Open Identity Stack. Forging a New Future with Identity Relationship Management
|
|
|
- Muriel Foster
- 10 years ago
- Views:
Transcription
1 White PaPer Open Identity Stack Forging a New Future with Identity Relationship Management 1. Executive Summary 2. Introduction 3. Business Pain Points 4. Business Trends 5. The Open Source Solution 6. The ForgeRock Model 7. Business Model 8. Conclusion
2 Open Identity Stack Forging a New Future with Identity Relationship Management 1. Executive Summary Identity and Access Management (IAM) services were traditionally built for a company s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities. 2. Introduction Business, education, and government institutions use identity management platforms to regulate individuals identities and their associated attributes, credentials, and entitlements organization-wide. Today, identity relationship management is necessary both on and off-premises, increasingly important for managing users in mobile, social, and cloud environments. Legacy identity management solutions were not built for cloud compatibility, device-agnostic access, high volume, or consumer engagement, and most were built by acquisition, rather than designed to work as a cohesive whole. This makes them inherently: static limited in scalability difficult to implement hard to exit complex to integrate inaccessible to most developers heavyweight unconscionably expensive Solutions must be flexible enough to support new consumer-facing mobile, social, web, and cloud app projects, while providing seamless integration with legacy systems. Platforms should be purpose-built to work together anywhere, so clients are never saddled with the costs of acquisitions. Agile organizations need solutions that are: adaptable highly scalable simple to implement exitable modular developer-friendly lightweight cost-effective Identifying and targeting these solution benefits is especially critical now, during this transition period from traditional, on-premises IAM to mobile, social, web, and cloud-compatible IRM platforms, as businesses make decisions about their future identity strategy. Making a great identity decision will not merely protect a company s data; it will allow the organization to shift away from the burden of supporting legacy systems, to investment in solutions that accelerate innovation and drive top-line growth. 2 FORGEROCK.COM
3 3. Business Pain Points The legacy IAM pain points described above pose challenges for the enterprise in the following ways: Static Traditional IAM is designed for specific static events, but in today s IRM world, systems must understand and react to contextual circumstances to determine whether or not you get access, and if so, how much and to what. If you log in from a new device or from a different country, for example, a modern, adaptable IRM system will adjust to the uncertain circumstances and ask you for additional authentication beyond a simple password. Difficult to Implement Legacy IAM solutions, traditionally constructed through acquisitions, are chock full of varying APIs, documentation, libraries, and protocols with no consistent standard of operation. Developers waste valuable time learning how all the parts and pieces work, instead of modifying, customizing, and streamlining the platform to suit unique business needs. Complex to Integrate Proprietary IAM suites notoriously demand a rip and replace migration process from clients existing platforms. Proprietary code is hidden from developers looking to incorporate new solutions into existing IAM strategies, and is not designed to be customizable or play well with others. Traditional IAM, typically built piecemeal through acquisitions and tacking on parts as needs arise, struggles to respond to the multitude of users, circumstances, devices, access points, and access privileges that dominate today s IRM world. Heavyweight Designed for the old world of on-premises IAM security, these solutions generally rely on heavyweight APIs and complex standards that are only accessible to developers and architects with specialized identity knowledge. Limited in Scalability Traditional IAM platforms were designed to protect the security perimeter and employees only, making them difficult to adapt for the modern enterprise, which must maintain mobile, web, social, cloud, and on- premises identity data simultaneously in order to satisfy client, customer, and employee IRM needs. As the number of users grows exponentially, modern IRM systems must be able to accommodate hundreds, thousands, or even millions of additional identities instantaneously, achieving a scalable volume that was neither possible nor needed for the enterprise, but is essential in an Internet-connected, consumer-facing world. Hard to Exit Proprietary solutions are infamous for rip and replace migration strategies and vendor lockin contracts. Once an enterprise has experienced the lengthy, painful process of moving all IAM data and operations to the new platform, they are unlikely to want to repeat the process again soon, whether or not they are satisfied with the platform. And when the contracts come up for renewal, high-pressure legal tactics are used to force enterprise customers to immediately renew in order to avoid use of the product in breach of contract. Inaccessible to Developers Legacy IAM platforms built by acquisition are saddled with a whole host of disparate APIs, libraries, documentation, etc, hindering the developer s ability to learn, make adjustments, tailor solutions, and teach others to use the platform. Proprietary code gives developers limited maneuverability. Unconscionably Expensive Contracts with legacy vendors famously begin with a discount, but then quickly ramp up in maintenance and subscription fees, gouging customers for every feature and upsell. High-pressure tactics are used to elicit renewals at a significantly higher price point, and clients are hesitant to go through another round of painful rip and replace migration. The costs are always high because the customer pays for the acquisitions that built their IAM platform. 3 FORGEROCK.COM
