Approaches andchallenges forasingle sign-on enabled extranet usingjasigcas
|
|
|
- Hilary Richardson
- 10 years ago
- Views:
Transcription
1 Approaches andchallenges forasingle sign-on enabled extranet usingjasigcas Florian Holzschuher, René Peinl Institute ofinformationsystems Hof University Alfons-Goppel-Platz Hof [email protected] [email protected] Abstract: In this paper we describe our experiences with setting up a single signon enabled intranet with open source software and then making it accessible over the internet using a reverse proxy. During this process, we encounter several issues. Wedescribethose, discuss possiblesolutions and present our final setup. 1Introduction Companies today often have a multitude of software systems running in their internal networks to support their business processes. For employees the ease of use increases, the more integrated these systems are. However, apart from Microsofts server systems that provide out-of-the-box single sign-on (SSO) inwindows domain environments, itis still not common to have even this basic integration, although Gartner called SSO as part of identity and access management (IAM) solutions a must have for enterprises of all sizes and industries [Wi+03] already in Especially in open source settings things seem complex since there are a large number of technological choices and no clear market leader, so that in many cases only authentication against a central LDAP directoryisconfigured instead of SSO. Our goal was to create an SSO-enabled extranet setup, making as few changes to the software used as possible. In our example, weconnected Apache Rave, XWiki, Alfresco and Zarafa to Jasig CAS in order to provide single sign-on, based on accounts taken from a local LDAP directory service. This way, users only have one global account and only need to log in once per session, granting them access to all connected systems through their web browser. All systems do also share user profile information and report user activitiestoapache Shindiginorder to centrally displaytheminthe Rave portal. Jasig Central Authentication Service (CAS) was chosen as it is a relatively widely adopted open source authentication system, supporting multiple authentication protocols and methods. The rest of the paper is organized as follows. We first describe different SSO technologies and give an overview of some open source implementations. The we 106
2 present our test setup. Afterwards we discuss general issues with the reverse proxy setup and specific issues withsso, before weconclude with adiscussionofresults. 2Singlesign-on technologies SSO can be applied in different scenarios that have different levels of complexity. The probably easiest case is given when all applications are running on the Intranet are using the same runtime environment like a Java application server and are prepared for pluggable authentication [Cl02] like using JAAS in Java, orsap applications inside the Netweaver Application Server [Bo10]. In this case the container is managing authentication and authorization anyway, so it is quite easy to switch the container from the usual LDAP authentication to a central identity provider like CAS. Ideally, you don t have to make any changes on the application side. Pseudo SSO, using client-side technology to store passwords for server applications is not considered here [PM03]. SSO becomes more complicated if you are considering multiple runtime environments like one application running on Java, another on PHP and a third one on ASP.NET for example. You have to either find applications supporting authentication standards of the identity provider (see below) or an identity provider that supports all those (e.g., CAS). An additional level of complexity is added, if you are running your applications in an extranet setup [UB09], using a reverse proxy to relay and rewrite client requests that address a single host, to the multiple machines running the applications (see figure 1). The reverse proxy could be used to pre-authenticate the requests, so that only authenticated users are directed to the single applications [Ha+12]. Since CAS does not support all functionality with Apache Web server 1,wechose CAS filters inside Apache Tomcat runningthe applications. Alot of research has been conducted oneven more complex federated scenarios that enable users across organizations to access to access applications without additional login [CP07], [Ch09]. This requires one identity provider per organization and an established trust relationship, so that security tokens issued by one identity provider are trusted byall the others. SSO can further be achieved using different authentication protocols. These are ideally transparently managed by the SSO system. Kerberos is the predominant standard for SSO in Windows environments [Pr11]. In contrast to NTLM, which is the default authenticationprotocol for Windows, it is able to transfer credentials not only from client to server applications, but also down the road to further systems used by the service provider (e.g. the database). This feature is called delegated authentication. Kerberos can be used in Linux environments as well, although it is not trivial to setup the whole stack consisting of DNS (e.g. Bind), a certificate authority (e.g. OpenSSL), a directory service (e.g. OpenLDAP) and the core component keydistributioncenter (KDC; e.g. Heimdal). The Security Assertion Markup Language (SAML) is mainly used for authenticating against Web services. However, version two includes the Web Browser SSO profile
