Enterprise Single Sign-On
|
|
- Clare Anthony
- 8 years ago
- Views:
Transcription
1 Enterprise Single Sign-On The Holy Grail of Computing Written by Quest Software, Inc.
2 Copyright Quest Software, Inc All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser's personal use without the written permission of Quest Software, Inc. WARRANTY The information contained in this document is subject to change without notice. Quest Software makes no warranty of any kind with respect to this information. QUEST SOFTWARE SPECIFICALLY DISCLAIMS THE IMPLIED WARRANTY OF THE MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Quest Software shall not be liable for any direct, indirect, incidental, consequential, or other damage alleged in connection with the furnishing or use of this information. TRADEMARKS All trademarks and registered trademarks used in this guide are property of their respective owners. World Headquarters 5 Polaris Way Aliso Viejo, CA info@quest.com U.S. and Canada: Please refer to our Web site for regional and international office information. Updated August 14, 2008
3 CONTENTS INTRODUCTION...1 THE CHALLENGE...2 ACTIVE DIRECTORY: THE FOUNDATION FOR ENTERPRISE SINGLE SIGN-ON...3 QUEST ONE IDENTITY SOLUTION S LAYERED APPROACH TO ADDRESSING THE CHALLENGES...4 PASSWORD SYNCHRONIZATION A TRADITIONAL APPROACH...5 ADVANTAGES OF PASSWORD SYNCHRONIZATION... 5 DISADVANTAGES OF PASSWORD SYNCHRONIZATION... 5 QUEST PASSWORD MANAGER SYNC... 6 EXTENDING ACTIVE DIRECTORY S SINGLE SIGN-ON BENEFITS TO OTHER PLATFORMS AND APPLICATIONS...8 SUPPORTING OTHER APPLICATIONS...9 A BLENDED SOLUTION TO A TOUGH CHALLENGE...10 PROTECTING HIGH-VALUE PASSWORDS...11 QUEST PRIVILEGE MANAGER FOR UNIX: EFFECTIVELY PROTECTING UNIX ROOT ACCESS.. 11 QUEST SAFEKEEPING SECURE MANAGEMENT OF PRIVILEGED ACCOUNTS QUEST DEFENDER: SOLVING THE MASTER KEY PROBLEM SUMMARY...14 ABOUT THE AUTHOR...16 ABOUT QUEST SOFTWARE, INC CONTACTING QUEST SOFTWARE CONTACTING QUEST SUPPORT... T 17 NOTES...18 i
4
5 Technical Brief INTRODUCTION The number of identities 1 we have to remember continues to grow. Gone are the mainframe days when we each had to remember only one identity. Evolution to client/server applications and the Internet has dramatically increased the number of identities we have to remember. Because of this increase, we have seen the emergence of a common challenge: keeping track of all of our passwords and system identities. IT managers are also struggling and asking questions such as: How do I reduce the help desk costs associated with forgotten passwords? How do I get my staff members not to write down their passwords on stickies? How do I secure, control, and audit the passwords associated with privileged accounts? The pursuit of enterprise single sign-on (SSO) 2 for the enterprise was born out of the costs associated with having so many user IDs and passwords the operational, security, and efficiency costs are significant. In this document, we discuss the challenges mentioned above in detail, how the Quest One Identity Solution, a set of enabling technologies that simplifies identity and access management, approaches enterprise single sign-on and a unique solution that addresses nearly all facets of the challenges. As enterprises become more complex and diverse, there has been a corresponding rise in the number of identities associated with any one individual. This causes identity and access management challenges. 1
6 Enterprise Single Sign-On. The Holy Grail of Computing THE CHALLENGE We all experience this challenge: too many identities, resulting in too many passwords and too many user IDs to remember. Figure 1 - A typical enterprise environment The productivity, security, compliance, and help desk costs related to this explosion of identities are significant. Some costs are easy to calculate and some are harder. The most definable cost to organizations is the help desk expense associated with helping end-users reset forgotten passwords on the myriad systems to which they have access. Many organizations also have multiple help desks: a Windows help desk, a Unix help desk, a mainframe help desk, and help desks for applications such as SAP or Siebel. The Unix, mainframe, and application help desks are typically more expensive for companies to maintain due to the expertise required. Typically, it is the Unix administrator, mainframe operations staff, or application specialists that are called upon for password resets for those systems. Most organizations can easily calculate this cost. Not as easy to calculate, but potentially greater, are the invisible costs associated with the proliferation of identities. Many organizations do not have automated provisioning or de-provisioning systems. This means that identities of many end users are never deleted from all of the systems to which they had access. Other potential costs or security concerns include the propensity for end users to use a common password across systems, write down their passwords, or use passwords that are easy to guess. With multiple systems it is also difficult to have a common password security policy. With this proliferation of systems there is another side effect a proliferation of administrative, privileged, and superuser identities. How can this be controlled and audited? Also it is difficult to calculate the lost productivity for end users who must enter their credentials multiple times per day or who are on the phone with the help desk resetting their passwords. The net result is that the efficiency of both our automated systems and our workers suffer. 2