4 4. Business Trends Though enterprises tolerated the challenges of legacy IAM platforms in the past, they now face a greater and growing need for highly effective IRM solutions, internally and externally. The number of users, devices, and identities to manage is growing exponentially, increasing numbers of applications are moving to the cloud and other devices, and CEOs are determined to engage with consumers in order to drive top-line revenue and maintain an edge over the competition. Today, effective security demands integrated, contextual, and highly scalable identity data, efficient, consumer-facing services, and developer-friendly ways to support the growing milieu of users, devices, (laptops, phones, touchpads, cars, etc.), and mobile, social, web, and cloud applications (on or off premises). CIOs must invest in IRM solutions because identity management is now a business driver that touches customers, partners, employees, and users, directly impacting top line revenue. This is the evolution of IAM to IRM: Identity Relationship Management. This shift in business emphasis has a direct technical impact on how we think about identity and access management. Managing risk, privacy, auditing, reporting, and compliance are ongoing costs of business that an effective identity management strategy should continue to address. The right identity relationship management solution will also actively contribute to essential top-line growth by adhering to the pillars of IRM outlined below: Pillars of IRM Business Pillars 1. CONSUMERS AND THINGS over employees 2. ADAPTABLE over predictable 3. TOP LINE REVENUE over operating expense 4. VELOCITY over process Technical Pillars 5. INTERNET SCALE over enterprise scale 6. DYNAMIC INTELLIGENCE over static intelligence 7. BORDERLESS over perimeter 8. MODULAR over monolithic CONSUMERS AND THINGS OvER EMplOyEES Traditional IAM platforms were designed for on-premises employee use and are unable to provide the quick, secure, and device-flexible IAM experience customers are looking for. Modern identity management must manage access privileges for all stakeholders across a variety of devices. ADApTABlE OvER predictable Unlike traditional IAM designed for specific static events, IRM must understand contextual circumstances. For example, a user logging in from a different device or location should have access to the information they need. TOp line REvENUE OvER OpERATING ExpENSE IAM has always been viewed as a necessity for employees and therefore a business cost. In today s world, the security system is used to authenticate and authorize both consumers and employees. If an IRM solution is efficient, secure, and accurate, it can directly contribute to a business top line revenue, as customers will have easy access to secure applications where they can buy services. 4 FORGEROCK.COM
5 velocity OvER process AM has migrated from business cost to business driver. Companies suffer materially if their IAM solution takes too long to deploy, adapt, or respond to user events. Employees had to put up with slow IAM systems, but customers don t and won t. Modern IRM serving employees, customers, and devices must instantly react to variable circumstances and events, and must be massively scalable and available so that no user ever waits around or worse, is shut out. CIOs today make IRM decisions based on speed, ease of use, and the ability to scale to handle customer volume not based on implementation and cost of deployment. This shift in business emphasis has a direct technical impact on how we think about identity and access management. Through this shift we have come to value: INTERNET SCAlE OvER ENTERpRISE SCAlE Today s users access secure systems not just on premises, but in the cloud and via the Internet, any time, day or night. Today s users are not just employees logging on at work but also partners, customers, and devices signing in from anywhere. As the number of users grows exponentially, modern IRM systems must be able to accommodate hundreds, thousands, or even millions of additional identities instantaneously, achieving a scalable volume that was neither possible nor needed for the enterprise, but is essential in an Internet-connected, consumer-facing world. DyNAMIC INTEllIGENCE OvER STATIC INTEllIGENCE Traditional IAM was designed for a specific set of events employee on and off-boarding, for example, taking place in a predictable on premises work environment. Today s IRM must understand the circumstances in order to determine whether or not you get access, and if so, how much and to what? If you log in from a new device or from a different country, for example, a modern, adaptable IRM system will adjust to the uncertain circumstances and ask you for additional authentication beyond a simple password. BORDERlESS OvER perimeter Once upon a time, employees arrived at the office, logged into secure systems and logged back off at the end of the day. In today s work-from-anywhere culture, employees, as well as partners and customers need access from laptops, phones, tablets and even cars. They access secure data stored not only on company premises, but also in the cloud and hosted by SaaS providers. MODUlAR OvER MONOlITHIC Today s IRM demands are much more complex than those of traditional IAM. A good IRM solution is designed from the ground up as an integrated, cohesive stack that is purpose-built to handle complexity. Traditional IAM, typically built piecemeal through acquisitions and tacking on parts as needs arise, struggles to respond to the multitude of users, circumstances, devices, access points, and access privileges that dominate today s IRM world. As more people, devices and things are assigned identities across networks, IRM services that are simple, flexible, scalable, and designed to quickly verify identities and access privileges become imperative for any business to safely and efficiently engage with their customers. Today s solutions must link devices laptops, phones, touchpads, cars and new mobile and social apps to a single security platform that works all the time, everywhere, on premises or off in the cloud. Our Open Identity Stack is designed with this new reality in mind. 5 FORGEROCK.COM
