's identity and access management products, including Active Directory and Microsoft Identity Integration Server (MIIS) Before joining Microsoft in 1999, Shaw served as vice president of sales for Toronto-based ZoomIT Corp., a pioneer in the development of metadirectory products. He was also a member of the management team that successfully oversaw the company s acquisition by Microsoft in Before joining ZoomIT, Shaw held IT management roles at the International Development Research Centre, a Canadian corporation created to help developing countries find long-term solutions to social, economic, and environmental problems. Shaw has been involved in directory, meta-directory, and security initiatives since He studied computer science and management information systems at the University of Ottawa. He is a member of the Association for Computing Machinery. 16

21 Technical Brief ABOUT QUEST SOFTWARE, INC. Quest Software, Inc., a leading enterprise systems management vendor, delivers innovative products that help organizations get more performance and productivity from their applications, databases, Windows infrastructure and virtual environments. Through a deep expertise in IT operations and a continued focus on what works best, Quest helps more than 90,000 customers worldwide meet higher expectations for enterprise IT. Quest provides customers with client management as well as server and desktop virtualization solutions through its subsidiaries, ScriptLogic and Vizioncore. Quest Software can be found in offices around the globe and at Contacting Quest Software Phone: Mail: Web site: (United States and Canada) info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA USA Please refer to our Web site for regional and international office information. Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a commercial version and have a valid maintenance contract. Quest Support provides around the clock coverage with SupportLink, our web self-service. Visit SupportLink at From SupportLink, you can do the following: Quickly find thousands of solutions (Knowledgebase articles/documents). Download patches and upgrades. Seek help from a Support engineer. Log and update your case, and check its status. View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policy and procedures. The guide is available at: Support Guide.pdf 17

22 Enterprise Single Sign-On. The Holy Grail of Computing NOTES 1 The term identity is used when referencing how a person is uniquely identified to a computer system. Generally this identification is through the combination of a user ID and a password or a smartcard and PIN. 2 Enterprise single sign-on is the ability for a user to enter a user ID and password just once to log on to multiple applications within an enterprise, whereas web or federated single sign-on is cross-enterprise focused. 3 Bob Muglia, Sr. Vice-President Server and Tools Business, Microsoft; ITForum 2005 Keynote presentation. 4 Kerberos, created by MIT, is a network authentication and authorization protocol. The Kerberos protocol uses strong cryptography so that a client can prove its identity to a server (and vice versa) across an insecure network connection. After a client and server have used Kerberos to prove their identities, they can also encrypt all of their communications to ensure privacy and data integrity as they go about their business. 5 A high value password is defined as the password to a network, application (e.g., SAP, PeopleSoft, or Siebel), database (e.g., Oracle or SQL), or system (e.g., Windows, Unix, or Linux) identity that, if lost, could result in a significant security compromise or financial loss to an enterprise. 18

Enterprise Single Sign-On. The Holy Grail of Computing

Enterprise Single Sign-On. The Holy Grail of Computing Enterprise Single Sign-On. The Holy Grail of Computing Written by Jackson Shaw Senior Director, Product Management Identity and Access Management, Quest Software Inc. Technical Brief 2009 Quest Software,

More information

How the Quest One Identity Solution Products Enhance Each Other

How the Quest One Identity Solution Products Enhance Each Other Better Together How the Quest One Identity Solution Products Enhance Each Other Written by Quest Software, Inc. Business Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary

More information

8.3. Competitive Comparison vs. Microsoft ADMT 3.1

8.3. Competitive Comparison vs. Microsoft ADMT 3.1 8.3 Competitive Comparison vs. Microsoft ADMT 3.1 Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described

More information

File Shares to SharePoint: 8 Keys to a Successful Migration

File Shares to SharePoint: 8 Keys to a Successful Migration File Shares to SharePoint: 8 Keys to a Successful Migration Written by Doug Davis Director, SharePoint Product Management Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2008. All rights

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

Gain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock

Gain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock Gain Control of Space with Quest Capacity Manager for SQL Server written by Thomas LaRock Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains proprietary information, which is

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Ten Things to Look for in a SharePoint Recovery Tool

Ten Things to Look for in a SharePoint Recovery Tool Ten Things to Look for in a SharePoint Recovery Tool Written by Ilia Sotnikov Product Manager, SharePoint Management Solutions Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2009. All

More information

Achieving Successful Coexistence Between Notes and Microsoft Platforms

Achieving Successful Coexistence Between Notes and Microsoft Platforms Achieving Successful Coexistence Between Notes and Microsoft Platforms Written by Technology Strategy Research LLC White Paper Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

Technical Brief. Unify Your Backup and Recovery Strategy with LiteSpeed for SQL Server and LiteSpeed Engine for Oracle