7 Technical Brief ACTIVE DIRECTORY: THE FOUNDATION FOR ENTERPRISE SINGLE SIGN-ON Nearly all corporate end users begins their day by logging into a Windows desktop or laptop and authenticating to Active Directory. In the United States, Active Directory is the primary directory for over 75% of enterprises. 3 The prevalence of Active Directory continues to increase globally. Since the launch of Active Directory with Windows 2000 Server, organizations have relied on it as the primary authentication for their end users. In fact, in most enterprise users must log on via Active Directory before they can access non-windows hosted applications such as SAP, Siebel, and Oracle; mainframe or mid-range systems; and other client-server applications. Active Directory already provides extensive capabilities for enabling enterprise single sign-on and provides options for strong authentication via smart cards to further secure an organization s environment. Most end users do not realize that their access and authentication to nearly every Microsoft server, web, and other Microsoft-hosted applications (e.g., Exchange, SQL Server, SharePoint, and IIS) occurs transparently without their having to re-enter credentials. Active Directory enables true single sign-on but only to Windowsbased and Windows-hosted applications. In a Windows-only environment, this reduced or single sign-on capability is enabled through Microsoft s use of the Kerberos security protocol. 4 It is logical to base any single sign-on effort around the users user IDs and passwords that they use when they log on to their Windows desktop each day. 3
8 Enterprise Single Sign-On. The Holy Grail of Computing QUEST ONE IDENTITY SOLUTION S LAYERED APPROACH TO ADDRESSING THE CHALLENGES Quest Software's Quest One Identity Solution leads the industry in innovation that helps organizations simplify identity and access management, including SSO for the enterprise. The Quest One approach, as described throughout the rest of this technical brief, calls for: Directory and identity consolidation based on Active Directory as the true Holy Grail of SSO Enterprise single sign-on as the ideal solution for applications that cannot be directly integrated Synchronization for situations where integration and enterprise single signon are not practical 4
9 Technical Brief PASSWORD SYNCHRONIZATION A TRADITIONAL APPROACH Many organizations have taken to synchronizing users Active Directory passwords across systems to which end users must log on. Unfortunately, password synchronization does not actually solve all of the challenges that we have discussed thus far. In particular, it does not enable single sign-on. With password synchronization, users can have a single password that provides access to multiple systems they use, but they still must log on every time to each system. Advantages of Password Synchronization End-users have just one password to remember, so passwords are forgotten less often. This reduces both help desk costs associated with forgotten passwords and the associated loss of productivity. Administrators can more easily implement a consistent password policy across synchronized systems. Password synchronization is a viable solution where security policy disallows enterprise single sign-on. Generally no user workstation modification is required to implement password synchronization. It is easier to extend to any given platform or application than enterprise single sign-on. Disadvantages of Password Synchronization End users have just one password to remember, which increases the chance it could be compromised and allow unauthorized users to have access to all systems to which the password is synchronized. Users must continue to log on to each system individually, resulting in inefficiency. Not all systems easily support bi-directional password synchronization. Implementation can be complex; agents are usually required on all target systems. Password policies may not be compatible across all systems, which can lead to a least secure policy (e.g., mainframe passwords are typically 8 characters maximum). There is no support for advanced or strong authentication (e.g.,, smart cards, tokens, and one-time passwords). No directory or identity consolidation is enabled, so the number of directories is not reduced. Password synchronization does not secure or audit administrative, privileged, or superuser identities. To summarize, password synchronization does not provide true single sign-on, but it does offer enterprises a first step towards reducing help desk costs. It also offers the opportunity to provide a broad-based solution that would fit almost any company. 5
10 Enterprise Single Sign-On. The Holy Grail of Computing Quest Password Manager Sync Quest Password Manager, when coupled with synchronization, can improve a password synchronization solution by enabling end users to reset their own password and synchronize their passwords across multiple platforms. This helps to further reduce help desk costs and improve productivity. Platforms and applications that are supported for password synchronization include: Digital Unix Digital OpenVMS HP-UX IBM AIX IBM AS/400 (i Series) IBM OS/390 Sun Solaris Linux Novell Netware NDS 5.x and 6.x IBM DB2 IBM Directory Server Lotus Domino Microsoft IIS Web Server Microsoft SQL Server Netscape Directory Server Oracle SAP R/3 Sybase SQL Server IBM RACF CA Top Secret CA ACF2 Microsoft Active Directory 6
11 Technical Brief Combining Quest Password Manager with synchronization provides both cross-platform password resets as well as classic password synchronization 7
