Single Sign-On Systems
|
|
|
- Ambrose James
- 10 years ago
- Views:
Transcription
1 Helsinki University of Technology Telecommunications Software and Multimedia Laboratory Research Seminar in Telecommunications Business I T Single Sign-On Systems Tomi Määttänen 45342K
2 Helsinki University of Technology 2/21 1 INTRODUCTION ABOUT THIS PAPER SINGLE SIGN-ON SYSTEM FEATURES OVERVIEW Single sign-on functionality and auditing Authentication with different security levels Centralized security policy and user management WHY SINGLE SIGN-ON? Single sign-on benefits Single sign-on problems DIFFERENT LEVELS OF SINGLE SIGN-ON Intranet single sign-on Extranet single sign-on Internet single sign-on SINGLE SIGN-ON ARCHITECTURE GENERAL LEVEL ARCHITECTURE MESSAGE LEVEL ARCHITECTURE Tickets Initial authentication Single sign-on authentication Logout SINGLE SIGN-ON DEPLOYMENT BEFORE DEPLOYMENT THE ACTUAL INSTALLATION WEB AGENT INSTALLATION SINGLE SIGN-ON MARKETS SINGLE SIGN-ON MARKETS AND PLAYERS MARKET TRENDS COMMERCIAL BUSINESS CASE SUMMARY REFERENCES, LINKS AND ABBREVIATIONS REFERENCES ABBREVIATIONS...21
3 Helsinki University of Technology 3/21 1 Introduction 1.1 About this paper This paper is written for Helsinki University of Technology and Research seminar on telecommunication business. The goal of this paper is to describe the idea and technology behind single sign-on systems (SSO) that work in web environment, and discuss its deployment issues, and markets. The following topics will be covered: - How does the typical SSO system architecture work - What are the factors must be considered when deploying SSO system - SSO market, growth prospects and main players - One commercial business case It should be noted that this is only descriptive and introductive document for the seminar presentation. This paper doesn t help developers to implement and administrators to deploy single sign-on systems and it doesn t contain full details of single sign-on technologies. Only one specific type of single sign-on system architecture will be introduced, though it represents architecture in a general level that is widely common solution in current commercial single signon systems. 1.2 Single sign-on system features overview Single sign-on system, later SSO system, is a solution that brings different features to the IT infrastructure where it will be deployed. It enables different issues involving authentication, authorization and auditing (AAA), for most important factors being: - Single sign-on functionality and auditing - Authentication with different security levels - Centralized security policy and user management (authorization)
4 Helsinki University of Technology 4/21 Authori- zation Authen- tication User manage- ment Accounting Audit Trend Cost analysis allocation Billing Figure 1 The key domains of single sign-on systems Single sign-on functionality and auditing The most obvious feature is of course the actual single sign-on functionality. Single sign-on is a concept where in contrast of users having multiple user id and password pairs or other authentication methods to different services and applications, they can now access all those applications and services through a single point of entry (The Finnish Centre for Technical Terminology, 2002b). The auditing or accounting part takes care of logging, auditing functions and possibly gathering billing information. SSO systems can usually provide reporting facilities so that all significant security events (such as user authentications, authorizations, etc.) can be tracked and logged for administrator analysis. The value of this kind of security feature can be significant when all or most of the organization systems are working in a SSO system Authentication with different security levels Authentication is a method by which the identity of a user, an application, a device etc. is identified by a service provider. Authentication is usually followed by authorization (The Finnish Centre for Technical Terminology, 2002a). In a SSO system it is possible to require specific authentication methods for different applications and for different users. SSO system can usually enable single sign-on user authentication using one or a selection of different authentication methods like username and password, one-time passwords (Haller et al. 1998), smart card (or other client certificate), or SMS messages
5 Helsinki University of Technology 5/21 (plain text or signed with STK application). The task is to choose authentication methods that best serve the needs of the application or user level in question. Security Light Mediu High Traditional Username and Password Plain SMS (+ PIN) Smart Card etc. Client Certificate (PKI) Software Client Certificate (PKI) One-Time Passwords generated a mobile devic Digitally signed SMS Symmetric or (PKI)cryptograp Figure 2 Different levels of authentication Centralized security policy and user management SSO systems enable centralized security policy and user management for different applications. Authorization is the concept that covers partly these issues. Authorization is the process of dictating who is to use which resources, and under what kind of conditions. The SSO system administrator is able to control passwords and authorization information related to different users, user groups and applications. Part of the user management tasks can also be managed in a distributed set-up if necessary, e.g. by persons that are responsible for other organization unit authorization. 1.3 Why single sign-on? The features described in chapter 1.2 gives some obvious reasons why single sign-on system deployment can be justified. The discussion in this chapter will deepen the subject. Single sign-on is one key part in data security, which can at the same time increase user experience, ease administration and save costs. Users are today overwhelmed by having to memorize a growing number of user-id and password pairs, as they use various network services and applications. This fact
