Single Sign-On Systems

Size: px
Start display at page:

Download "Single Sign-On Systems"

Transcription

1 Helsinki University of Technology Telecommunications Software and Multimedia Laboratory Research Seminar in Telecommunications Business I T Single Sign-On Systems Tomi Määttänen 45342K

2 Helsinki University of Technology 2/21 1 INTRODUCTION ABOUT THIS PAPER SINGLE SIGN-ON SYSTEM FEATURES OVERVIEW Single sign-on functionality and auditing Authentication with different security levels Centralized security policy and user management WHY SINGLE SIGN-ON? Single sign-on benefits Single sign-on problems DIFFERENT LEVELS OF SINGLE SIGN-ON Intranet single sign-on Extranet single sign-on Internet single sign-on SINGLE SIGN-ON ARCHITECTURE GENERAL LEVEL ARCHITECTURE MESSAGE LEVEL ARCHITECTURE Tickets Initial authentication Single sign-on authentication Logout SINGLE SIGN-ON DEPLOYMENT BEFORE DEPLOYMENT THE ACTUAL INSTALLATION WEB AGENT INSTALLATION SINGLE SIGN-ON MARKETS SINGLE SIGN-ON MARKETS AND PLAYERS MARKET TRENDS COMMERCIAL BUSINESS CASE SUMMARY REFERENCES, LINKS AND ABBREVIATIONS REFERENCES ABBREVIATIONS...21

3 Helsinki University of Technology 3/21 1 Introduction 1.1 About this paper This paper is written for Helsinki University of Technology and Research seminar on telecommunication business. The goal of this paper is to describe the idea and technology behind single sign-on systems (SSO) that work in web environment, and discuss its deployment issues, and markets. The following topics will be covered: - How does the typical SSO system architecture work - What are the factors must be considered when deploying SSO system - SSO market, growth prospects and main players - One commercial business case It should be noted that this is only descriptive and introductive document for the seminar presentation. This paper doesn t help developers to implement and administrators to deploy single sign-on systems and it doesn t contain full details of single sign-on technologies. Only one specific type of single sign-on system architecture will be introduced, though it represents architecture in a general level that is widely common solution in current commercial single signon systems. 1.2 Single sign-on system features overview Single sign-on system, later SSO system, is a solution that brings different features to the IT infrastructure where it will be deployed. It enables different issues involving authentication, authorization and auditing (AAA), for most important factors being: - Single sign-on functionality and auditing - Authentication with different security levels - Centralized security policy and user management (authorization)

4 Helsinki University of Technology 4/21 Authori- zation Authen- tication User manage- ment Accounting Audit Trend Cost analysis allocation Billing Figure 1 The key domains of single sign-on systems Single sign-on functionality and auditing The most obvious feature is of course the actual single sign-on functionality. Single sign-on is a concept where in contrast of users having multiple user id and password pairs or other authentication methods to different services and applications, they can now access all those applications and services through a single point of entry (The Finnish Centre for Technical Terminology, 2002b). The auditing or accounting part takes care of logging, auditing functions and possibly gathering billing information. SSO systems can usually provide reporting facilities so that all significant security events (such as user authentications, authorizations, etc.) can be tracked and logged for administrator analysis. The value of this kind of security feature can be significant when all or most of the organization systems are working in a SSO system Authentication with different security levels Authentication is a method by which the identity of a user, an application, a device etc. is identified by a service provider. Authentication is usually followed by authorization (The Finnish Centre for Technical Terminology, 2002a). In a SSO system it is possible to require specific authentication methods for different applications and for different users. SSO system can usually enable single sign-on user authentication using one or a selection of different authentication methods like username and password, one-time passwords (Haller et al. 1998), smart card (or other client certificate), or SMS messages