3 (SAML SSO) designed to authenticate a user against Web applications [Hu+05]. It s an XML-based protocol designed tobeincluded intransport means like SOAP over HTTP and already implemented by some large application providers like Google [Ar+11]. Besides service-oriented architectures (SOA) itismainly discussed for cloud scenarios [Ce+10]. More recently, SAML is frequently accompanied by XACML, in order to provide attribute-based access control, which is amore general form of role-based access control [VDB07]. Emerging from public Web sites like social networks, OpenID was proposed as a means to use an identity from one identity provider for accessing other services [Io12]. However, in the internet OpenID currently suffers from relunctance of relying parties [Su+10] and lack of trust from end users [Su+11]. For authorization, OpenID is often accompanied by OAuth 2.0 [SB12]. OpenID connect is a recent development inthisarea tryingtobetter harmonize bothparts [Bo12]. Finally, in the open source area, a multitude of SSO providers is available, each with tested compatibility to a number of different open source systems. A selection of well knowopensource SSO providersisbriefly compared in table 1and discussed below. Latest version License Protocols CAS, OAuth, OpenID, SAML, Kerberos Authentication backends Runtimes Agents Table1:comparison matrix for open sourcesso solutions Jasig CAS JOSSO WSO2 Id Server Open AM ( ) ( ) ( ) ( ) Jasigs own open LGPL APL v2 CDDL 1.0 source license SAML, OAuth, OpenID, OAuth, SAML, NTLM XACML, Kerberos SAML, (18+), JAAS, LDAP, AD, Radius, JDBC, X.509, Negotiate (Kerberos) Tomcat or other Servlet 2.4 container Spring, MS IIS, JEE, Apache 2.2, PHP, PAM JAAS, LDAP JDBC, two factor auth with WiKID, X.509 JBoss, Tomcat, Websphere, Geronimo, Jetty Apache 2.2, PHP 4+, MS IIS, Liferay, Alfresco, phpbb, Coldfusion, Spring LDAP, JDBC, Cassandra WSO2 server None found AD, Carbon LDAP, AD, two-factor auth with HOTP, Negotiate (Kerberos) Tomcat, JBoss Apache 2.4, MS IIS, Sun Web Server, JBoss, Glassfish, Tomcat, Websphere, Web Logic 108
4 Shibboleth is the implementation of the Internet 2 consortium and specifically designed for federated scenarios [Ch09]. Ituses SAML messages with digital signatures inorder to improve trustworthiness (ibid.). It allows protecting the user s identity by using random pseudonyms for every session. Since both federation and anonymity are not required in our scenario, wedid not consider Shibboleth. Jasig CAS (Central Authentication Service) is a SSO system using its own protocol (also named CAS). However, it also supports SAML and included support for SAML version 2.0 in CAS v dating in October 2012 by updating to OpenSAML 2. It also includes support for OAuth 2.0 and can act both as an OAuth client and delegate authentication to other OAuth servers like Facebook or Google, as well as an own OAuth server to directly authenticate OAuth clients. The basic architecture ofcas is similar to the Kerberos model [Io12]. The CAS protocol also supports ticket proxying, which is similar to the Kerberos delegated authentication. Starting with CAS version 3, it does also support single logout [WY10]. Wechose CAS due to its direct support of Liferay, Moodle and Mule. Other open source SSO systems include JOSSO [AFG06], a completely Java based identity provider that also supports PHP and dotnet service provider and has a nice graphical tool to configure SSO scenarios, the WSO2 Identity Server [SFB10], which is especially interesting when using the family of WSO2 infrastructure products as well as the successor of the Sun OpenSSO framework Forgerock OpenAM [Th11]. We plan on testing some of these in future work. Especially OpenAM in conjunction with the Open IdentityGateway seems apromisingalternative for our scenario. 