6 5. The Open Source Solution The open source model addresses many of the IAM pain points businesses currently experience, and caters to the pillars of IRM outlined above. Open source software is not proprietary, and procurement is simple: users just download the code and use it for proof of concept and testing straight out of the box, for free. It allows an organization to experiment with the code before deciding it provides an ideal IRM solution allowing them to innovate in the IRM sector where their competitors cannot. Once ready to design, architect, and deploy, users simply purchase a subscription license. ForgeRock provides a bundled offering, where a subscription provides enterprise customers with a software license, maintenance releases, global support, and legal indemnification, giving you the power, protection, and insurance you need for a successful deployment. And at the end of the day, there is no barrier to exit. Any enterprise with a subscription is able to use as much or as little of the open source code as they like, pairing it with proprietary solutions, using it in part, or using the whole suite straight out of the box. This open model comes with code that is flexible and adjustable by design. It s also great code: developers are notoriously hesitant to release code with their name on it without thoroughly vetting it first, lest they lose credibility with the entire community, who can see all of their work. More eyeballs also means fewer bugs and quicker fixes, making open source code the safest code available. The ForgeRock global team of developers and active and engaged community members work together to develop fixes, innovations, and stable new releases faster than anyone else on the market, maximizing quality, efficiency, and value. It also provides a development model where organizations can commit code tailored to their needs back to the project, where it must pass a rigorous QA process, providing a level of participation and influence that is not possible with proprietary offerings. The beauty of open source is that modifications of general interest will be vetted and then accepted into the code base by the community, diminishing the need for additional development staff on the part of the customer, and expensive requests for custom code from proprietary vendors. Over time, open source has the power to bring identity and access management code development for the majority of companies big and small into alignment, thereby establishing a safe, useful, efficient, transferable, and elegantly architected IRM standard. As a large telecom with an extensive IT environment and needs, we value having access to the source code. KEVIN HIGGINS, Telecom NZ The open source model presents a highly attractive alternative as enterprises seek out lightweight, flexible IRM solutions that can accommodate anytime, anywhere, any device consumer-facing projects, in addition to traditional on-premises needs. 6 FORGEROCK.COM
7 6. The ForgeRock Model ForgeRock is committed to the development of identity relationship management through the creation of simple, open source, developer-friendly identity solutions that we call the Open Identity Stack. A single, common programming interface enables simple access to OpenAM, OpenIDM, and OpenDJ, so that each delivers rich, modular, massively scalable, lightweight identity relationship management services. Removing the complexity of the underlying services with multiple tiers of API abstraction (See Table 1: Developer API Tiers) is a significant advantage to developers and the business. Now for the first time, a developer can utilize reusable shared services across an entire identity platform, whatever the requirements of the application strategy. This is a completely different model from the standard legacy provider approach, which requires developers to bend applications to support the vendor. The ForgeRock developer-centric approach and common API development platform is changing what was once costly and complex into easily accessible and reusable solutions that companies can implement safely and efficiently, whether internally or externally, in order to effectively drive top line revenue. Table 1: Developer API Tiers Tier 1 ARCHITECTURE Lightweight and simple Common APIs across stack Program language agnostic >>> Simple REST Services Tier 2 IDENTITy STANDARDS Standards based services Reusable and scalable Interoperable and open >>> KEy Standards (SAMl, OAuth2.0, SCIM WS*, OpenID Connect) Tier 3 plugins AND CONNECTORS No need to touch application Abstracted security Scalable and robust >>> Applications 7 FORGEROCK.COM