5 Helsinki University of Technology 5/21 (plain text or signed with STK application). The task is to choose authentication methods that best serve the needs of the application or user level in question. Security Light Mediu High Traditional Username and Password Plain SMS (+ PIN) Smart Card etc. Client Certificate (PKI) Software Client Certificate (PKI) One-Time Passwords generated a mobile devic Digitally signed SMS Symmetric or (PKI)cryptograp Figure 2 Different levels of authentication Centralized security policy and user management SSO systems enable centralized security policy and user management for different applications. Authorization is the concept that covers partly these issues. Authorization is the process of dictating who is to use which resources, and under what kind of conditions. The SSO system administrator is able to control passwords and authorization information related to different users, user groups and applications. Part of the user management tasks can also be managed in a distributed set-up if necessary, e.g. by persons that are responsible for other organization unit authorization. 1.3 Why single sign-on? The features described in chapter 1.2 gives some obvious reasons why single sign-on system deployment can be justified. The discussion in this chapter will deepen the subject. Single sign-on is one key part in data security, which can at the same time increase user experience, ease administration and save costs. Users are today overwhelmed by having to memorize a growing number of user-id and password pairs, as they use various network services and applications. This fact

6 Helsinki University of Technology 6/21 can even mean that users don t start using new services at all or use them only a few times. Numerous users who have forgotten their password also continuously contact support services and helpdesks, hence generating unnecessary costs and dissatisfaction. Usability and deployment issues are often in clear contradiction to the security aspects. However both these areas can be answered and served well utilizing single sign-on systems. Yet, the authentication security and trust levels are favourable both for the end-user and for the administrators of the system. SSO systems can offer fast and efficient deployment and provide efficient enabling tools and information for personalization of web-services, web-application like e-commerce and m-commerce applications. Corporations and other organizations today see security as a must especially for those who want to create and maintain their confidential relationships with customers, partners and subcontractors. User authentication is a key success factor to enable e-business. Strong authentication is not considered an additional security insurance-like feature anymore, but rather an enabling IT infrastructure part that plays an important role when building foe example business relationships in networks. And why are we here? According to Hursti (1997) (Figure 3), there are growing knowledge requirements concerning threats towards digital information. In the figure there is seen a complexity of networked applications that require security and the complexity of the security solutions. To cope with these complex systems the organizations need tools to manage the complexity. Single Sign-On SSO is an answer to these needs. Figure 3 The Development of the Security Business Segments as a Response for the Increasing Needs of Networked Applications (Hursti 1997)

7 Helsinki University of Technology 7/ Single sign-on benefits SSO systems can offer user authentication and single sign-on capabilities to any web-based application. Some of the most important benefits provided by SSO systems are the ability to centralize user management, authentication, authorization and auditing, as well as to utilize many different authentication methods. Through SSO system capabilities, users may authenticate across multiple applications on a web environment, without encountering a separate log-on screen for each application thus allowing access to all organization assets with a single ID and password combination or with other centralized deployed authentication method. When organizations adopt a centralized security infrastructure, they eliminate the need for application-specific security implementations and security business logic, thereby reducing development and maintenance costs from other web applications. SSO systems make applications development simpler, as the developer can write code that relies on the SSO systems user and group management features, rather than developing unique user management systems for each application. SSO systems can also reduce the costs of IT-administration as well as other user-data administration costs. They reduce the number of help desk calls from users wanting password resets because they forgot a password. It also makes it simple to disable a terminated user's access to all organization applications by disabling a single account. SSO systems enable organizations to centrally manage all user authentications and all user access control following organizational-wide security policies. SSO systems enable e.g. that an application, which provides users with some critical information, may require stronger authentication schemes than other more casual applications. That is, authentication can be deployed based application, user and content. The simplest use of SSO system authentication might simply concern access to web or extranet pages holding some confidential information Single sign-on problems Is there a downside of SSO that, once you have signed on, you can access every application? This means that once a bad-willing person has signed on he can access everything, whereas if you didn t have SSO, he would just be able to access a part of the network. So the authentication at the front door has to be very good for SSO to be widely accepted. This is an obvious and often asked question. SSO will not be a downside and lower the security IF the organisation security policy is defined properly to