3Basicsetup Our setup consists of asingle machine with an external IP runninganapache web server that acts as a reverse proxy, a single machine with Jasig CAS and several machines running our service providers, all of which are accessible through web interfaces. All machines are located inside a DMZ behind two firewalls, one towards the internet and one towards our internal network(see figure 1). In contrast to common patterns [So03], we do not separate the proxy from the other machines by an additional firewall, but only use it as a gateway for terminating the SSL connection [Ma99]. The reverse proxy is using a signed certificate, only allowing HTTPS connections and redirecting any unencrypted calls. The Apache Tomcat instance running Jasig CAS is also SSL-enabled to allow for secure ticket validation, but is using aself-signed certificate. We are using AJP for connecting totomcat-based applications. However, that didn t prove much better than a normal http connection (see section 4.2). We did also consider nginx as a replacement for Apache httpd since it is optimized for reverse proxy scenarios and provides an easy to use caching mechanism. Another alternative worth testing would be to use a specialized SSO gateway like the Forgerock Open Identity Gateway [BCN12]. It promises to enable SSO for those 30% of typical Web applications that do not work withthe usual SSO filters or agents. For all connected software systems running inside Apache Tomcat we used the authentication, validation, request wrapping and single sign-out filters provided by CAS. 109
5 These filters together redirect unauthenticated users to the SSO login page, validate incoming tickets and store the authenticated user in their respective sessions. The Apache web server used for the PHP-based Zarafa server is using a CAS authentication module (mod_auth_cas) which also redirects users, evaluates tickets and sets the logged in user for requests. figure 1: system architectureofthe extranet scenario Yet, unless software is prepared for reading the provided session information, an authentication plugin is required, telling the service provider which user is currently logged in. Moreover, the first time a user logs in, a new local user account may have to be created, preferably using user data from the local LDAP server. A random local password should be set at that point to avoid empty local passwords, especially if local login cannot be disabled completely. Since we are using open source software exclusively, we were able to implement suitable plugins for almost all systems we wanted to include. However, in most cases configuration was enough and no programming was necessary. All systems are also connected to an LDAP server in order to retrieve additional user informationlike full name and addressfromit. We also conducted some tests with Android-based smartphones and tablets and found out that Chrome onandroid behavesinthe same wayasits Desktop counterpart. 110
6 4General challenges Running our services through a reverse proxy and with single sign-on filters caused several problems, not all of whichcould be solved completely. 4.1 Platform problems In general, the whole setup has more layers than a normal intranet setup, reducing performance noticeably. We addressed this by keeping rewriting to a minimum and only including paths in the SSO filtering that we were certain needed direct protection or an automatic redirect to a login page. When applicable we were able to achieve slightly better performance by using the binary Apache JServ Protocol (AJP) to connect application servers to the proxying web server, instead of a normal HTTP connection. It did also enhance performance to use nginx instead of Apache and enable its caching. However, the login process is not affected by this caching and nginx needs a plug-in for AJP support instead of supportingitnatively. Some applications had problems with being accessed using HTTPS in their external URL while the reverse proxy accessed them using HTTP. Wewere able tofix this by setting the appropriate parameters in all applications and placing redirects in our web server configuration. When using an HTTP reverse proxy, CAS' login page displays a warning message about an unencrypted connection that will not support SSO, but works anyway. We could eliminate this warning by using even an unencrypted AJP connection. Supplying all applicationand web servers with certificates and reconfiguring the reverse proxy to use SSL may also solve these protocol-related problems, but will result in amore complex setup withslightlylower performance. In terms of usability, we found that unless directly connected via Spring Security, the applications' logout buttons did not work with SSO. They may terminate the application's own session, but with the SSO session still active, the user is immediately logged inagain. This isespecially confusing since CAS provides adedicated single logout (SLO) filter and the client feature matrix states that SLO should work out of the box for all clients, except Spring [Fr12]. It is also tough to correct this behavior programmatically. Although most systems provide an interface to create an authentication plugin, overriding the logout action is usually not available. In any case the question whether a user only wants to log out of a single application or terminate the whole SSO sessionisstill open. Beginning with Java 7,some SSL warnings are treated as errors and cannot beeasily circumvented inside applications. We found that if the name in the certificate and the URL don't match, an unrecognized_name error is detected, which can befixed by including all possible external server names as aliases in the web or application server's configuration. In this context, further problems can be caused by faulty DNS and domain name configuration, causingfurther name mismatches on reverse lookups. 111