12 Enterprise Single Sign-On. The Holy Grail of Computing EXTENDING ACTIVE DIRECTORY S SINGLE SIGN-ON BENEFITS TO OTHER PLATFORMS AND APPLICATIONS Quest One Identity Solution enhances and extends the capabilities of Active Directory. This also extends to enterprise single sign-on. Our solutions require Active Directory and expect it will be the primary directory for user authentication. By utilizing Active Directory as the foundation for enterprise single sign-on, customers can benefit from the security and interoperability that Kerberos provides. Quest One extends Active Directory s benefits to other platforms and applications by providing integration software that leverages Active Directory s Kerberos protocol. Platforms and applications that support Kerberos (e.g., Unix, Linux, Java, SAP, IBM DB2, Oracle, telnet, VMWare, and Apple OS X) can be integrated with Active Directory. This allows end users to have a true single sign-on experience that starts and ends with logging in to Active Directory. The experience is as seamless as it would be in a Windows-only environment: no additional log-on screens are presented. In fact, one of the primary benefits of extending Active Directory to support other platforms and applications in this fashion is that end users Active Directory credentials can be used for authentication. This means that the directories that were previously used for authentication can now be consolidated into Active Directory. This in itself provides significant benefits: fewer directories to manage, fewer moving parts, and no requirement to synchronize those old directories, to name a few. In addition, through Group Policy it is possible to control password security policy settings such as maximum password age, minimum password length, requirements for password complexity, and smart card use. The security benefit of being able to automate the enforcement of a common password security policy across multiple platforms cannot be underestimated. Another benefit is realized when an Active Directory account is suspended or deleted; all access to any other platform that was extended through the use of Kerberos is automatically revoked. There is no need to de-provision accounts in those systems. Quest Authentication Services delivers this functionality. From an enterprise single sign-on perspective, it is important that any solution that a customer purchases will include support for other platforms. Quest Authentication Services enables Unix and Linux clients or servers to fully participate in an enterprise single sign-on strategy. Other enterprise single sign-on products support only Windows clients. Today, a company is bound to have more than just Windows desktops. Quest Single Sign-on for Java provides the same capabilities and benefits for J2EE servers and Java-based applications. This is something that is also not typically available via other enterprise single sign-on solutions. These products also enable the use of Active Directory groups as a means to perform access control checks or authorization based on group membership. Quest enables organizations to extend the use of Active Directory-based identities to non-windows platforms without having to install cumbersome identity management frameworks or synchronization tools. Organizations continue to use Active Directory normally; it has just been extended to support additional platforms or applications. 8
13 Technical Brief SUPPORTING OTHER APPLICATIONS Unfortunately, support of Kerberos for authentication is not universal; many applications still do not support Kerberos. Quest s Enterprise Single Sign-on product is the answer for these applications. Quest Enterprise Single Sign-on frees users from having to remember passwords for their applications. Once authenticated to Windows via a password or two-factor authentication, a user's access rights for password-protected information resources are managed by Quest Enterprise Single Sign-on. No matter which technology is used, including the web, you can integrate access to new applications with a couple of clicks in a graphical user interface. This drastically reduces the numbers of calls due to forgotten passwords and the associated help desk costs. 9
14 Enterprise Single Sign-On. The Holy Grail of Computing A BLENDED SOLUTION TO A TOUGH CHALLENGE Quest understands that customers want a single sign-on solution that supports many platforms and applications. Quest One s products provide the most secure and broadest possible support of applications and platforms in the industry today. Quest One enables a true single sign-on experience that includes significant applications like SAP. They are the only extensive single sign-on solutions that support Linux and Unix desktops, Java web applications, and J2EE servers. Quest One offers a comprehensive collection of solutions ranging from password synchronization to integration with Active Directory and enterprise single sign-on. Once authenticated by Active Directory, end -user access rights for passwordprotected information resources can be managed by Quest Enterprise Single Signon. The software automatically recognizes password-protected applications and web sites, looks up the end users credentials stored in Active Directory, automatically fills in the prompts (users IDs and passwords) on the screen, and log the users in. There are significant advantages to the Quest approach to enterprise single sign-on: 10 Improves users productivity and decreases help desk costs Supports the widest range of password protected applications and web sites Supports Microsoft s Windows 2000, XP, and Vista desktop clients; Unix and Linux desktop clients and servers; and J2EE servers and applications Utilizes Active Directory as the foundation for enterprise single sign-on; no additional directories or databases are required Enables the consolidation of Unix, Linux, NIS, and other directories with Active Directory, reducing the number of directories that must be managed Manages all enterprise single sign-on users via Active Directory Users and Computers (ADUC) and Active Directory group membership Integrates with Group Policy for easier administration and policy control Integrates with Quest Defender and other leading two-factor authentication hardware and software tokens for the strongest protection of an end users credentials Easily integrates new applications or web sites