8 Helsinki University of Technology 8/21 prevent unauthorized access to important information without proper level of authentication. This means for instance that every application should be configured in the SSO system so that it meets the appropriate security level, which is required for user authentication to that particular application. Due to the centralized management and administration features, changing user credentials or closing down a user account e.g. in case of theft or misuse becomes instantly effective everywhere. If the security levels are defined properly and a bad-willing person has for some reason got some other persons users username and password, and he is trying to access an application which requires higher security level (for example smart card authentication), then the SSO system will ask for smart card authentication before proceeding and letting the bad-willing user enter the application. Hence, SSO is as secure or more secure as before the SSO implementation, and still is more user-friendly and cost-efficient when compared to trying to manage without it. Another risks or possible problem is single point of failure: usually SSO systems provide access through a single point of entry. Aren t there attacks like DoS (Denial of Service) that could bring SSO systems to its knees? Or what if the authentication service fails? Comprehensive SSO systems provide high availability so that single point of failure in the system doesn t affect the whole system behaviour. SSO systems can offer high scalability, availability and load balancing features that reduce the risks and effects of these problems. 1.4 Different levels of single sign-on To have another view on the single sign-on systems subject, look at Figure 4. Figure 4 Different levels of single sign-on

9 Helsinki University of Technology 9/ Intranet single sign-on Intranet SSO is a single sign-on system, which is deployed in an organization or in a community. In this case the SSO system provides access only to on authority like corporate, community or some other organization Extranet single sign-on Extranet SSO is a single sign-on system, which is usually deployed between organizations. As we will see in the Chapter 4.1, the most of the SSO system markets is concentrated on extranet SSO. This is mostly because of that with an extranet SSO solution organizations can cover also intranet SSO related issues. Extranet SSO usually means that there are different security domains and user directories that work within one single sign-on system or with multiple single sign-on systems that work together. Federated single sign-on is the concept name Internet single sign-on Internet SSO is a single sign-on system, which is deployed in the whole Internet. This kind of single sign-on system can be also called as global single sign-on. The most know global SSO system is Microsoft.NET Passport. It is a suite of Web-based services that provides users with single sign-in (SSI, Microsoft term for SSO) and fast purchasing capability at participating sites (Microsoft 2002a). The Liberty Alliance project, which represents another global single sign-on, will provide a federated solution for network identity - enabling ubiquitous single sign-on, decentralized authentication and open authorization. Sun and Nokia are behind Liberty Alliance, among other players (Liberty Alliance Project 2002).

10 Helsinki University of Technology 10/21 2 Single Sign-On Architecture This chapter describes how one SSO system works. There are two levels described: general level and message level. Message level describes more specific the actual message flow between different entities. The architecture described is a specific type of single sign-on system architecture and it represents an architecture model in a general level that is widely common solution in current commercial single sign-on systems. Different implementations differ a lot in message level architecture. 2.1 General level architecture Typically SSO system is divided in two parts: SSO server and application components, also called as web agents (Figure 5). SINGLE SIGN-ON SERVER AUTHENTICATION DEVICE WEB BROWSER USER DIRECTORY WEB AGENT APPLICATION APPLICATION OR WEB APPLICATION SERVER OR WEB SERVER OR WEB SERVER Figure 5 Typical single sign-on system architecture overview SSO server keeps track of the authenticated users, the applications the users use and it works together with web agents to handle initial authentication and single sign-on procedures. SSO server gets the user information from user directory and passes the username and other user specific user information to applications. SSO server and user directory communicate usually with LDAP. Web agents are small HTTP filter-modules attached into application or web server. They control the HTTP-requests that end-users send to web/application server and initialize the authentication if the end user hasn t been authenticated

11 Helsinki University of Technology 11/21 yet. They make sure that only the authorized users HTTP requests are passed to the applications. Web agents communicate with the SSO server through the end-user web client using ordinary WWW technologies; HTTP redirects, URL query strings, and Cookies. When considering the end-user requirements, they only need a HTTP browser that supports SSL (Secure Socket Layer protocol) and JavaScripts. 2.2 Message level architecture Tickets Encrypted tickets work as tickets to enter to applications and SSO servers. To implement both single sign-on authentication to all applications that work within one single sign-on system, and a single application level sign-on, there are two types of tickets: server tickets and agent tickets. Server tickets are SSO server specific tickets which grant access to whole single sign-on system. Agent tickets are web agent specific tickets which grant access to one web server or web application which works behind one specific URL. The tickets are encrypted using symmetric block cipher Triple-DES (3DES), with Cipher Block Chaining (CBC) mode, and only the entities possessing the key, usually only web agents and SSO server, are able to read the information. Message integrity is accomplished using cryptographic SHA-1 digests of the exchanged information. The digests are part of the ticket, and thus encrypted when exchanged in the network (Nykänen 2002: 35) Initial authentication End-user enters first the web application URL to his browser (Figure 6). Then web agent #1, which is attached to web application, catches the HTTP-request and notices that there is no valid agent ticket in the browser. Browser is redirected to SSO server which checks first if there is a valid server ticket. If not, the SSO server opens a secure SSL connection with the browser and authenticates the user. Authentication method could be configured based on user preferences, application preferences or based on any other data. After successful user authentication the SSO servers generates both the encrypted server ticket and encrypted application ticket. Application ticket contains always some information about the user, usually user name that the application can make sure who the user really is. SSO server will then redirect the browser back to the original web application. Web agent catches again the HTTP-request and notices now that there is a valid