6 Helsinki University of Technology 6/21 can even mean that users don t start using new services at all or use them only a few times. Numerous users who have forgotten their password also continuously contact support services and helpdesks, hence generating unnecessary costs and dissatisfaction. Usability and deployment issues are often in clear contradiction to the security aspects. However both these areas can be answered and served well utilizing single sign-on systems. Yet, the authentication security and trust levels are favourable both for the end-user and for the administrators of the system. SSO systems can offer fast and efficient deployment and provide efficient enabling tools and information for personalization of web-services, web-application like e-commerce and m-commerce applications. Corporations and other organizations today see security as a must especially for those who want to create and maintain their confidential relationships with customers, partners and subcontractors. User authentication is a key success factor to enable e-business. Strong authentication is not considered an additional security insurance-like feature anymore, but rather an enabling IT infrastructure part that plays an important role when building foe example business relationships in networks. And why are we here? According to Hursti (1997) (Figure 3), there are growing knowledge requirements concerning threats towards digital information. In the figure there is seen a complexity of networked applications that require security and the complexity of the security solutions. To cope with these complex systems the organizations need tools to manage the complexity. Single Sign-On SSO is an answer to these needs. Figure 3 The Development of the Security Business Segments as a Response for the Increasing Needs of Networked Applications (Hursti 1997)
7 Helsinki University of Technology 7/ Single sign-on benefits SSO systems can offer user authentication and single sign-on capabilities to any web-based application. Some of the most important benefits provided by SSO systems are the ability to centralize user management, authentication, authorization and auditing, as well as to utilize many different authentication methods. Through SSO system capabilities, users may authenticate across multiple applications on a web environment, without encountering a separate log-on screen for each application thus allowing access to all organization assets with a single ID and password combination or with other centralized deployed authentication method. When organizations adopt a centralized security infrastructure, they eliminate the need for application-specific security implementations and security business logic, thereby reducing development and maintenance costs from other web applications. SSO systems make applications development simpler, as the developer can write code that relies on the SSO systems user and group management features, rather than developing unique user management systems for each application. SSO systems can also reduce the costs of IT-administration as well as other user-data administration costs. They reduce the number of help desk calls from users wanting password resets because they forgot a password. It also makes it simple to disable a terminated user's access to all organization applications by disabling a single account. SSO systems enable organizations to centrally manage all user authentications and all user access control following organizational-wide security policies. SSO systems enable e.g. that an application, which provides users with some critical information, may require stronger authentication schemes than other more casual applications. That is, authentication can be deployed based application, user and content. The simplest use of SSO system authentication might simply concern access to web or extranet pages holding some confidential information Single sign-on problems Is there a downside of SSO that, once you have signed on, you can access every application? This means that once a bad-willing person has signed on he can access everything, whereas if you didn t have SSO, he would just be able to access a part of the network. So the authentication at the front door has to be very good for SSO to be widely accepted. This is an obvious and often asked question. SSO will not be a downside and lower the security IF the organisation security policy is defined properly to
8 Helsinki University of Technology 8/21 prevent unauthorized access to important information without proper level of authentication. This means for instance that every application should be configured in the SSO system so that it meets the appropriate security level, which is required for user authentication to that particular application. Due to the centralized management and administration features, changing user credentials or closing down a user account e.g. in case of theft or misuse becomes instantly effective everywhere. If the security levels are defined properly and a bad-willing person has for some reason got some other persons users username and password, and he is trying to access an application which requires higher security level (for example smart card authentication), then the SSO system will ask for smart card authentication before proceeding and letting the bad-willing user enter the application. Hence, SSO is as secure or more secure as before the SSO implementation, and still is more user-friendly and cost-efficient when compared to trying to manage without it. Another risks or possible problem is single point of failure: usually SSO systems provide access through a single point of entry. Aren t there attacks like DoS (Denial of Service) that could bring SSO systems to its knees? Or what if the authentication service fails? Comprehensive SSO systems provide high availability so that single point of failure in the system doesn t affect the whole system behaviour. SSO systems can offer high scalability, availability and load balancing features that reduce the risks and effects of these problems. 1.4 Different levels of single sign-on To have another view on the single sign-on systems subject, look at Figure 4. Figure 4 Different levels of single sign-on