8 The Open Identity Stack Shared Services-Based Architecture Diagram 1: Open Identity Stack Shared Services The Open Identity Stack is a shared services-based architecture for managing the complete lifecycle of an identity and its ongoing usage, including the attributes, credentials, and entitlements; the real-time controls for access based on attributes, role, entitlement, and context; and the administration and reporting of those activities. The architecture has many shared services that span the three core products, making it easier to develop, implement, manage your deployment. These services (See Diagram 1: Open Identity Stack Shared Services) include a common RESTful API, registration, and standards-based services such as OAuth2.0, among others, along with a common lightweight UI model to help integrate the internal Open Identity Stack components as well as external systems, and provide a unified experience for developers and administrators. The Open Identity Stack is 100% open source and consists of the following solutions: OpenAM is an open source Authentication, Authorization, Federation, Web Services Security, Fine-Grained Entitlements, and Adaptive Authorization solution. It also includes application and web container policy enforcement agents. Packaged with OpenAM, OpenIG (Identity Gateway) is a high-performance gateway with specialized session management and credential replay functionality. OpenIDM is an open source User Administration and Provisioning solution. OpenIDM uses the Open Identity Connectors Framework and Toolkit (OpenICF) to aid development of resource connectors. OpenDJ is the first directory server to provide native support of the REST API. It is an open source LDAP directory service with a high-performance, highly available, secure directory server, built-in data replication, client tools, and a developer- friendly LDAP SDK. Access is provided via LDAP, Web Services, and REST API. 8 FORGEROCK.COM
9 OpenAM Overview: OpenAM was designed in response to a milieu of access management suites that were pieced together through acquisitions, creating an accidental architecture that complicates deployment and passes integration costs on to customers. Based on the Sun OpenSSO codebase, OpenAM (See Diagram 2: OpenAM Functional Architecture) is an All-In-One access management platform for protecting any type of resource across enterprise, cloud, social, and mobile environments. What has traditionally been delivered by legacy identity vendors as six different products SSO, adaptive authentication, strong authentication, federation, web services security, and fine-grained entitlements is delivered as a single, unified offering. Organizations can use the access control services they need and simply turn on additional services when ready. The solution has an inherently unique architecture to support use cases from complex enterprise access control, to multiprotocol federation, to enabling SSO for cloud systems. At the highest level OpenAM consists of a single, self-contained Java application; service components such as session management; client side APIs in C, Java, REST; service provider interfaces to enable custom plugins; and policy agents for web and app server containers to enforce access policies to protected web sites and web applications. Organizations with existing internal access management solutions can easily integrate OpenAM into their environment through API services or through the token translation service. Maintaining all installation and configuration capabilities within one application vastly simplifies deployment. In addition, agent configuration, server configuration, and other tasks are simplified to be repeatable and scalable, so multiple instances of the solution can be deployed without additional effort. The embedded OpenDJ directory server eliminates the need to configure a separate directory to support the configuration and user stores, or if desired, users can utilize other LDAP directories such as Sun DSEE or databases. Diagram 2: OpenAM Functional Architecture UI Layer Management End User Protected Resources Layer Web Agents JavaEE Agents WS Agents Access Layer Common REST OpenID Connect OAuth2 SAML WS Services Layer AuthN Federation Adaptive Risk AuthZ Session Management SSO Entitlements Password Management Logging Data Persistence Layer External Layer Authentication Systems User Directory Stores Reporting Tools SIEM, Analytics Tools 9 FORGEROCK.COM
10 Key OpenAM Features: Authentication: With over 20 out-of-the-box authentication methods supported, OpenAM has the flexibility to chain methods together along with Adaptive Risk scoring, or to create custom authentication modules based on the JAAS (Java Authentication and Authorization Service) open standard. Windows IWA is supported to enable a completely seamless heterogeneous OS and Web application SSO environment. Authorization: OpenAM provides authorization policy from basic, simple, coarse-grained rules to highly advanced, fine-grained entitlements based on XACML (Extensible Authorization Mark-Up Language). With the ability to abstract authorization policy away from the application, developers can quickly add or change policy as needed without modification to the underlying application. Adaptive Risk Authentication: The adaptive risk authentication module is used to assess risks during the authentication process, to determine whether to require that the user complete further authentication steps. Adaptive risk authentication determines, based on risk scoring, whether more information from a user is required when they login. For example, a risk score can be calculated based on an IP address range, access from a new device, account idle time, etc., and applied to the authentication chain. Federation: Federation services securely share identity information across heterogeneous systems or domain boundaries using standard identity protocols (SAML, WS-Fed, OpenID Connect). Quickly setup and configure service provider or cloud service connections through the Fedlet, OAuth2.0 Client, OAuth2.0 Provider, or OpenIG Federation Gateway. OAuth2.0 support is an open standard for modern federation and authorization, allowing users to share their private resources with tokens instead of credentials. Unique to OpenAM, the OpenIG Federation Gateway provides a SAML2 compliant enforcement point to and allows businesses to quickly add SAML2 support to their applications with little to no knowledge of the standard. In addition, there is no need to modify the application or install any plugin or agent on the application container. Out-of- the-box