12 Helsinki University of Technology 12/21 application ticket. Web agent decrypts the ticket and generates a cookie for the browser. The cookie contains now the information from the ticket like username and application specific parameters. Now the redirected HTTP-request will be passed through the web agent till to the web server, and user can normally start user the web application Single sign-on authentication Now the user wants to access another web application during the same session. He enters another URL and now web agent #2 catches the HTTP-request (Figure 7). Again, there is no valid application ticket and the browser is redirected to the SSO server. SSO server check first if there is a valid server ticket and now it is found. Figure 6 Sequence diagram of initial authentication procedure (Stenius 2002)

13 Helsinki University of Technology 13/21 Figure 7 Sequence diagram of authentication procedure with single sign-on Logout There are three ways to log out from this SSO system. The credentials, server ticket and application tickets have a limited lifetime. If user s server ticket has expired, new application tickets can no longer be acquired without interactive authentication. Thus, by the time the server ticket and application tickets have expired, the user will be logged out. The cookies used by the SSO server are by default session cookies. This means that they are not stored permanently to a hard drive or anything, and are removed from computer s memory when the browser application is closed. As long as only session cookies are used, a simple way to log out of the system is to close the browser. There is also a third way to log out of the system. The server ticket of the user contains a list of applications the user is logged in, and information on how to log out of each specific application. Since SSO system credentials are at the end stored in cookies bound to the specific domains and paths where the web agents reside, the logout can be accomplished by removal of all of these cookies. This is accomplished by a HTTP request that removes the cookies (Nykänen 2002: 43-44).

14 Helsinki University of Technology 14/21 3 Single Sign-On Deployment This chapter will shortly introduce the different factors that must be considered when deploying SSO system. 3.1 Before deployment Before the installation the organization s IT infrastructure must be reviewed in order to plan and specify how SSO system will be used in the organization. If the organization security policy is defined appropriately, it will give most of the guidelines for the SSO system deployment. Some of the most important things that have to be decided are: - Is the SSO server going to be installed in the organization premises or is it going to be used a remote service? - Is there a centralized user directory or database ready to use or is it going to be created separately as part of the deployment? - What users and groups are there in the organization? - What are the web applications and web pages or content to be secured with SSO system and what technology does those applications and web pages use? - Are the current web applications using some authentication method and do they use common platform specific methods for getting the user information and other parameters? - What authentication methods will be used with the SSO system? - What users can access to what applications? - What authentication method(s) are required for the applications? - Are there any non-web applications that are going to use SSO system? After this initial review there will be established a plan which covers at least these issues. 3.2 The actual installation Thanks to SSO system architecture and easy web agent deployment, the actual installation is usually very straightforward and an easy task to accomplish (Figure 8). In deployment two things are needed: SSO server installation and web agent configuration. If the SSO server will be used as a service, then only web agent installation is needed.

15 Helsinki University of Technology 15/21 To do that we also need to know what kind of applications (and server which runs them) are going to be part of the SSO system because the web agents are platform specific. Normally the SSO server will be installed in DMZ. The idea of DMZ is to have a protected area for the external services. That usually means that there are double-firewalls against the Internet. The organization side firewall will enable the updates to the WWW-servers, but no other traffic. The outbound firewall will protect the services from getting vandalised or intruded from outside GET READY SSO server installation OR SSO server cervice configuration SET Web Agent configuration AND/OR Application(s) configuration GO Web Applications and services are using SSO system Figure 8 SSO system deployment can be very straightforward 3.3 Web agent installation This chapter describes how web agents are configured in Microsoft IIS web server. All web agents have same parameters, which typically are: - Application ID - Secret between application and SSO server - SSO server s URL First the web agent has to be installed and the parameters above have to be set. After successful installation, login information is transmitted from web agent (ISAPI filter in this case) to the application in "ServerVariables" variable named as REMOTE_USER. ISAPI filters are programs that respond when the Web server receives an HTTP request (Microsoft 2002b).