Technical Brief. Unify Your Backup and Recovery Strategy with LiteSpeed for SQL Server and LiteSpeed Engine for Oracle Unify Your Backup and Recovery Strategy with LiteSpeed for SQL Server and LiteSpeed Engine for Oracle Written by Tom Sager, DBA team leader E. ON U.S. Technical Brief 2009 Quest Software, Inc. ALL RIGHTS

More information

Integrating Unix and Linux Systems with Active Directory

Integrating Unix and Linux Systems with Active Directory Integrating Unix and Linux Systems with Active Directory Technical Brief written by Jackson Shaw Senior Director, Product Management - Active Directory Infrastructure Management Quest Software, Inc. Copyright

More information

Implementing Database Development Best Practices for Oracle

Implementing Database Development Best Practices for Oracle Implementing Database Development Best Practices for Oracle Written by, John Pocknell Product Manager, Toad for Oracle & Toad Data Modeler Quest Software, Inc. Technical Brief Copyright Quest Software,

More information

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Quest InTrust for Active Directory. Product Overview Version 2.5

Quest InTrust for Active Directory. Product Overview Version 2.5 Quest InTrust for Active Directory Product Overview Version 2.5 Copyright Quest Software, Inc. 2006. All rights reserved. This guide contains proprietary information, which is protected by copyright. The

More information

Pragmatic Business Service Management

Pragmatic Business Service Management Pragmatic Business Service Management Written by Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected

More information

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc. Overcoming Active Directory Audit Log Limitations Written by Randy Franklin Smith President Monterey Technology Group, Inc. White Paper 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains

More information

Quest ChangeAuditor 4.8

Quest ChangeAuditor 4.8 Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

CA SiteMinder SSO Agents for ERP Systems

CA SiteMinder SSO Agents for ERP Systems PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security

More information

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged

More information

Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions

Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions Technical Brief written by Darren Mar-Elia Chief Technology Officer Windows Management Quest Software, Inc. Copyright Quest

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

White Paper. Getting Your Macs Under Control with System Center Configuration Manager 2007. Really?

White Paper. Getting Your Macs Under Control with System Center Configuration Manager 2007. Really? Getting Your Macs Under Control with System Center Configuration Manager 2007. Really? Written by Don Jones Co-Founder, Concentrated Technology Microsoft MVP White Paper 2009 Quest Software, Inc. ALL RIGHTS

More information

Legal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk

Legal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk Legal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk Written by: Quest Software, Inc. Executive Summary Copyright Quest Software,

More information

10 Simple Steps for Boosting Database Performance in a Virtualized Environment

10 Simple Steps for Boosting Database Performance in a Virtualized Environment 10 Simple Steps for Boosting Database Performance in a Virtualized Environment Written by Dr. Bert Scalzo Quest Software, Inc. White Paper 10 Simple Steps for Boosting Database Performance in a Virtualized

More information

Quest Management Pack for AS400. Written by Quest Software, Inc.

Quest Management Pack for AS400. Written by Quest Software, Inc. Quest Management Pack for AS400 Written by Quest Software, Inc. 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information, protected by copyright. No part of this document

More information

The Power of One. A Simplified Approach to Identity and Access Management. Written by Quest Software, Inc.

The Power of One. A Simplified Approach to Identity and Access Management. Written by Quest Software, Inc. The Power of One A Simplified Approach to Identity and Access Management Written by Quest Software, Inc. Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains proprietary information,

More information

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...

More information

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

identity management in Linux and UNIX environments

identity management in Linux and UNIX environments Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual

More information

White Paper. Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software

White Paper. Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software Written by Tom Crane, Product Manager, Quest Software, Inc. Edited by James Galvin, Microsoft Sr. Product Manager,

More information

Quest Software Product Guide

Quest Software Product Guide Quest Software Product Guide Quest Software knows the expectations customers have for IT investments are not always met. That s why we develop innovative products that help our customers get more performance

More information

Quest Collaboration Services 3.5. How it Works Guide

Quest Collaboration Services 3.5. How it Works Guide Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

How To Send E Mail From An Exchange 2007 To A Domain Name Address Book On A Domain Address Book (For A Domain) On A Pc Or Mac Xp (For An Ipod) On An Ipo (For Windows 2007) On Your Ip

How To Send E Mail From An Exchange 2007 To A Domain Name Address Book On A Domain Address Book (For A Domain) On A Pc Or Mac Xp (For An Ipod) On An Ipo (For Windows 2007) On Your Ip Lotus Domino Server and Exchange 2007 Server SMTP Routing using Smart Hosts Supplemental - Version 1.1, Dated June 2, 2009 Contents Purpose... 4 Current Lotus Domino Environment... 5 Sample Outbound Message