tools enable simple task-based configuration of Google Apps, ADFS2, along with many other integration targets. OpenAM can also act as a multi-protocol hub, translating for providers who rely on other, older standards. Single Sign-On: OpenAM provides multiple mechanisms for SSO, whether the requirement is enabling crossdomain SSO for a single organization, or SSO across multiple organizations through the Federation Service. OpenAM supports multiple options for enforcing policy and protecting resources, including policy agents that reside on web or application servers, a proxy server, or the OpenIG (Identity Gateway). OpenIG runs as a selfcontained gateway and protects web applications where installing a policy agent is not possible. High Availability: To enable high availability for large-scale and mission-critical deployments, OpenAM provides both system failover and session failover. These two key features help to ensure that no single point of failure exists in the deployment, and that the OpenAM service is always available to end-users. Redundant OpenAM servers, policy agents, and load balancers prevent a single point of failure. Session failover ensures the user s session continues uninterrupted, and no user data is lost. Developer Access: OpenAM provides client application programming interfaces with Java and C APIs and a RESTful API that can return JSON or XML over HTTP, allowing users to access authentication, authorization, and identity services from web applications using REST clients in their language of choice. OAuth2.0 also provides a REST Interface for the modern, lightweight federation and authorization protocol. 10 FORGEROCK.COM
11 Customer Use Case THE CHAllENGE: CUSTOMER: Government of Norway Providing 4M citizens access to 300+ Government services online Deliver secure government services to Norwegian citizens and businesses so they can do things like obtain birth and death certificates, apply for schools and student loans, manage welfare services and health information, and pay parking tickets, automobile registration fees, utility bills, and taxes online. THE SOlUTION: Implement a flexible, secure, single-access architecture built with ForgeRock OpenAM to enable nearly 100% of citizens to access over 300 government services. OpenAM s simple, secure access to government services played a large part in the success of the egovernment initiative. TOR ALVIK, COO, Agency for Public, Management & egovernment HOW: The hub, ID-Porten, is at the center of the architecture. Government agencies such as the tax office, labor and welfare agency, health economics administration agency, and water and energy directorate, are the spokes that use the authentication and single sign-on services of ID-Porten. The ID-Porten implements several levels of authentication: MyID which uses PIN code authentication; BankID a bank- issued electronic ID; Buypass, a private electronic ID that can also be used to bet online in Norway; and Certificates which are stored in USB pens and issued by a private company. Each of the authentication eids can be associated with different authentication contexts and different authentication strengths. BENEfITS: Nearly 100 percent of adult citizens and over 500,000 businesses now access municipal, regional, and national government services from a single portal online, resulting in better security, faster processing times, and measurable savings. Scalability and performance. ID and the authentication environment can handle more than one million users signing in on a single day without outages or degradation in performance, like on the day taxes are due. OpenDJ Overview: OpenDJ is the only 100% open source, lightweight, embeddable big data platform for easily sharing real-time user identity data across enterprise, cloud, social, and mobile environments. Recognizing that traditional approaches to accessing identity data are overly complex, OpenDJ provides developers with choice. Developers no longer need to be LDAP experts. OpenDJ lets developers choose either LDAP or REST to access identity data using a single solution that can replicate data across on-premise and off-premise applications. OpenDJ combines the security of a proven directory with the accessibility of a database. OpenDJ is an LDAPv3 and REST compliant directory service, developed for the Java platform, providing a high- performance, highly available, and secure store for the identities managed by your organization. Easy to install and configure, and combined with the utility of the Java platform, OpenDJ is the simplest, fastest directory to deploy and manage. Core to the management of identity information, OpenDJ directory services are used in many different use cases whether it is for a large-scale cloud service directory, a consumerfacing directory, or an enterprise or network operating system (NOS) directory. With a 100% Java code base, OpenDJ runs on many platforms, including virtualized environments. All software and data are architecture-independent, so migration to a different OS or a different server is as simple as copying an instance to the new server. This increases the deployment flexibility, as well as the portability between different operating systems and system architectures. 11 FORGEROCK.COM