16 Helsinki University of Technology 16/21 If JavaScript is in use in ASP-code, the login id can be called with function Request.ServerVariables("REMOTE_USER"). Below is ASP-code that prints user s user ID in a browser. Applications can use this example to get the login id to the application with JavaScript. EnableSessionState=False %> <h1>welcome!</h1> <p>you have been authenticated as <b><%= Server.HTMLEncode(Request.ServerVariables("REMOTE_USER")) %></b>.</p> This is a web server specific standard to pass user information to web applications, and all other web agents use same kind of platform specific standards.

17 Helsinki University of Technology 17/21 4 Single Sign-On Markets This chapter discusses briefly about the current SSO system market, growth prospects and main players. There is also one commercial business case description. 4.1 Single sign-on markets and players The most activity of SSO markets has been seen on solutions for managing user access to e-business web sites. The markets are also called as extranet access management (Pescatore 2002). According to Pescatore (2002), there were 11 main players in January 2002 (Figure 9): Netegrity, IBM, RSA Security, Oblix, Entrust, Novell, Open Network Technologies, Entegrity, Baltimore Technologies, Vasco and Wipro. Figure 9 Key players in Extranet Access Management (EAM) market (Pescatore 2002) Market is described as immature and volatile. Netegrity is clearly seen as market leader but it faces hard competition from vendors like IBM especially. Netegrity has over 400 SSO system customers (Allan 2001).

18 Helsinki University of Technology 18/ Market trends Single sign-on systems are becoming more and more common all the time. The main drivers for their success are evolving authentication methods, standardized application interfaces, the need of making IT systems more effective in heterogeneous IT infrastructure and because of that, the security needs are higher every day. One clear trend outside business world is that consumers want also single signon. To be able to use a single user ID and password in different web sites is very important to 54 percent of the online users. More than 80 percent of online consumers register with web sites occasionally or frequently, so they need to remember multiple user ID/password combinations. (Litan 2002) 4.3 Commercial business case VVO is a Finnish limited company providing housing services. VVO provides rented accommodation, right-of-occupancy homes and part-ownership homes. VVO has about 500 employees. VVO has deployed a SSO system for the intranet and extranet services. The system enables the staff to authenticate and work securely as remote users through www-browser. The system consists of SSO server and web servers that have web agents installed. The SSO server resides in DMZ (Demilitarized Zone). Authentication to VVO system is possible with different authentication methods, such as traditional password, one-time passwords, smartcards and SMS. In this way the solution offers versatile possibilities to deploy a security policy that takes into consideration variable needs in the organization as well as users different needs and expectations. In addition to strong user authentication, SSO system enables single sign-on between different technology platforms and applications. SSO system makes it possible for VVO employees to authenticate themselves to intranet applications, such as web-based remotely. Before, the applications were accessible only within VVO s own premises. With the single sign-on solution VVO can offer its interest groups and customers the possibility to exploit new services in a secure and user-friendly way with optimal solution options.

19 Helsinki University of Technology 19/21 5 Summary Single sign-on systems are solutions that permit an end-user to prove his/her identity in order to obtain access to multiple web-applications. SSO systems support also several authentication methods ranging from password-based identification to certificate and possible to SMS, smart card or other authentication methods. Besides usability issues, the current technological and economical trends argue for SSO system deployment. The continuously growing market is a clear indication that SSO will take its place. Global single sign-on systems like Microsoft Passport and Liberty Alliance increase people consciousness about the benefits of SSO systems, and will lead to a situation where commercial SSO systems will interoperate with these global SSO systems. This trend is not technology-driven, but based on real needs and benefits. The bottom issues is that, if properly deployed, SSO will increase usability AND security, both in the same time.