7 4.2 Rewriting Depending on which parameters are used for their generation, web pages delivered by proxied web services can contain incorrect URLs referencing other resources. This is caused by the Tomcat server detecting its own machine's external address, incorrectly specified external hostsand contexts differing fromthe local context inside Tomcat. Since we were trying to run all services under sub paths ofour external host to avoid URL collisions, we kept experiencing faulty redirects and incorrect links. One of our approaches was to use the Apache web server's rewriting functionality. It can be used to correct URLs in headers, links, cookies and references to and within other resources such as JavaScript and CSS. As this approach did not produce consistently satisfactory results, we resorted to replicating the sub path structure on all web and Tomcat application servers. This way, we solved most problems concerning URLs and redirects and only had to manually correct some URLs in the applications' resources and configuration and move static resources to their new location if needed. The drawback of this method is having to create static contexts in Tomcat, with a hash tag in its name as a delimiter to denote the sub path. This was still necessary when using AJP instead of http as described below. While using AJP could largely solve the problem of incorrect links and faulty redirects, we found that some applications' resources like CSS files and especially links within JavaScript code were still wrongly referenced. Therefore, additional rewrites or the sub path replication mentioned above were needed in this setup as well. We determined that this problem is based on the fact that applications, when started, use their local context information to generate resource links which are incompatible with the differing context used by the web server. We correctly configured the proxyname and proxyport attributes in the AJP connector but still had those problems. The most notable benefit of AJP was, that CAS was no longer complaining about the unsecured connection between the proxy and the service providers when the secure option in AJP is set totrue. Another interesting configuration option in the AJP connector is called tomcatauthentication and causes the authentication to already be performed on the reverse proxy instead of the connected tomcat application servers. This configuration looks similar to the Forgerock Open Identity Gateway solution. However, in our test, we could not perceive any notable differences compared to authentication using Tomcat, especially regarding performance. The configuration might become a bit easier though. Finally, you can configure encrypting the connection between Apache httpd and Tomcat by configuringapre-shared keyusing AJP s requiresecret option. 4.3 Service accessibility Direct access to applications using their own local administrative accounts, did also prove to be a challenge. After the initial setup, those accounts are often the only way to properly configure applications and delegate permissions to other users. However, the 112
8 filters used to protect services by redirecting unauthenticated users to the CAS login page are blocking access to the applications' own login mechanisms. We found no way to enable both SSO as adefault method and still provide local access for admin users as a fallback. The only option looking promising in CAS is called gateway mode. This mode is attaching tickets to the request for already authenticated users and passing unauthenticated request through to the service provider. However, this mode requires larger changestothe service providers in order tostart the SSO session. One approach we took was creating users with the same IDinthe LDAP directory, preserving for example the user's administration rights in the application. Alternatively, one could manually add or override these rights in the applications' account database for existing LDAP accounts, since the administrationinterface is unavailable. Ofcourse, this approach is not necessarily suitable for productionenvironments. This could be circumvented by storing per-application rights in the LDAP directory, whichsome applications offer asanoption. But this would require all necessary schemas to be incorporated into the directory's structure and additionally writing plug-ins for applications that don't already support