12 Diagram 3: OpenDJ Functional Architecture UI Layer Management End User Access Layer Common REST LDAP SDK LDAPv3 Services Layer REST2LDAP Access Control Password Policy Groups Schema Management Caching LDAPv3 Replication Monitoring Auditing External Layer Active Directory Samba User Directory Stores Reporting Tools SIEM, Analytics Tools Key OpenDJ Features: Performance: OpenDJ is optimized for performance at scale with data integrity and security. With millisecond response times and read/write performance in the 10 s of thousands per second, OpenDJ satisfies the most rigorous performance requirements across industries from telecom and financial services to large-scale consumer-facing applications. Replication Services: By replicating data across multiple directory server instances, key user data is preserved in case of an outage. OpenDJ provides advanced replication options including multi-master, fractional, and assured. N-Way multi-master replication provides high-availability and disaster recovery capabilities. Fractional replication enables only specific attributes to be replicated and assured replication can be used to guarantee data availability even in the remote case of a server crash. Security: OpenDJ stores identity data securely, with varying levels of authentication and authorization, including SSL, StartTLS, and certificate-based. It protects passwords through encryption and advanced access control security policies. All configuration changes are audited and archived, offering easy rollback to a working configuration. Delegated Authentication: OpenDJ permits delegate authentication to another LDAP directory service, such as Active Directory, with a feature called pass-through authentication. The key benefit of pass-through authentication is to remove the security risks associated with synchronizing passwords (including possible capture and transfer of clear text passwords). With pass-through authentication, OpenDJ replays a user s simple bind operation against the remote directory service. If the bind is successful, OpenDJ considers the user authenticated to perform subsequent operations like searches and updates in OpenDJ. Password Policy: OpenDJ password policies govern not only passwords, but also account lockout, and how OpenDJ provides notification about account status. 12 FORGEROCK.COM
13 Administration: The OpenDJ GUI-based installer and control panel simplifies installation and server configuration down to a few minutes. The command line utilities enable complete access to all server management controls and monitoring locally or remotely. OpenDJ also offers advanced backup and restore functions such as automated, compressed, signed, and encrypted backups that improve data reliability and security. Monitoring: By supporting the widely adopted monitoring standards SNMP and JMX, OpenDJ can easily integrate into your existing monitoring infrastructure. Configure custom alerts to inform administrators about specific directory service events such as password expiration, access controls disablement, backend database corruption detection, and much more. Developer Access: OpenDJ provides data access through multiple protocols: REST, LDAP, and Web Services. It fully complies with LDAPv3, and DSMLv2 standards to ensure maximum interoperability with client applications. The OpenDJ SDK provides a high-performance, easy-to-use library of classes and interfaces for accessing and implementing LDAP directory services. Customer Use Case CUSTOMER: ABOUT ZIGGO: ZIGGO Customer services move from Sun to OpenAM & OpenDJ Ziggo is the largest media and communication services provider in the Netherlands. Ziggo serves 7 million users in 3 million households, 1.9 million broadband Internet customers, 2.3 million digital television customers, 1.6 million telephone subscribers, and 1.4 million bundle customers on a 98% fibre network. Ziggo s products and services for small and large business markets comprise telephone, data communication, and electronic payment systems. THE CHAllENGE: Ziggo needed to launch new customer services, including federation support for business partners and fine-grained access management for customers, that their deployment at the time could not handle. The directory server contained 2,500,000 identities that needed to be synchronized and available in real-time, throughout 3 geo-separated data centers, in order to ensure high availability. And, Ziggo had to maintain live functioning of core business during the transition, so it was vital for Ziggo to migrate the entire directory server dataset with no loss of service. THE SOlUTION: OpenAM was used to replace SunAM and included existing and new features like SAML 2.0. OpenDJ replaced Sun DSEE as the new directory server platform. All 2,500,000 entries were migrated and replicated across three geo-separated data centers, in a predictable and risk-managed fashion ensuring no loss of service. Previous customizations were also migrated to the platform and included in the new supported environment. A successful proof-of-concept (POC), where technical personnel from Ziggo worked closely with ForgeRock expertise during implementation, identified and resolved all pitfalls in advance of go-live. Using OpenAM and OpenDJ has enabled us to move much faster and more effectively in the demanding world of access management; the migration itself was fast, simple, straightforward and trouble-free. J. TEN BRINK, Senior System Specialist, Ziggo Multiple integration points and custom components needed to be transitioned. 13 FORGEROCK.COM
14 OpenIDM Overview: OpenIDM is a response to the pain organizations experience when deploying legacy enterprise provisioning solutions. These mostly proprietary solutions are monolithic, heavyweight, painfully slow to deploy, and outrageously expensive. Unlike legacy identity management solutions, OpenIDM is the only 100% open source, lightweight, provisioning solution purpose-built for Internet Scale. OpenIDM consists of modular identity services that are plug and play. For example, the solutions ships with Activiti as its Business Process Management (BPM) Engine. However, if you want to replace it with an alternative BPM engine, the modular architecture allows you to easily do so. In addition, OpenIDM has a simple REST API that is ideal for developers in need of provisioning across enterprise, cloud, social, and mobile environments. OpenIDM is a User Administration and Provisioning solution that addresses the challenges faced by organizations