More information

and the software then detects and automates all password-related events for the employee, including:

and the software then detects and automates all password-related events for the employee, including: Reduce costs, simplify access and audit access to applications with single sign-on IBM Single Sign-On Highlights Reduce password-related helpdesk Facilitate compliance with pri- costs by lowering the vacy

More information

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Benefits of an Industry Standard Platform for Enterprise Sign-On white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed

More information

Administration Challenges

Administration Challenges The Essentials Series: Enterprise Identity and Access Management Administration Challenges sponsored by by Richard Siddaway Administration Challenges...1 Heterogeneous Environments...1 Multiple Directories...1

More information

Storage Capacity Management for Oracle Databases Technical Brief

Storage Capacity Management for Oracle Databases Technical Brief Storage Capacity Management for Oracle Databases Technical Brief Written by Name Title Quest Software, Inc. Technical Brief Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains

More information

Real-world Identity and Access Management (IAM) for Unix-based Systems

Real-world Identity and Access Management (IAM) for Unix-based Systems Real-world Identity and Access Management (IAM) for Unix-based Systems Written by Jason Fehrenbach, senior product manager, Dell Abstract Unix systems face special identity and access management (IAM)

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com

More information

Major Retailer Achieves Compliance With the PCI Data Security Standard

Major Retailer Achieves Compliance With the PCI Data Security Standard Leading Online Retailer INDUSTRY Online retail clothing sales COMPANY PROFILE This world-class apparel business operates multiple enterprises under multiple brands. BUSINESS SITUATION Had difficulty meeting

More information

AD Self-Service Suite for Active Directory

AD Self-Service Suite for Active Directory The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.

More information

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309

More information

Adaptive Management to Achieve Java Application Service Levels

Adaptive Management to Achieve Java Application Service Levels Adaptive Management to Achieve Java Application Service Levels Written by: Steve Stover Quest Software, Inc. Technical Brief Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains

More information

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity

More information

Microsoft Active Directory Backup and Recovery in Windows Server 2008. written by Shawn Barker Product Manager, Quest Software, Inc.

Microsoft Active Directory Backup and Recovery in Windows Server 2008. written by Shawn Barker Product Manager, Quest Software, Inc. Microsoft Active Directory Backup and Recovery in Windows Server 2008 written by Shawn Barker Product Manager, Quest Software, Inc. Copyright Quest Software, Inc. 2008. All rights reserved. This guide

More information

How Password Lifecycle Management Can Save Money and Improve Security

How Password Lifecycle Management Can Save Money and Improve Security How Password Lifecycle Management Can Save Money and Improve Security by Don Jones Quest Software, Inc. WHITE PAPER 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information

More information

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,

More information

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory W H I T E P A P E R C E N T R I F Y C O R P. M A Y 2008 Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory The Active Directory-Based Single Sign-On Solution

More information

System Requirements and Platform Support Guide

System Requirements and Platform Support Guide Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Taking Unix Identity and Access Management to the Next Level

Taking Unix Identity and Access Management to the Next Level Taking Unix Identity and Access Management to the Next Level Now that you ve taken care of local users and groups what s next? Written by Quest Software, Inc. TECHNICAL BRIEF 2010 Quest Software, Inc.

More information

Reaching the Tipping Point for Two-Factor Authentication

Reaching the Tipping Point for Two-Factor Authentication Reaching the Tipping Point for Two-Factor Authentication Written by Don Jones Quest Software, Inc. White Paper 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information,

More information

Virtualization Case Study

Virtualization Case Study INDUSTRY Finance COMPANY PROFILE Major Financial Institution. BUSINESS SITUATION Internal security audits found that VMware ESX, Red Hat Linux, and Solaris systems lacked an efficient way to control access

More information

An Oracle White Paper December 2010. Implementing Enterprise Single Sign-On in an Identity Management System

An Oracle White Paper December 2010. Implementing Enterprise Single Sign-On in an Identity Management System An Oracle White Paper December 2010 Implementing Enterprise Single Sign-On in an Identity Management System Introduction Most users need a unique password for every enterprise application, causing an exponential

More information

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide Foglight Managing Java EE Systems Supported Platforms and Servers Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quest One Identity Solution. Simplifying Identity and Access Management

Quest One Identity Solution. Simplifying Identity and Access Management Quest One Identity Solution Simplifying Identity and Access Management Identity and Access Management Challenges Operational Efficiency Security Compliance Too many identities, passwords, roles, directories,

More information

IBM Tivoli Access Manager for Enterprise Single Sign-On

IBM Tivoli Access Manager for Enterprise Single Sign-On Deliver seamless access to applications with an easy-to-deploy solution IBM Single Sign-On Highlights Help simplify the employee experience by eliminating the need to remember and manage user names and

More information

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008 Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...