20 Helsinki University of Technology 20/21 6 References, links and abbreviations 6.1 References Allan, Ant. (2001) Netegrity SiteMinder Extranet Access Management (EAM) Product. Gartner. Hursti, Jani (1997). Single Sign-On < /1997/single_sign-on.html> Liberty Alliance Project (2002) < Litan, A. (2001) Microsoft Passport: Build It and They Will Haltingly Come. California Lutheran University Microsoft (2002a)..NET Passport Overview < Haller N, Bellcore, C. Metz, P. Nesser, M. Straw, Bellcore (1998). A One-Time Password System. RFC 2298 The Internet Society < Microsoft (2002b). Installing ISAPI Filters < 0/en/server/iis/htm/core/iiwarndg.htm> Nykänen, Toni (2002). Secure Cross-Platform Single Sign-On Solution for the Current World-Wide Web Pescatore, J. Extranet Access Management 2H01 Magic Quadrant. Gartner Stenius, Petteri (2002) Unpublished requirement specification, Innopoli, Espoo The Finnish Centre for Technical Terminology (TSK) a < The Finnish Centre for Technical Terminology (TSK) b <

21 Helsinki University of Technology 21/ Abbreviations 3DES AAA CBC DMZ DoS EAM HTTP LDAP OTP PKI SAML SHA-1 SMS SSI SSL SSO STK URL WWW Triple-DES Authorisation, Access Control, Accounting Cipher Block Chaining Demilitarised Zone Denial of Service Extranet Access Management Hypertext Transfer Protocol Lightweight Directory Access Protocol One-Time Passwords Public Key Infrastructure Security Assertion Mark-up Language Secure Hash Algorithm Short Message Service Single Sign-In Secure Sockets Layer Single Sign-On SIM Toolkit Universal Resource Locator World Wide Web

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Leveraging SAML for Federated Single Sign-on:

Leveraging SAML for Federated Single Sign-on: Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

Copyright: WhosOnLocation Limited

Copyright: WhosOnLocation Limited How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

Network Security Essentials Chapter 5

Network Security Essentials Chapter 5 Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

Single Sign-On. Security and comfort can be friend. Arnd Langguth. [email protected]. September, 2006

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006 Single Sign-On Security and comfort can be friend. Arnd Langguth [email protected] September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Agenda. How to configure

Agenda. How to configure [email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

SAML SSO Configuration

SAML SSO Configuration SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

Enhancing Web Application Security

Enhancing Web Application Security Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor

More information

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173 Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Single Sign-On in PHP & HATS Applications using Hashed Cookies

Single Sign-On in PHP & HATS Applications using Hashed Cookies Single Sign-On in PHP & HATS Applications using Hashed Cookies Royal Cyber Inc. Modernized e-business solutions 1 Modernized e-business solutions Royal Cyber Inc. Overview This white paper focuses on how

More information

DIGIPASS as a Service. Google Apps Integration

DIGIPASS as a Service. Google Apps Integration DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About

More information

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Chapter 10. Cloud Security Mechanisms

Chapter 10. Cloud Security Mechanisms Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based

More information

GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK

GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

Transport Layer Security Protocols

Transport Layer Security Protocols SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known

More information

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011 NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity

More information

CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02

CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 IGG-01152003-02 J. Pescatore, R. Wagner Article 15 January 2003 CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 CIOs and many other executives are interested in insights on how

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate

More information

Vidder PrecisionAccess

Vidder PrecisionAccess Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

PrivyLink Internet Application Security Environment *

PrivyLink Internet Application Security Environment * WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.

More information

White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September 2007. Trianz 2008 White Paper Page 1

White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September 2007. Trianz 2008 White Paper Page 1 White Paper Authentication and Access Control - The Cornerstone of Information Security Vinay Purohit September 2007 Trianz 2008 White Paper Page 1 Table of Contents 1 Scope and Objective --------------------------------------------------------------------------------------------------------

More information

USING FEDERATED AUTHENTICATION WITH M-FILES

USING FEDERATED AUTHENTICATION WITH M-FILES M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication

More information

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Understanding Digital Certificates and Secure Sockets Layer (SSL) Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

OVERVIEW. DIGIPASS Authentication for Office 365

OVERVIEW. DIGIPASS Authentication for Office 365 OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility

More information

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House

More information

Perceptive Experience Single Sign-On Solutions

Perceptive Experience Single Sign-On Solutions Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark

More information

API-Security Gateway Dirk Krafzig

API-Security Gateway Dirk Krafzig API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Adding Stronger Authentication to your Portal and Cloud Apps

Adding Stronger Authentication to your Portal and Cloud Apps SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well

More information

TFS ApplicationControl White Paper

TFS ApplicationControl White Paper White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets

More information

Hosting topology SMS PASSCODE 2015

Hosting topology SMS PASSCODE 2015 Hosting topology SMS PASSCODE 2015 Hosting Topology In a hosting environment, you have a backend and a several front end (clients). In the example below, there is a backend at the right side. At the left

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

OpenHRE Security Architecture. (DRAFT v0.5)

OpenHRE Security Architecture. (DRAFT v0.5) OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2

More information

Enterprise Knowledge Platform

Enterprise Knowledge Platform Enterprise Knowledge Platform Single Sign-On Integration with Windows Document Information Document ID: EN136 Document title: EKP Single Sign-On Integration with Windows Version: 1.3 Document date: 19

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?

Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting? Executive Summary As the leader in Wide Area Application Delivery, Blue Coat products accelerate and secure applications within your WAN and across the Internet. Blue Coat provides a robust and flexible

More information

Federated Identity in the Enterprise

Federated Identity in the Enterprise www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Is your data safe out there? -A white Paper on Online Security

Is your data safe out there? -A white Paper on Online Security Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

Research and Implementation of Single Sign-On Mechanism for ASP Pattern *

Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software

More information

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as

More information

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

Controlling Web Access with BMC Web Access Manager WHITE PAPER

Controlling Web Access with BMC Web Access Manager WHITE PAPER Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

Salesforce1 Mobile Security Guide

Salesforce1 Mobile Security Guide Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

Qualtrics Single Sign-On Specification

Qualtrics Single Sign-On Specification Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Siteminder Integration Guide

Siteminder Integration Guide Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with

More information

BlueCoat s Guide to Authentication V1.0

BlueCoat s Guide to Authentication V1.0 BlueCoat s Guide to Authentication V1.0 Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service names are

More information

ISM/ISC Middleware Module

ISM/ISC Middleware Module ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why

More information

Getting Started with AD/LDAP SSO

Getting Started with AD/LDAP SSO Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories

More information

Safeguarding the Corporate Portal: A Review of Portal Security

Safeguarding the Corporate Portal: A Review of Portal Security Safeguarding the Corporate Portal: A Review of Portal Security by Colin J. White DataBase Associates Version 1, January 2001 Sponsored by Viador Inc. DataBase Associates TABLE OF CONTENTS PORTAL SECURITY:

More information

QLIKVIEW MOBILE SECURITY

QLIKVIEW MOBILE SECURITY QLIKVIEW MOBILE SECURITY QlikView Technical Brief Published: March, 2011 qlikview.com QlikView Mobile Security Mobile devices are convenient, versatile and, for many employees, they are indispensable.

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

Contextual Authentication: A Multi-factor Approach

Contextual Authentication: A Multi-factor Approach Contextual Authentication: A Multi-factor Approach Multi-factor Authentication Layer v.3.2-003 PortalGuard dba PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail:

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

IIS SECURE ACCESS FILTER 1.3

IIS SECURE ACCESS FILTER 1.3 OTP SERVER INTEGRATION MODULE IIS SECURE ACCESS FILTER 1.3 Copyright, NordicEdge, 2006 www.nordicedge.se Copyright, 2006, Nordic Edge AB Page 1 of 14 1 Introduction 1.1 Overview Nordic Edge One Time Password

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

IT@Intel. Improving Security and Productivity through Federation and Single Sign-on

IT@Intel. Improving Security and Productivity through Federation and Single Sign-on White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing

More information

Ubilogin SSO. Product Description. Copyright Ubisecure Solutions, Inc., All rights reserved.

Ubilogin SSO. Product Description. Copyright Ubisecure Solutions, Inc., All rights reserved. Ubilogin SSO Product Description Copyright Ubisecure Solutions, Inc., All rights reserved. 1. Introduction... 3 2. Ubilogin SSO components... 5 2.1. Ubilogin Authentication Server... 5 Management... 5

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information