15 Technical Brief PROTECTING HIGH-VALUE PASSWORDS Most enterprises that implement password synchronization or enterprise single sign-on do not apply these practices to their high value passwords or identities. 5 In addition, neither of these practices control access to or audit the activities related to high value identities. In many companies, it is common for an administrative password (e.g., root on Unix or Linux) to be shared among trusted individuals. But how are activities audited? And who is using a high value identity and for what reason? It is becoming increasingly important for companies to prove who has access to a privileged account, why they are using that account, who granted them access, and what they use the account to do. Another common problem is that of the master key : once a company has implemented single sign-on, how does it protect that one credential that is the master key to all systems and applications? Quest Privilege Manager for Unix: Effectively Protecting Unix Root Access Quest Privilege Manager for Unix brings accountability and security to Unix by enabling system administrators to delegate users authority. The organization can then implement reasonable security controls without impacting the ability of users to perform their daily work. With Privilege Manager, responsibility for adding accounts, fixing printer queues, and other routine job functions can safely be delegated to individuals or groups without disclosing the root password. This protects the full power of root (such as deleting critical files, modifying databases or file permissions, and reformatting disks) from potential misuse or abuse and an organization's valuable information is not compromised: Privilege Manager allows only authorized users to access files, directories, and third-party applications and accounts, such as financial records. Privilege Manager can also record all Unix session activity, log all keystrokes, and display output for any user. This indelible audit trail, combined with the safe partitioning of root functionality, provides an extremely secure means of controlling the power of root. Organizations always know exactly what activity is being performed by the root account, as well as who did it and where and when it occurred. 11
16 Enterprise Single Sign-On. The Holy Grail of Computing Quest SafeKeeping Secure Management of Privileged Accounts Administrative, privileged, or superuser passwords no matter the platform, application or appliance for which they re used present a unique set of management challenges. These credentials are typically role-based and shared between several users, which can lead to mismanagement. Although many organizations have procedural controls and policies governing the use of these credentials, monitoring can be costly and time-consuming when the number and range of systems is large. Often the procedures and policies are not followed. Quest s SafeKeeping delivers a solution to the management of the shared account credentials by providing a secure, automated mechanism for the request, authorization, release, and change of shared credentials. Once a shared account is managed by SafeKeeping-, a password change for the credentials on it is scheduled. The new password is selected in accordance with SafeKeeping s userdefined strong password policies. A single individual will not know the password until it is issued following a successfully authorized release request. All SafeKeeping s actions are fully audited to ensure conformance with compliance requirements. Quest Defender: Solving the Master Key Problem A common security concern with enterprise single sign-on projects is how to handle the master key problem. Once an organization implements single or reduced signon, a compromised user credential becomes a critical security concern. A compromised Active Directory user ID and password makes it possible for an unauthorized user to access any Windows or single sign-on integrated application or platform. Therefore, multi-factor authentication is essential. There are three universally recognized factors for authenticating individuals: 1. Something you know, such as a password or PIN 2. Something you have, such as a mobile phone, credit card, or hardware security token 3. Something you are, such as a fingerprint, a retinal scan, or other biometric Most often, individuals are authenticated using the first method: something you know, which typically is a password. However, when an enterprise wants to protect privileged accounts or secure the passwords of enterprise single sign-on users, it is common to add a second factor something you have. Common implementations of two-factor authentication use something you know (a password) as the first factor and something you have (a physical device of some nature) as the second factor. 12
17 Technical Brief Quest Defender provides a unified, vendor-neutral, and token-agnostic authentication infrastructure that can grow and adapt with the ever-changing requirements of the business. The biometric technology of Defender can supplement the one-time password. This provides a secure solution for a simple two-factor or complex three-factor authentication. Defender uniquely authenticates authorized users, grants access to important information and resources, and protects corporate assets from unauthorized use. While other authentication solutions employ their own proprietary databases, Defender integrates seamlessly with Microsoft s Active Directory and uses Active Directory as its data repository. This ensures that the proven business benefits of cost avoidance and cost reduction are maintained throughout the security infrastructure. One of the most important benefits of this integration is that the familiar Active Directory users and computers administration tool is used to manage the entire Defender environment. Because Defender is totally integrated with Microsoft Active Directory, all of the well-known Active Directory benefits, including