9 Helsinki University of Technology 9/ Intranet single sign-on Intranet SSO is a single sign-on system, which is deployed in an organization or in a community. In this case the SSO system provides access only to on authority like corporate, community or some other organization Extranet single sign-on Extranet SSO is a single sign-on system, which is usually deployed between organizations. As we will see in the Chapter 4.1, the most of the SSO system markets is concentrated on extranet SSO. This is mostly because of that with an extranet SSO solution organizations can cover also intranet SSO related issues. Extranet SSO usually means that there are different security domains and user directories that work within one single sign-on system or with multiple single sign-on systems that work together. Federated single sign-on is the concept name Internet single sign-on Internet SSO is a single sign-on system, which is deployed in the whole Internet. This kind of single sign-on system can be also called as global single sign-on. The most know global SSO system is Microsoft.NET Passport. It is a suite of Web-based services that provides users with single sign-in (SSI, Microsoft term for SSO) and fast purchasing capability at participating sites (Microsoft 2002a). The Liberty Alliance project, which represents another global single sign-on, will provide a federated solution for network identity - enabling ubiquitous single sign-on, decentralized authentication and open authorization. Sun and Nokia are behind Liberty Alliance, among other players (Liberty Alliance Project 2002).
10 Helsinki University of Technology 10/21 2 Single Sign-On Architecture This chapter describes how one SSO system works. There are two levels described: general level and message level. Message level describes more specific the actual message flow between different entities. The architecture described is a specific type of single sign-on system architecture and it represents an architecture model in a general level that is widely common solution in current commercial single sign-on systems. Different implementations differ a lot in message level architecture. 2.1 General level architecture Typically SSO system is divided in two parts: SSO server and application components, also called as web agents (Figure 5). SINGLE SIGN-ON SERVER AUTHENTICATION DEVICE WEB BROWSER USER DIRECTORY WEB AGENT APPLICATION APPLICATION OR WEB APPLICATION SERVER OR WEB SERVER OR WEB SERVER Figure 5 Typical single sign-on system architecture overview SSO server keeps track of the authenticated users, the applications the users use and it works together with web agents to handle initial authentication and single sign-on procedures. SSO server gets the user information from user directory and passes the username and other user specific user information to applications. SSO server and user directory communicate usually with LDAP. Web agents are small HTTP filter-modules attached into application or web server. They control the HTTP-requests that end-users send to web/application server and initialize the authentication if the end user hasn t been authenticated
11 Helsinki University of Technology 11/21 yet. They make sure that only the authorized users HTTP requests are passed to the applications. Web agents communicate with the SSO server through the end-user web client using ordinary WWW technologies; HTTP redirects, URL query strings, and Cookies. When considering the end-user requirements, they only need a HTTP browser that supports SSL (Secure Socket Layer protocol) and JavaScripts. 2.2 Message level architecture Tickets Encrypted tickets work as tickets to enter to applications and SSO servers. To implement both single sign-on authentication to all applications that work within one single sign-on system, and a single application level sign-on, there are two types of tickets: server tickets and agent tickets. Server tickets are SSO server specific tickets which grant access to whole single sign-on system. Agent tickets are web agent specific tickets which grant access to one web server or web application which works behind one specific URL. The tickets are encrypted using symmetric block cipher Triple-DES (3DES), with Cipher Block Chaining (CBC) mode, and only the entities possessing the key, usually only web agents and SSO server, are able to read the information. Message integrity is accomplished using cryptographic SHA-1 digests of the exchanged information. The digests are part of the ticket, and thus encrypted when exchanged in the network (Nykänen 2002: 35) Initial authentication End-user enters first the web application URL to his browser (Figure 6). Then web agent #1, which is attached to web application, catches the HTTP-request and notices that there is no valid agent ticket in the browser. Browser is redirected to SSO server which checks first if there is a valid server ticket. If not, the SSO server opens a secure SSL connection with the browser and authenticates the user. Authentication method could be configured based on user preferences, application preferences or based on any other data. After successful user authentication the SSO servers generates both the encrypted server ticket and encrypted application ticket. Application ticket contains always some information about the user, usually user name that the application can make sure who the user really is. SSO server will then redirect the browser back to the original web application. Web agent catches again the HTTP-request and notices now that there is a valid