this approach. Moreover, we reckon a dedicated authorization system might be a more elegant solution when dealing with a greater number ofsystems. Though, this will require more and possibly more complicated plugins, for whichthere is even less predefined support fromapplications. Another way around this problem is a more sophisticated authentication chain, checking several authentication possibilities before redirecting the user and offering an opt-out functionality for the SSO mechanism. This way at least users knowing their full URL could still log in. For this to work, the SSO login page would need an additional opt-out button which redirects the user to the original page with an additional parameter. This parameter would then be detected by a modified SSO filter and disable or modify the redirect to allowalogin. Theoretically, one could also disable the automatic redirects altogether, making the user choose between a button to log in locally and one to log in using SSO, which triggers the redirect. This modification would be needed for each individual application and would make the fully automated sign-on procedure semi-automatic. Tominizime the usability trade off made by this approach, at least within the comapny the SSO login page could be set as the browsers' starting page, offering the user to log in at the beginningofeach session while still leavingthe optiontoopt out. Furthermore, services will also be used from within a company's network and concerning performance it would be desirable to access them directly, bypassing the reverse proxy. But we found that some applications need to have their external URL specified, which in our example would be pointing to the reverse proxy. Thus accessing applications directly can cause inconsistent web pages being generated, with resources beingreferenced internally as well as externally or possiblywithanincorrect URL. 113
9 5Specificproblems With Jasig CAS we encountered the problem that the certificate used for its Tomcat server needs to have the subject alternate name set correctly. While we could fix this for our self-signed certificates by generating them accordingly, CAS would not work with the existing certificate used by our reverse proxy server, since it lacks this parameter. To generate a suitable certificate using Java's keytool, Java version 7 is needed, so one needs to be careful when doing so as still many applications only work properly when using Java version 6. When trying to connect our Apache Rave portal to its back-end, Apache Shindig, we realized that it was not easily possible to authenticate against CAS and maintain a SSO session, i.e. simulate a user, from Java code, to access the service protected by the CAS filters. The SSO setup we chose is designed to be used from a web browser and although the protocol is documented, we could not find or develop a connector that can establish a usable SSO session from java code. Similar problems will occur when communication between individual systems is required. Again, this could be resolved using a more sophisticated authentication chain, allowing other login methods to pass through without triggering redirects. We should also note that direct login from code using a username and a password is discouraged by the CAS developers, so our failure to maintain a session maybethe desired behavior. Otherwise CAS' ticket proxying functionality may provide a solution, also using a simulated client with aservice account. This solution gives applications the possibilityto request a proxy granting ticket for a logged-in user that it can use to request further tickets to be consumed and validated by other applications. This way, authenticated server-to-sever communication is possible without impersonating a user, assuming proxy tickets are accepted. This is still not fully sufficient in our case as we also need to have server-to-server communication when there currently is no user logged in and background processes are firing events. Anyway, ticket proxying is more likely to work in our case since it only requires a single call to CAS from the user, causing a redirect to the calling service with the ticket needed to start proxying. To enable this functionality we would need trusted, encrypted connections between the servers concerned, further HTTP service endpoints, capable of being validated by CAS and receiving proxy granting tickets and handling proxy tickets. Especially in case we wanted to use tickets from a real user session, we would also have to modify the applications' security systems, storing CAS session information sothat itcan be used from anypart ofthe applicationrequiring server-to-server communication. Lastly, wetried to make some of our services searchable using Apache Solr with an unmodified ManifoldCF instance as a crawler. This also failed due to problems with the SSO session. As with our manual approach, we did manage to authenticate against CAS using built-in functionality but then failed to actually use the session for crawling. The 114