scalability, replication, high availability, and automated backup, apply to Defender. Existing Windows users are simply assigned Defender policies and tokens to become Defender users. To further ease administration, the Defender Token Self- Registration Service enables Windows users to assign their own tokens. The installation of Defender does not affect the functionality of Windows; domain policies and log-ins, for example, remain under the control of Windows. Two-factor authentication for Windows log-ins can be optionally enabled by means of the Defender Desktop Login component. End users who use BlackBerries, ipaqs, or Pocket PCs can use these devices as their second factor. Defender soft tokens are available for these devices and for use with standalone laptops or desktops. Quest One also supports the use of smart cards for credential security with Defender and other Quest One products, including Quest Authentication Services. 13
18 Enterprise Single Sign-On. The Holy Grail of Computing SUMMARY Quest One Identity Solution provides a unique solution that enables customers to truly achieve secure enterprise single sign-on within their heterogeneous environment. It is now possible to leverage an Active Directory user ID and password to access all enterprise applications, systems, and servers, even in an environment that includes Windows, Unix, Linux, Java, Apple Mac OS X, and mainframes. All aspects of the Quest One solution are managed from within Windows and Active Directory using the native tools that you have come to know and rely on over the years. There is no need to deploy new directories or databases. You can also protect the single key to your kingdom by deploying and integrating strong two-factor authentication using Quest Defender. High value administrative and application passwords can be protected by Quest Privilege Manager for Unix or Quest SafeKeeping. Quest One s solutions for enterprise single sign-on offer the broadest, most secure, and most deeply integrated solution with Active Directory available on the market today. 14
19 Technical Brief 15
20 Enterprise Single Sign-On. The Holy Grail of Computing ABOUT THE AUTHOR Jackson Shaw joined Quest Software as part of its acquisition of Vintela. Shaw oversees product direction, strategy, and go-to-market activities for all Identity and Access Management products. With more than 15 years of experience, Shaw was a key member of the identity and access management marketing team for the Windows server marketing group at Microsoft. He was responsible for product planning and marketing for Microsoft's identity and access management products, including Active Directory and Microsoft Identity Integration Server (MIIS) Before joining Microsoft in 1999, Shaw served as vice president of sales for Toronto-based ZoomIT Corp., a pioneer in the development of metadirectory products. He was also a member of the management team that successfully oversaw the company s acquisition by Microsoft in Before joining ZoomIT, Shaw held IT management roles at the International Development Research Centre, a Canadian corporation created to help developing countries find long-term solutions to social, economic, and environmental problems. Shaw has been involved in directory, meta-directory, and security initiatives since He studied computer science and management information systems at the University of Ottawa. He is a member of the Association for Computing Machinery. 16
21 Technical Brief ABOUT QUEST SOFTWARE, INC. Quest Software, Inc., a leading enterprise systems management vendor, delivers innovative products that help organizations get more performance and productivity from their applications, databases, Windows infrastructure and virtual environments. Through a deep expertise in IT operations and a continued focus on what works best, Quest helps more than 90,000 customers worldwide meet higher expectations for enterprise IT. Quest provides customers with client management as well as server and desktop virtualization solutions through its subsidiaries, ScriptLogic and Vizioncore. Quest Software can be found in offices around the globe and at Contacting Quest Software Phone: Mail: Web site: (United States and Canada) info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA USA Please refer to our Web site for regional and international office information. Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a commercial version and have a valid maintenance contract. Quest Support provides around the clock coverage with SupportLink, our web self-service. Visit SupportLink at From SupportLink, you can do the following: Quickly find thousands of solutions (Knowledgebase articles/documents). Download patches and upgrades. Seek help from a Support engineer. Log and update your case, and check its status. View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policy and procedures. The guide is available at: Support Guide.pdf 17
22 Enterprise Single Sign-On. The Holy Grail of Computing NOTES 1 The term identity is used when referencing how a person is uniquely identified to a computer system. Generally this identification is through the combination of a user ID and a password or a smartcard and PIN. 2 Enterprise single sign-on is the ability for a user to enter a user ID and password just once to log on to multiple applications within an enterprise, whereas web or federated single sign-on is cross-enterprise focused. 3 Bob Muglia, Sr. Vice-President Server and Tools Business, Microsoft; ITForum 2005 Keynote presentation. 4 Kerberos, created by MIT, is a network authentication and authorization protocol. The Kerberos protocol uses strong cryptography so that a client can prove its identity to a server (and vice versa) across an insecure network connection. After a client and server have used Kerberos to prove their identities, they can also encrypt all of their communications to ensure privacy and data integrity as they go about their business. 5 A high value password is defined as the password to a network, application (e.g., SAP, PeopleSoft, or Siebel), database (e.g., Oracle or SQL), or system (e.g., Windows, Unix, or Linux) identity that, if lost, could result in a significant security compromise or financial loss to an enterprise. 18