More information

Big Brother Professional Edition Windows Client Getting Started Guide. Version 4.60

Big Brother Professional Edition Windows Client Getting Started Guide. Version 4.60 Big Brother Professional Edition Windows Client Getting Started Guide Version 4.60 Copyright Quest Software, Inc. 2002 2011. All rights reserved. This guide contains proprietary information, which is protected

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

Quest Management Agent for Forefront Identity Manager

Quest Management Agent for Forefront Identity Manager Quest Management Agent for Forefront Identity Manager Version 1.0 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

IBM Tivoli Identity Manager

IBM Tivoli Identity Manager Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces

More information

6.7. Quick Start Guide

6.7. Quick Start Guide 6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Passlogix Sign-On Platform

Passlogix Sign-On Platform Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure

More information

Understanding and Configuring Password Manager for Maximum Benefits

Understanding and Configuring Password Manager for Maximum Benefits Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password

More information

G00123440 A. Allan. Directory authentication providing a common ID and password across multiple systems

G00123440 A. Allan. Directory authentication providing a common ID and password across multiple systems . llan Research Note 21 October 2004 Commentary Enterprise Single Sign-On Tools re Comprehensive but Costly Managing multiple user identities and passwords is difficult for companies and users. ESSO can

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

Single Sign-On for Kerberized Linux and UNIX Applications

Single Sign-On for Kerberized Linux and UNIX Applications Likewise Enterprise Single Sign-On for Kerberized Linux and UNIX Applications AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise facilitates the

More information

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

Addressing the United States CIO Office s Cybersecurity Sprint Directives

Addressing the United States CIO Office s Cybersecurity Sprint Directives RFP Response Addressing the United States CIO Office s Cybersecurity Sprint Directives How BeyondTrust Helps Government Agencies Address Privileged Account Management and Improve Security July 2015 Addressing

More information

Choosing an SSO Solution Ten Smart Questions

Choosing an SSO Solution Ten Smart Questions Choosing an SSO Solution Ten Smart Questions Looking for the best SSO solution? Asking these ten questions first can give your users the simple, secure access they need, save time and money, and improve

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

An Oracle White Paper December 2010. Integrating Oracle Enterprise Single Sign-On Suite Plus with Strong Authentication

An Oracle White Paper December 2010. Integrating Oracle Enterprise Single Sign-On Suite Plus with Strong Authentication An Oracle White Paper December 2010 Integrating Oracle Enterprise Single Sign-On Suite Plus with Strong Authentication Introduction Protecting data in the digital age is critical. A security breach, if

More information

BlackShield Authentication Service

BlackShield Authentication Service BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.

More information

Citrix MetaFrame Password Manager 2.5

Citrix MetaFrame Password Manager 2.5 F E A T U R E S O V E R V I E W Citrix MetaFrame Password Manager 2.5 Citrix access infrastructure provides on-demand access to information, and Citrix MetaFrame Password Manager makes that information

More information

White paper December 2008. Addressing single sign-on inside, outside, and between organizations

White paper December 2008. Addressing single sign-on inside, outside, and between organizations White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli

More information

Identity and Access Management for the Cloud

Identity and Access Management for the Cloud Identity and Access Management for the Cloud What you need to know about managing access to your clouds Organizations need to control who has access to which systems and technology within the enterprise.

More information

Understanding Enterprise Cloud Governance

Understanding Enterprise Cloud Governance Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination

More information

Windows Least Privilege Management and Beyond

Windows Least Privilege Management and Beyond CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

10.2. Auditing Cisco PIX Firewall with Quest InTrust

10.2. Auditing Cisco PIX Firewall with Quest InTrust 10.2 Auditing Cisco PIX Firewall with Quest InTrust 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on

More information

An Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.

An Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc. An Introduction to Toad Extension for Visual Studio Written By Thomas Klughardt Systems Consultant Quest Software, Inc. Contents Introduction... 2 Installation... 3 Creating Projects... 4 Working with

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Getting the Most From. Your Help Desk

Getting the Most From. Your Help Desk . Turbo-IT Corporation 103 West Second Street Irving, Texas 75060 http://www.turbo-it.com turbo-it Corporation Getting the Most From.......... Your Help Desk Cost Reduction Strategies for Service Desk

More information

Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On

Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On SAP Brief SAP NetWeaver SAP NetWeaver Single Sign-On Objectives Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On Single sign-on in the SAP software architecture Single sign-on

More information

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service

More information

IBM Security Access Manager for Enterprise Single Sign-On

IBM Security Access Manager for Enterprise Single Sign-On IBM Security Access Manager for Enterprise Single Sign-On Simplify password management, strengthen access security and demonstrate compliance Highlights Achieve faster time to value and higher ROI with

More information