10 crawler was being redirected back to CAS after each request, even though it specifically supports applicationserver sessions. 6Conclusion Our experiences show, that adding only alittle more complexity by introducing areverse proxy leads to several issues with SSO in a real world scenario. Some of the issues described are application or SSO system specific, some others are only basic challenges like specific settings in the SSL certificate and a few are issues by design, like single sign-out. We found that the difficulty of including an application into the whole setup depends strongly on the software design, which frameworks were used inwhat way and how well modifying anapplication's configuration, code and plugin capabilities are documented. For example using Spring Security offers generic interfaces for adding SSO support, which make integration rather easy incase you are familiar with Spring configuration. But wealso found that in some cases an individual preparation for SSO plugins can be more suitable and easier to configure possibly easier to handle in a more sophisticated authenticationchain. Our biggest problem with the reverse proxy setup was handling the context switch between application and web server. Many applications are able to detect requests through a reverse proxy or can be configured accordingly, dealing with protocol and external hostname changes. But we found that hardly any application will work normally when placed under a different path in the web server compared to the application server it is runningon. This must be considered bad code design, since itisnoproblem to query the current context information like hostname and context path from the application server. However, using hard coded paths at least in some areas of the application (especially JavaScript) seems still the default, based on our tests. Maybe this is a negative side-effect from the current trend to port application code from the server to client-side JavaScript. In general, we can conclude that a basic SSO-enabled extranet with CAS can be created with areasonable amount of work, given well-prepared applications. Yet creatingawellrounded, high quality working environment will require extensive modifications to many applications'authenticationsystems and partiallytothe IT infrastructure around them. References [AFG06] Agostino Ardagna, C., Frati, F., & Gianini, G. (2006). Open Source in Web-Based Applications: A Case Study on Single Sign-On. International Journal of Information Technologyand Web Engineering(IJITWE), 1(3), [Ar+11] Armando, A., Carbone, R., Compagna, L., Cuellar, J., Pellegrino, G., & Sorniotti, A. (2011). From Multiple Credentials to Browser-based Single Sign-On: Are We More 115
11 Secure? In: Future Challenges in Security and Privacy for Academia and Industry (pp ).Springer Berlin Heidelberg. [BCN12] Bryan, P., Craig, M., Nelson, J.(2012): Guide to OpenIG Forgerock [Bo10] De Boer, M., Essenpreis, M., Garcia-Laule, S., Raepple, M. (2010):Single Sign-on mit SAP Lösungen für die Praxis. GalileoPress, Bonn [Bo12] [CP07] Boyd, R.. GettingStarted with OAuth 2.0. O'Reilly Media, Incorporated,2012. Camenisch, J., & Pfitzmann, B. (2007). Federated identity management. In: Security, Privacy, and Trust in Modern Data Management (pp ). Springer Berlin Heidelberg. [Ce+10] Celesti, A., Tusa, F., Villari, M., & Puliafito, A. (2010). How to enhance cloud architectures to enable cross-federation. In IEEE 3rd International Conference on Cloud Computing, pp [Ch09] Chadwick, D.W.(2009). Federated identity management. In: Foundations of Security Analysis and Design V(pp ).Springer Berlin Heidelberg. [Cl02] De Clercq, J.(2002). Single sign-on architectures. InInfrastructureSecurity (pp ). Springer Berlin Heidelberg. [Fr12] Fritschi, J. (2012): CAS Client FeatureMatrix. Jasig [Ha+12] Haron, G.R., Maniam, D., Sadasivam, V., Loon, W.H. (2012): Re-engineering ofweb Reverse Proxy with Shibboleth Authentication. International Conference for Internet Technologyand Secured Transactions,10-12 Dec. 2012, London [Hu+05] Hughes, J., Cantor, S., Hodges, J., Hirsch, F., Mishra, P., Philpott, R., Maler, E.(2005): Profiles for the OASIS Security Assertion Markup Language (SAML)V2.0. OASIS standard. [Io12] Ionita, M.G.(2012). Secure Single Sign-On using CAS and OpenID. Journal ofmobile, Embedded and Distributed Systems, 4(3), [Ma99] Maier, P. Q. (1999): Implementing and supporting extranets. Information systems security, 7(4), [PM03] Pashalidis, A., & Mitchell, C. J. (2003). Ataxonomy of single sign-on systems. In Information Security andprivacy (pp ). Springer Berlin Heidelberg. [Pr11] Pröhl, M. (2011): Kerberos Single Sign-On in gemischten Linux/Windows [So03] Umgebungen. d.punkt Verlag, Heidelberg Sommerlad, P. (2003): Reverse proxy patterns. In European Conference on Pattern Languages ofprogramming, EuroPLoP [SFB10] Steuer Jr, K., Fernando, R., & Bertino, E. (2010). Privacy preserving identity attribute verification inwindows cardspace. In Proceedings of the6th ACM workshop on Digital identity management (pp ).ACM. [SB12] Sun, S. T., Beznosov, K. (2012). The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems. In: Proceedings of the 2012 ACM conference on Computer and communications security (pp ). ACM. [Su+11] Sun, S. T., Pospisil, E., Muslukhov, I., Dindar, N., Hawkey, K., & Beznosov, K.