12 Helsinki University of Technology 12/21 application ticket. Web agent decrypts the ticket and generates a cookie for the browser. The cookie contains now the information from the ticket like username and application specific parameters. Now the redirected HTTP-request will be passed through the web agent till to the web server, and user can normally start user the web application Single sign-on authentication Now the user wants to access another web application during the same session. He enters another URL and now web agent #2 catches the HTTP-request (Figure 7). Again, there is no valid application ticket and the browser is redirected to the SSO server. SSO server check first if there is a valid server ticket and now it is found. Figure 6 Sequence diagram of initial authentication procedure (Stenius 2002)
13 Helsinki University of Technology 13/21 Figure 7 Sequence diagram of authentication procedure with single sign-on Logout There are three ways to log out from this SSO system. The credentials, server ticket and application tickets have a limited lifetime. If user s server ticket has expired, new application tickets can no longer be acquired without interactive authentication. Thus, by the time the server ticket and application tickets have expired, the user will be logged out. The cookies used by the SSO server are by default session cookies. This means that they are not stored permanently to a hard drive or anything, and are removed from computer s memory when the browser application is closed. As long as only session cookies are used, a simple way to log out of the system is to close the browser. There is also a third way to log out of the system. The server ticket of the user contains a list of applications the user is logged in, and information on how to log out of each specific application. Since SSO system credentials are at the end stored in cookies bound to the specific domains and paths where the web agents reside, the logout can be accomplished by removal of all of these cookies. This is accomplished by a HTTP request that removes the cookies (Nykänen 2002: 43-44).
14 Helsinki University of Technology 14/21 3 Single Sign-On Deployment This chapter will shortly introduce the different factors that must be considered when deploying SSO system. 3.1 Before deployment Before the installation the organization s IT infrastructure must be reviewed in order to plan and specify how SSO system will be used in the organization. If the organization security policy is defined appropriately, it will give most of the guidelines for the SSO system deployment. Some of the most important things that have to be decided are: - Is the SSO server going to be installed in the organization premises or is it going to be used a remote service? - Is there a centralized user directory or database ready to use or is it going to be created separately as part of the deployment? - What users and groups are there in the organization? - What are the web applications and web pages or content to be secured with SSO system and what technology does those applications and web pages use? - Are the current web applications using some authentication method and do they use common platform specific methods for getting the user information and other parameters? - What authentication methods will be used with the SSO system? - What users can access to what applications? - What authentication method(s) are required for the applications? - Are there any non-web applications that are going to use SSO system? After this initial review there will be established a plan which covers at least these issues. 3.2 The actual installation Thanks to SSO system architecture and easy web agent deployment, the actual installation is usually very straightforward and an easy task to accomplish (Figure 8). In deployment two things are needed: SSO server installation and web agent configuration. If the SSO server will be used as a service, then only web agent installation is needed.
15 Helsinki University of Technology 15/21 To do that we also need to know what kind of applications (and server which runs them) are going to be part of the SSO system because the web agents are platform specific. Normally the SSO server will be installed in DMZ. The idea of DMZ is to have a protected area for the external services. That usually means that there are double-firewalls against the Internet. The organization side firewall will enable the updates to the WWW-servers, but no other traffic. The outbound firewall will protect the services from getting vandalised or intruded from outside GET READY SSO server installation OR SSO server cervice configuration SET Web Agent configuration AND/OR Application(s) configuration GO Web Applications and services are using SSO system Figure 8 SSO system deployment can be very straightforward 3.3 Web agent installation This chapter describes how web agents are configured in Microsoft IIS web server. All web agents have same parameters, which typically are: - Application ID - Secret between application and SSO server - SSO server s URL First the web agent has to be installed and the parameters above have to be set. After successful installation, login information is transmitted from web agent (ISAPI filter in this case) to the application in "ServerVariables" variable named as REMOTE_USER. ISAPI filters are programs that respond when the Web server receives an HTTP request (Microsoft 2002b).