Enterprise Single Sign-On. The Holy Grail of Computing
Enterprise Single Sign-On. The Holy Grail of Computing Written by Jackson Shaw Senior Director, Product Management Identity and Access Management, Quest Software Inc. Technical Brief 2009 Quest Software,
More informationHow the Quest One Identity Solution Products Enhance Each Other
Better Together How the Quest One Identity Solution Products Enhance Each Other Written by Quest Software, Inc. Business Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary
More information8.3. Competitive Comparison vs. Microsoft ADMT 3.1
8.3 Competitive Comparison vs. Microsoft ADMT 3.1 Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described
More informationFile Shares to SharePoint: 8 Keys to a Successful Migration
File Shares to SharePoint: 8 Keys to a Successful Migration Written by Doug Davis Director, SharePoint Product Management Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2008. All rights
More information4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
More informationGain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock
Gain Control of Space with Quest Capacity Manager for SQL Server written by Thomas LaRock Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains proprietary information, which is
More informationDefender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationDefender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationTen Things to Look for in a SharePoint Recovery Tool
Ten Things to Look for in a SharePoint Recovery Tool Written by Ilia Sotnikov Product Manager, SharePoint Management Solutions Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2009. All
More informationAchieving Successful Coexistence Between Notes and Microsoft Platforms
Achieving Successful Coexistence Between Notes and Microsoft Platforms Written by Technology Strategy Research LLC White Paper Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains
More informationOracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
More informationTechnical Brief. Unify Your Backup and Recovery Strategy with LiteSpeed for SQL Server and LiteSpeed Engine for Oracle
Unify Your Backup and Recovery Strategy with LiteSpeed for SQL Server and LiteSpeed Engine for Oracle Written by Tom Sager, DBA team leader E. ON U.S. Technical Brief 2009 Quest Software, Inc. ALL RIGHTS
More informationIntegrating Unix and Linux Systems with Active Directory
Integrating Unix and Linux Systems with Active Directory Technical Brief written by Jackson Shaw Senior Director, Product Management - Active Directory Infrastructure Management Quest Software, Inc. Copyright
More informationImplementing Database Development Best Practices for Oracle
Implementing Database Development Best Practices for Oracle Written by, John Pocknell Product Manager, Toad for Oracle & Toad Data Modeler Quest Software, Inc. Technical Brief Copyright Quest Software,
More informationQuest SQL Optimizer 6.5. for SQL Server. Installation Guide
Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationQuest InTrust for Active Directory. Product Overview Version 2.5
Quest InTrust for Active Directory Product Overview Version 2.5 Copyright Quest Software, Inc. 2006. All rights reserved. This guide contains proprietary information, which is protected by copyright. The
More informationPragmatic Business Service Management
Pragmatic Business Service Management Written by Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected
More informationOvercoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.
Overcoming Active Directory Audit Log Limitations Written by Randy Franklin Smith President Monterey Technology Group, Inc. White Paper 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains
More informationQuest ChangeAuditor 4.8
Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide
More informationActive Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
More information2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer
What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationProduct overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
More informationCA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
More informationThe Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
More informationManage, Extend, and Simplify Group Policy using Quest Group Policy Solutions
Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions Technical Brief written by Darren Mar-Elia Chief Technology Officer Windows Management Quest Software, Inc. Copyright Quest
More information2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
More informationWhite Paper. Getting Your Macs Under Control with System Center Configuration Manager 2007. Really?
Getting Your Macs Under Control with System Center Configuration Manager 2007. Really? Written by Don Jones Co-Founder, Concentrated Technology Microsoft MVP White Paper 2009 Quest Software, Inc. ALL RIGHTS
More informationLegal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk
Legal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk Written by: Quest Software, Inc. Executive Summary Copyright Quest Software,
More information10 Simple Steps for Boosting Database Performance in a Virtualized Environment
10 Simple Steps for Boosting Database Performance in a Virtualized Environment Written by Dr. Bert Scalzo Quest Software, Inc. White Paper 10 Simple Steps for Boosting Database Performance in a Virtualized
More informationQuest Management Pack for AS400. Written by Quest Software, Inc.