(2011): What makesusers refuse web singlesign-on? an empirical investigation ofopenid. In Proceedings of theseventh SymposiumonUsablePrivacy and Security (p. 4). ACM. [Su+10] Sun, S. T., Boshmaf, Y., Hawkey, K., & Beznosov, K.(2010, September). Abillion keys, but few locks: the crisis of web single sign-on. In Proceedings of the 2010 workshop on Newsecurity paradigms (pp ). ACM. [Th11] [UB09] Thangasamy, I.(2011) OpenAM. PacktPublishing, Olton Ullrich, M., & Rieger, F. (2009). Brancheninitiative Single Sign-On: Der sichere, einheitliche und einfachezugangzuden Extranets der Versicherer wird Realität. In: Maklerveraltungsprogramme der Zukunft: Ein Ausblickauf zukünftige IT-Systeme zur Unterstützungvon Versicherungs-und Finanzvertrieben,
12 [VDB07] Vullings, E., Dalziel, J., & Buchhorn, M. (2007). Secure Federated Authentication and Authorisation to GRID Portal Applications using SAML and XACML. Journal of Research andpracticeininformation Technology, 39(2), [WY10] Wang Y., Jia, Z.(2010): The Application Research of Single Sign Out Model Based On CAS. International ConferenceonComputer Design andappliations (ICCDA2010) [Wi+03] Witty, R. J., Allan, A., Enck, J., & Wagner, R.(2003). Identity and access management defined. Research Study SPA , Gartner. 117
Approaches and challenges for a SSO enabled extranet using Jasig CAS. Florian Holzschuher René Peinl 10.09.2013
Approaches and challenges for a SSO enabled extranet using Jasig CAS Florian Holzschuher René Peinl 10.09.2013 iisys - Institut für Informationssysteme Mission: The institute is a competence centre for
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Proxied Authentication in SSO Setups with Common OSS. Open Identity Summit 2015 Prof. Dr. René Peinl Berlin, 10.11.2015
Proxied Authentication in SSO Setups with Common OSS Open Identity Summit 2015 Prof. Dr. René Peinl Berlin, 10.11.2015 Agenda 1 Use case / context 2 Challenge and ideal solution 3 Analysis of established
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
Access Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen
ENTERPRISE SECURITY WITH KEYCLOAK From the Intranet to Mobile By Divya Mehra and Stian Thorgersen PROJECT TIMELINE AGENDA THE OLD WAY Securing monolithic web app relatively easy Username and password
How To Configure The Jasig Casa Single Sign On On A Workstation On Ahtml.Org On A Server On A Microsoft Server On An Ubuntu 7.5.3 (Windows) On A Linux Computer On A Raspberry V
Configuring CAS-based SSO with ActiveVOS on Apache Tomcat Technical Note Version: 1.3 Dated: August 2013 2013 Informatica Corporation ActiveVOS is a trademark of Informatica, Inc. All other company and
SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.
Exam : P_ADM_SEC_70 Title : SAP Certified Technology Professional - Security with SAP NetWeaver 7.0 Version : Demo 1 / 5 1.Which of the following statements regarding SSO and SAP Logon Tickets are true?
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
F5 BIG-IP: Configuring v11 Access Policy Manager APM
coursemonster.com/uk F5 BIG-IP: Configuring v11 Access Policy Manager APM View training dates» Overview This three day course gives networking professionals a functional understanding of the BIG-IPÂ APM
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
Administrator Guide. v 11
Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main
Safewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
Novell Access Manager
Access Gateway Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 November 16, 2010 www.novell.com Novell Access Manager 3.1 SP2 Access Gateway Guide Legal Notices Novell, Inc., makes no representations
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Architecture of Enterprise Applications III Single Sign-On
Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected]
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected] Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
Using SAP Logon Tickets for Single Sign on to Microsoft based web applications
Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University
UNI TY UNIfied identity management Krzysztof Benedyczak ICM, Warsaw University Outline The idea Local database Groups, Entities, Identities and Attributes UNITY Authorization Local authentication Credentials
Security solutions Executive brief. Understand the varieties and business value of single sign-on.
Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies
SAML 2.0 Configurations at SAP NetWeaver AS ABAP and Microsoft ADFS
SAML 2.0 Configurations at SAP NetWeaver AS ABAP and Microsoft ADFS Applies to: SAP Gateway 2.0 Summary This guide describes how you install and configure SAML 2.0 on Microsoft ADFS server and SAP NetWeaver
OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way
OpenAM Written and tested with OpenAM Snapshot 9 the Single Sign-On (SSO) tool for securing your web applications in a fast and easy way Indira Thangasamy [ PUBLISHING 1 open source 1 community experience
Contents at a Glance. 1 Introduction 17. 2 Basic Principles of IT Security 23. 3 Authentication and Authorization in
at a Glance 1 Introduction 17 2 Basic Principles of IT Security 23 3 Authentication and Authorization in SAP NetWeaver Application Server Java 53 4 Single Sign-On 151 5 Identity Provisioning 289 6 Secure
How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip
Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
Unlocking the Secrets of Alfresco Authentication. Mehdi BELMEKKI,! Consultancy Team! Alfresco!
Unlocking the Secrets of Alfresco Authentication Mehdi BELMEKKI,! Consultancy Team! Alfresco! Agenda Introduction! Talk objectives! Repository Authentication! Share Authentication! External Authentication!
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode Haojiang Gao 1 Beijing Northking Technology Co.,Ltd Zhongguancun Haidian Science Park Postdoctoral
Authentication and access control in Sympa mailing list software
Authentication and access control in Sympa mailing list software May 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Configuration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
Configuring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
DEPLOYMENT GUIDE DEPLOYING F5 WITH SAP NETWEAVER AND ENTERPRISE SOA
DEPLOYMENT GUIDE DEPLOYING F5 WITH SAP NETWEAVER AND ENTERPRISE SOA Table of Contents Table of Contents Introducing the F5 Deployment Guide for SAP NetWeaver and Enterprise SOA Prerequisites and configuration
CA SiteMinder Secure Proxy Server
CA SiteMinder Secure Proxy Server Administration Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Guide to SASL, GSSAPI & Kerberos v.6.0
SYMLABS VIRTUAL DIRECTORY SERVER Guide to SASL, GSSAPI & Kerberos v.6.0 Copyright 2011 www.symlabs.com Chapter 1 Introduction Symlabs has added support for the GSSAPI 1 authentication mechanism, which
Flexible Identity Federation
Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
Authentication and access control in Sympa mailing list server
Authentication and access control in Sympa mailing list server February 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal
Guideline Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal Product: IBM Cognos 8 BI Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
How To Manage Identity On A Cloud (Cloud) With A User Id And A Password (Saas)
Integral Federated Identity Management for Cloud Computing Maicon Stihler, Altair Olivo Santin, Arlindo L. Marcon Jr. Graduate Program in Computer Science Pontifical Catholic University of Paraná Curitiba,
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
How To Use Netscaler As An Afs Proxy
Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal
Guideline Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal Product(s): IBM Cognos 8 BI Area of Interest: Security Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
SSO Plugin. Troubleshooting. J System Solutions. http://www.javasystemsolutions.com Version 3.4
SSO Plugin Troubleshooting J System Solutions Version 3.4 Page 2 of 19 Troubleshooting...4 Mid Tier...4 The Mid Tier can not find the jss-sso.jar file...4 I'm using Windows Authentication. The plugin is
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
Security for Cloud- and On Premise Deployment. Mendix App Platform Technical Whitepaper
Security for Cloud- and On Premise Deployment Mendix App Platform Technical Whitepaper Security for Cloud- and On Premise Deployment EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 THE MENDIX APP PLATFORM...
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Integration with Active Directory. Jeremy Allison Samba Team
Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,
Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
Enabling SSO between Cognos 8 and WebSphere Portal
Guideline Enabling SSO between Cognos 8 and WebSphere Portal Product(s): Cognos 8 Area of Interest: Security Enabling SSO between Cognos 8 and WebSphere Portal 2 Copyright Your use of this document is
From centralized to single sign on
The LemonLDAP::NG project Abstract LemonLDAP::NG is a modular WebSSO (Web Single Sign On) software based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the
Load Balancing Microsoft AD FS. Deployment Guide
Load Balancing Microsoft AD FS Deployment Guide rev. 1.1.1 Copyright 2002 2015 Loadbalancer.org, Inc. Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org Software
Security IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