16 Helsinki University of Technology 16/21 If JavaScript is in use in ASP-code, the login id can be called with function Request.ServerVariables("REMOTE_USER"). Below is ASP-code that prints user s user ID in a browser. Applications can use this example to get the login id to the application with JavaScript. EnableSessionState=False %> <h1>welcome!</h1> <p>you have been authenticated as <b><%= Server.HTMLEncode(Request.ServerVariables("REMOTE_USER")) %></b>.</p> This is a web server specific standard to pass user information to web applications, and all other web agents use same kind of platform specific standards.
17 Helsinki University of Technology 17/21 4 Single Sign-On Markets This chapter discusses briefly about the current SSO system market, growth prospects and main players. There is also one commercial business case description. 4.1 Single sign-on markets and players The most activity of SSO markets has been seen on solutions for managing user access to e-business web sites. The markets are also called as extranet access management (Pescatore 2002). According to Pescatore (2002), there were 11 main players in January 2002 (Figure 9): Netegrity, IBM, RSA Security, Oblix, Entrust, Novell, Open Network Technologies, Entegrity, Baltimore Technologies, Vasco and Wipro. Figure 9 Key players in Extranet Access Management (EAM) market (Pescatore 2002) Market is described as immature and volatile. Netegrity is clearly seen as market leader but it faces hard competition from vendors like IBM especially. Netegrity has over 400 SSO system customers (Allan 2001).
18 Helsinki University of Technology 18/ Market trends Single sign-on systems are becoming more and more common all the time. The main drivers for their success are evolving authentication methods, standardized application interfaces, the need of making IT systems more effective in heterogeneous IT infrastructure and because of that, the security needs are higher every day. One clear trend outside business world is that consumers want also single signon. To be able to use a single user ID and password in different web sites is very important to 54 percent of the online users. More than 80 percent of online consumers register with web sites occasionally or frequently, so they need to remember multiple user ID/password combinations. (Litan 2002) 4.3 Commercial business case VVO is a Finnish limited company providing housing services. VVO provides rented accommodation, right-of-occupancy homes and part-ownership homes. VVO has about 500 employees. VVO has deployed a SSO system for the intranet and extranet services. The system enables the staff to authenticate and work securely as remote users through www-browser. The system consists of SSO server and web servers that have web agents installed. The SSO server resides in DMZ (Demilitarized Zone). Authentication to VVO system is possible with different authentication methods, such as traditional password, one-time passwords, smartcards and SMS. In this way the solution offers versatile possibilities to deploy a security policy that takes into consideration variable needs in the organization as well as users different needs and expectations. In addition to strong user authentication, SSO system enables single sign-on between different technology platforms and applications. SSO system makes it possible for VVO employees to authenticate themselves to intranet applications, such as web-based remotely. Before, the applications were accessible only within VVO s own premises. With the single sign-on solution VVO can offer its interest groups and customers the possibility to exploit new services in a secure and user-friendly way with optimal solution options.
19 Helsinki University of Technology 19/21 5 Summary Single sign-on systems are solutions that permit an end-user to prove his/her identity in order to obtain access to multiple web-applications. SSO systems support also several authentication methods ranging from password-based identification to certificate and possible to SMS, smart card or other authentication methods. Besides usability issues, the current technological and economical trends argue for SSO system deployment. The continuously growing market is a clear indication that SSO will take its place. Global single sign-on systems like Microsoft Passport and Liberty Alliance increase people consciousness about the benefits of SSO systems, and will lead to a situation where commercial SSO systems will interoperate with these global SSO systems. This trend is not technology-driven, but based on real needs and benefits. The bottom issues is that, if properly deployed, SSO will increase usability AND security, both in the same time.