Quest Management Pack for AS400 Written by Quest Software, Inc. 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information, protected by copyright. No part of this document
More informationThe Power of One. A Simplified Approach to Identity and Access Management. Written by Quest Software, Inc.
The Power of One A Simplified Approach to Identity and Access Management Written by Quest Software, Inc. Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains proprietary information,
More informationOracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
More informationQuest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationidentity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
More informationWhite Paper. Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software
Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software Written by Tom Crane, Product Manager, Quest Software, Inc. Edited by James Galvin, Microsoft Sr. Product Manager,
More informationQuest Software Product Guide
Quest Software Product Guide Quest Software knows the expectations customers have for IT investments are not always met. That s why we develop innovative products that help our customers get more performance
More informationQuest Collaboration Services 3.5. How it Works Guide
Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationHow To Send E Mail From An Exchange 2007 To A Domain Name Address Book On A Domain Address Book (For A Domain) On A Pc Or Mac Xp (For An Ipod) On An Ipo (For Windows 2007) On Your Ip
Lotus Domino Server and Exchange 2007 Server SMTP Routing using Smart Hosts Supplemental - Version 1.1, Dated June 2, 2009 Contents Purpose... 4 Current Lotus Domino Environment... 5 Sample Outbound Message
More informationand the software then detects and automates all password-related events for the employee, including:
Reduce costs, simplify access and audit access to applications with single sign-on IBM Single Sign-On Highlights Reduce password-related helpdesk Facilitate compliance with pri- costs by lowering the vacy
More informationThe Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
More informationAdministration Challenges
The Essentials Series: Enterprise Identity and Access Management Administration Challenges sponsored by by Richard Siddaway Administration Challenges...1 Heterogeneous Environments...1 Multiple Directories...1
More informationStorage Capacity Management for Oracle Databases Technical Brief
Storage Capacity Management for Oracle Databases Technical Brief Written by Name Title Quest Software, Inc. Technical Brief Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains
More informationReal-world Identity and Access Management (IAM) for Unix-based Systems
Real-world Identity and Access Management (IAM) for Unix-based Systems Written by Jason Fehrenbach, senior product manager, Dell Abstract Unix systems face special identity and access management (IAM)
More informationWeb Portal Installation Guide 5.0
Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationOpen Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
More informationLeverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com
More informationMajor Retailer Achieves Compliance With the PCI Data Security Standard
Leading Online Retailer INDUSTRY Online retail clothing sales COMPANY PROFILE This world-class apparel business operates multiple enterprises under multiple brands. BUSINESS SITUATION Had difficulty meeting
More informationAD Self-Service Suite for Active Directory
The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.
More informationCritical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
More informationAdaptive Management to Achieve Java Application Service Levels
Adaptive Management to Achieve Java Application Service Levels Written by: Steve Stover Quest Software, Inc. Technical Brief Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains
More informationOracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
More informationMicrosoft Active Directory Backup and Recovery in Windows Server 2008. written by Shawn Barker Product Manager, Quest Software, Inc.
Microsoft Active Directory Backup and Recovery in Windows Server 2008 written by Shawn Barker Product Manager, Quest Software, Inc. Copyright Quest Software, Inc. 2008. All rights reserved. This guide
More informationHow Password Lifecycle Management Can Save Money and Improve Security
How Password Lifecycle Management Can Save Money and Improve Security by Don Jones Quest Software, Inc. WHITE PAPER 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information
More informationWHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
More informationSingle Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory
W H I T E P A P E R C E N T R I F Y C O R P. M A Y 2008 Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory The Active Directory-Based Single Sign-On Solution
More informationSystem Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationTaking Unix Identity and Access Management to the Next Level
Taking Unix Identity and Access Management to the Next Level Now that you ve taken care of local users and groups what s next? Written by Quest Software, Inc. TECHNICAL BRIEF 2010 Quest Software, Inc.