using legacy provisioning systems, by removing deployment complexity, proprietary scripting, business process modeling, and limited scalability. Because the Java-based architecture is built on the OSGi framework, OpenIDM (See Diagram 4: OpenIDM Functional Architecture) is able to provide lightweight, modular services such as automated workflow, user self-service, registration, password sync, data reconciliation, and audit logging, all accessible through developer-friendly REST API using standard Java development tools such as Eclipse, NetBeans, Spring etc. OpenIDM provides workflow-driven provisioning activities through an embedded workflow and business process engine based on Activiti and the Business Process Model and Notation (BPMN) 2.0 standard. The modular design of OpenIDM enables complete flexibility to use the embedded workflow engine and NoSQL database or replace with your own choice. In addition, with a small footprint, the entire OpenIDM service can itself be completely embedded and custom-tooled to the requirements of the target application. OpenIDM connects to external systems, databases, directory servers, and other sources of identity through the identity connector framework, OpenICF (Open Identity Connectors Framework). Historically, the reason for building an internal enterprise User Administration and Provisioning system was to connect to the HR system. Now with OpenIDM, organizations can support both internal employee systems and large-scale customer-facing applications for registration, user self-service, password reset, and user profile management. The object model is designed to support the methods the organization chooses to manage identity information. The options are to configure OpenIDM to create a virtual identity with links to external systems (data sparse model) or to create a meta-directory that centrally stores (data full model) a copy of identity attributes. 14 FORGEROCK.COM
15 Diagram 4: OpenIDM Functional Architecture UI Layer ForgeRock UI Framework Access Layer Common REST Business Logic Layer JavaScript Groovy Java Services Layer Provisioning Services Password Management Report & Audit Service Directory Service OpenIDM Repository Task Scanner Workflow Engine Policy Service External Resources Layer Key OpenIDM Features: Password Synchronization: OpenIDM password synchronization is a service that allows organizations to proactively manage user passwords to ensure uniformity across all applications and data stores such as Active Directory. With password synchronization, a user can authenticate using the same credentials on each synched resource. In tandem with the user self-service feature, OpenIDM significantly reduces helpdesk costs by automating password reset and enforcing centralized password policy. User Provisioning: OpenIDM provides a workflow engine and business process engine that support the create, update, and delete functions based on workflow-driven provisioning activities, whether for self-service actions such as a user request for access to an application, or an administrator running sunrise or sunset processes to handle bulk onboarding or off-boarding. To simplify defining workflows and business processes, the embedded Activiti module can be used for modeling, testing, and deployment. Activi supports BPMN 2.0 process definition models, which can not only exchange between different graphical editors, but can also execute as is on any BPMN 2.0-compliant engine. Synchronization, Reconciliation: In addition to passwords, OpenIDM has the ability to sync and reconcile other attributes including role and group data between connected systems. These functions are critical to ensure that identity information is clean, consistent, and accurate throughout the organization. OpenIDM has a 15 FORGEROCK.COM
16 flexible synchronization mechanism that provides for on-demand and scheduled resource comparisons and is a key process for audit and compliance reporting. Audit Logging: OpenIDM auditing can publish and log all relevant system activity to the connected systems. This includes auditing the data from the reconciliation process, access details, and detailed activity logs that capture operations with both OpenIDM and the connected systems. Auditing data can be generated for all the relevant reports, including orphan account reports, by running a report query or downloaded to other reporting tools. Cloud: With complete flexibility in data and object schema, the OpenIDM architecture enables support for both traditional on-premise applications as well as for cloud service providers such as Workday, Google Apps, and Salesforce.com. Using the REST API, OpenIDM is easy to configure straight out of the box, to provide user provisioning and administration services to cloud providers without complex customization. This simplifies account creation, updating, deleting, and auditing without the cost and overhead of deploying multiple systems. Developer Access: An access layer provides the user interfaces and public APIs for accessing and managing the OpenIDM repository and its functions. RESTful interfaces provide APIs for CRUD operations and for invoking synchronization and reconciliation for both HTTP and Java. Our pluggable server side scripting engine provides Javascript and Groovy out of the box. User Interfaces provide password management, registration, self-service, and workflow services. Customer Testimonials The industry shift to identity relationship management presents opportunities for ForgeRock s customers across the full spectrum of industry verticals, including among others financial services, telecommunications, retail, insurance, government, and education. The sampling of testimonials here speaks to the business value and revenue-growth opportunities driven by ForgeRock s consumer-facing IRM platform. Salesforce selected ForgeRock because [they are] highly scalable, easy-to-customize, [and] extend user identities beyond the traditional firewall and into the cloud. CHUCK MORTIMORE, VP Product Management, Salesforce Identity ForgeRock was a clear choice to support our IT infrastructure as we build out our new platforms. JON BERGMAN, Global Director Enterprise Applications & Governance, Axalta ForgeRock enabl[ed] mission critical business services while providing secure, seamless onboarding & access to our services. ANUP NAIR, CIO, Vantiv 16 FORGEROCK.COM