20 Helsinki University of Technology 20/21 6 References, links and abbreviations 6.1 References Allan, Ant. (2001) Netegrity SiteMinder Extranet Access Management (EAM) Product. Gartner. Hursti, Jani (1997). Single Sign-On < /1997/single_sign-on.html> Liberty Alliance Project (2002) < Litan, A. (2001) Microsoft Passport: Build It and They Will Haltingly Come. California Lutheran University Microsoft (2002a)..NET Passport Overview < Haller N, Bellcore, C. Metz, P. Nesser, M. Straw, Bellcore (1998). A One-Time Password System. RFC 2298 The Internet Society < Microsoft (2002b). Installing ISAPI Filters < 0/en/server/iis/htm/core/iiwarndg.htm> Nykänen, Toni (2002). Secure Cross-Platform Single Sign-On Solution for the Current World-Wide Web Pescatore, J. Extranet Access Management 2H01 Magic Quadrant. Gartner Stenius, Petteri (2002) Unpublished requirement specification, Innopoli, Espoo The Finnish Centre for Technical Terminology (TSK) a < The Finnish Centre for Technical Terminology (TSK) b <
21 Helsinki University of Technology 21/ Abbreviations 3DES AAA CBC DMZ DoS EAM HTTP LDAP OTP PKI SAML SHA-1 SMS SSI SSL SSO STK URL WWW Triple-DES Authorisation, Access Control, Accounting Cipher Block Chaining Demilitarised Zone Denial of Service Extranet Access Management Hypertext Transfer Protocol Lightweight Directory Access Protocol One-Time Passwords Public Key Infrastructure Security Assertion Mark-up Language Secure Hash Algorithm Short Message Service Single Sign-In Secure Sockets Layer Single Sign-On SIM Toolkit Universal Resource Locator World Wide Web
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Single Sign-On. Security and comfort can be friend. Arnd Langguth. [email protected]. September, 2006
Single Sign-On Security and comfort can be friend. Arnd Langguth [email protected] September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Single Sign-On in PHP & HATS Applications using Hashed Cookies
Single Sign-On in PHP & HATS Applications using Hashed Cookies Royal Cyber Inc. Modernized e-business solutions 1 Modernized e-business solutions Royal Cyber Inc. Overview This white paper focuses on how
DIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK
Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02
IGG-01152003-02 J. Pescatore, R. Wagner Article 15 January 2003 CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 CIOs and many other executives are interested in insights on how
SAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September 2007. Trianz 2008 White Paper Page 1
White Paper Authentication and Access Control - The Cornerstone of Information Security Vinay Purohit September 2007 Trianz 2008 White Paper Page 1 Table of Contents 1 Scope and Objective --------------------------------------------------------------------------------------------------------
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
OVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
TFS ApplicationControl White Paper
White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets
Hosting topology SMS PASSCODE 2015
Hosting topology SMS PASSCODE 2015 Hosting Topology In a hosting environment, you have a backend and a several front end (clients). In the example below, there is a backend at the right side. At the left
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Enterprise Knowledge Platform
Enterprise Knowledge Platform Single Sign-On Integration with Windows Document Information Document ID: EN136 Document title: EKP Single Sign-On Integration with Windows Version: 1.3 Document date: 19
PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?
Executive Summary As the leader in Wide Area Application Delivery, Blue Coat products accelerate and secure applications within your WAN and across the Internet. Blue Coat provides a robust and flexible
Federated Identity in the Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Approaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
Research and Implementation of Single Sign-On Mechanism for ASP Pattern *
Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
Controlling Web Access with BMC Web Access Manager WHITE PAPER
Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
Qualtrics Single Sign-On Specification
Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
BlueCoat s Guide to Authentication V1.0
BlueCoat s Guide to Authentication V1.0 Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service names are
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
Safeguarding the Corporate Portal: A Review of Portal Security
Safeguarding the Corporate Portal: A Review of Portal Security by Colin J. White DataBase Associates Version 1, January 2001 Sponsored by Viador Inc. DataBase Associates TABLE OF CONTENTS PORTAL SECURITY:
QLIKVIEW MOBILE SECURITY
QLIKVIEW MOBILE SECURITY QlikView Technical Brief Published: March, 2011 qlikview.com QlikView Mobile Security Mobile devices are convenient, versatile and, for many employees, they are indispensable.
Integrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach Multi-factor Authentication Layer v.3.2-003 PortalGuard dba PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail:
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
IIS SECURE ACCESS FILTER 1.3
OTP SERVER INTEGRATION MODULE IIS SECURE ACCESS FILTER 1.3 Copyright, NordicEdge, 2006 www.nordicedge.se Copyright, 2006, Nordic Edge AB Page 1 of 14 1 Introduction 1.1 Overview Nordic Edge One Time Password
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
Ubilogin SSO. Product Description. Copyright Ubisecure Solutions, Inc., All rights reserved.
Ubilogin SSO Product Description Copyright Ubisecure Solutions, Inc., All rights reserved. 1. Introduction... 3 2. Ubilogin SSO components... 5 2.1. Ubilogin Authentication Server... 5 Management... 5
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