More informationReaching the Tipping Point for Two-Factor Authentication
Reaching the Tipping Point for Two-Factor Authentication Written by Don Jones Quest Software, Inc. White Paper 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information,
More informationVirtualization Case Study
INDUSTRY Finance COMPANY PROFILE Major Financial Institution. BUSINESS SITUATION Internal security audits found that VMware ESX, Red Hat Linux, and Solaris systems lacked an efficient way to control access
More informationAn Oracle White Paper December 2010. Implementing Enterprise Single Sign-On in an Identity Management System
An Oracle White Paper December 2010 Implementing Enterprise Single Sign-On in an Identity Management System Introduction Most users need a unique password for every enterprise application, causing an exponential
More informationFoglight. Managing Java EE Systems Supported Platforms and Servers Guide
Foglight Managing Java EE Systems Supported Platforms and Servers Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationQuest One Identity Solution. Simplifying Identity and Access Management
Quest One Identity Solution Simplifying Identity and Access Management Identity and Access Management Challenges Operational Efficiency Security Compliance Too many identities, passwords, roles, directories,
More informationIBM Tivoli Access Manager for Enterprise Single Sign-On
Deliver seamless access to applications with an easy-to-deploy solution IBM Single Sign-On Highlights Help simplify the employee experience by eliminating the need to remember and manage user names and
More informationOracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004
Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory
More informationQuest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide
Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationManage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...
More informationBig Brother Professional Edition Windows Client Getting Started Guide. Version 4.60
Big Brother Professional Edition Windows Client Getting Started Guide Version 4.60 Copyright Quest Software, Inc. 2002 2011. All rights reserved. This guide contains proprietary information, which is protected
More informationAn Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
More informationQuest Management Agent for Forefront Identity Manager
Quest Management Agent for Forefront Identity Manager Version 1.0 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationPassword Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist
Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing
More informationformerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationIBM Tivoli Identity Manager
Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces
More information6.7. Quick Start Guide
6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationPasslogix Sign-On Platform
Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure
More informationUnderstanding and Configuring Password Manager for Maximum Benefits
Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password
More informationG00123440 A. Allan. Directory authentication providing a common ID and password across multiple systems
. llan Research Note 21 October 2004 Commentary Enterprise Single Sign-On Tools re Comprehensive but Costly Managing multiple user identities and passwords is difficult for companies and users. ESSO can
More informationFOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationformerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,
More informationSingle Sign-On for Kerberized Linux and UNIX Applications
Likewise Enterprise Single Sign-On for Kerberized Linux and UNIX Applications AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise facilitates the
More informationActive Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper
Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
More informationAddressing the United States CIO Office s Cybersecurity Sprint Directives
RFP Response Addressing the United States CIO Office s Cybersecurity Sprint Directives How BeyondTrust Helps Government Agencies Address Privileged Account Management and Improve Security July 2015 Addressing
More informationChoosing an SSO Solution Ten Smart Questions
Choosing an SSO Solution Ten Smart Questions Looking for the best SSO solution? Asking these ten questions first can give your users the simple, secure access they need, save time and money, and improve
More informationDell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationAn Oracle White Paper December 2010. Integrating Oracle Enterprise Single Sign-On Suite Plus with Strong Authentication
An Oracle White Paper December 2010 Integrating Oracle Enterprise Single Sign-On Suite Plus with Strong Authentication Introduction Protecting data in the digital age is critical. A security breach, if
More informationBlackShield Authentication Service
BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.
More informationCitrix MetaFrame Password Manager 2.5
F E A T U R E S O V E R V I E W Citrix MetaFrame Password Manager 2.5 Citrix access infrastructure provides on-demand access to information, and Citrix MetaFrame Password Manager makes that information
More informationWhite paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
More informationIdentity and Access Management for the Cloud
Identity and Access Management for the Cloud What you need to know about managing access to your clouds Organizations need to control who has access to which systems and technology within the enterprise.
More informationUnderstanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
More informationWindows Least Privilege Management and Beyond
CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More information7.5 7.5. Spotlight on Messaging. Evaluator s Guide
7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More information10.2. Auditing Cisco PIX Firewall with Quest InTrust
10.2 Auditing Cisco PIX Firewall with Quest InTrust 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationRSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION
RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on
More informationAn Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.
An Introduction to Toad Extension for Visual Studio Written By Thomas Klughardt Systems Consultant Quest Software, Inc. Contents Introduction... 2 Installation... 3 Creating Projects... 4 Working with
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More informationGetting the Most From. Your Help Desk
. Turbo-IT Corporation 103 West Second Street Irving, Texas 75060 http://www.turbo-it.com turbo-it Corporation Getting the Most From.......... Your Help Desk Cost Reduction Strategies for Service Desk
More informationImprove Security, Lower Risk, and Increase Compliance Using Single Sign-On
SAP Brief SAP NetWeaver SAP NetWeaver Single Sign-On Objectives Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On Single sign-on in the SAP software architecture Single sign-on
More informationDirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
More informationIBM Security Access Manager for Enterprise Single Sign-On
IBM Security Access Manager for Enterprise Single Sign-On Simplify password management, strengthen access security and demonstrate compliance Highlights Achieve faster time to value and higher ROI with
More information