17 The migration itself was fast, simple, straightforward and trouble-free. J. TEN BRINK, Senior Systems Specialist, Ziggo Thanks to the integration with the existing Oracle SSO server and the federated SSO in ForgeRock OpenAM, end-users can log in to the web and cloud applications with full transparency, and without credentials growing out of control. RUUD STROET, ICT Architect, PLUS Retail ForgeRock understood what it meant to create a modern, best-in-class Web experience for our large and exceedingly diverse customer base. GREG KALINSKY, Senior Vice President & Chief Information Officer, GEICO ForgeRock is the technology foundation to our Sky ID service. CASPAR ATKINSON, Director Products and Identity, BskyB OpenAM s simple, secure access to government services played a large part in the success of the egovernment initiative. TOR ALVIK, COO, Agency for Public Management & egoverment The ForgeRock deployment will create a better user experience for customers and delivered strong backend support, while providing a flexible, architecturally elegant, & technologically superior solution for the company. MIKE WILSON, CISO, McKesson 17 FORGEROCK.COM
18 7. Business Model A ForgeRock Open Identity Stack subscription gives you unlimited rights to use our software in production and access to valuable support resources to aid you in planning and designing your mission-critical deployment. Our open model makes evaluation simple; just download our enterprise software and use it for proof-of-concept and prototyping new applications. Once you re ready to design, architect, and deploy, simply purchase a subscription and we will work with you to make sure your project is a success. Only ForgeRock subscription customers receive access to maintenance releases that include easy-to-deploy and tested patches and fixes. Subscription also gives customers access to product support professionals and resources to guide the design, architect, and deployment phases a must for any mission-critical deployment. Finally, legal indemnification safeguarding users in the event of a legal claim related to your ForgeRock subscription is also included. ForgeRock Services ForgeRock Support is optimized to put customers in touch with the expert that can help them. We offer global 24x7 support staffed in your local time zone, a flat structure staffed by development engineers, co-located support staff and engineering, and support staff evaluated on customer satisfaction, not ticket throughput. We know that minimizing your downtime means better access, availability, and more revenue. ForgeRock Professional Services provides responsive, high-impact services for mission-critical success. We understand that our customers want to get up-and-running rapidly so they can realize business impact and see results quickly. To enable this, we developed a suite of professional services that provide the best of our expertise in targeted offerings ready to be delivered straight away. Each of the seven service offerings is focused on one of the three major project lifecycle phases of Design, Build and Production and is offered at two levels: Foundation (usually 3 days) and Extended (usually 5 days) ForgeRock University offers a job-role driven curriculum for system integrators, consultants, administrators and developers who are working with our leading Open Identity Stack offering. This ensures that whatever role you have, you always have the right skills for the tasks. With course materials developed in partnership with the community leaders for each project, we offer the most comprehensive learning to support your deployment of the Open Identity Stack. 18 FORGEROCK.COM
19 8. Conclusion: The ForgeRock Advantage The open source identity relationship management platform developed by ForgeRock provides a vibrant alternative to traditional, proprietary IAM platforms. The Open Identity Stack is a simple, open, developer-friendly platform for building identity relationship management services for enterprise, cloud, social, and mobile systems. The Open Identity Stack enables agile business innovation with its modular, massively scalable, and lightweight infrastructure. For technical staff, the Open Identity Stack provides a simple, easy-to-use approach to delivering identity services for enterprise, cloud, social, and mobile applications. For CEOs, it provides a new, highly effective and reusable method of managing trust relationships with parties inside and outside of a company relationships that are now tied directly to the business top line. Why the Open Identity Stack is Unique It is the only 100% commercial open source identity relationship management stack available on the market today. The first to offer an agile, all-in-one, unified stack for rapidly building identity services that are lightweight, modular, massively scalable, and developer-friendly - built ground-up to work as a cohesive whole and connect enterprise, cloud, social, and mobile security strategies into a single, common platform to maintain enterprise-level security. Solution Benefits Unified Platform works as an efficient, cohesive whole to enable organizations to innovate anywhere, anytime, on any device, whether consumer-facing or employee-centric, to address major growth initiatives globally. Lightweight Infrastructure provides the flexibility to implement only what is needed when the business needs it nothing more, nothing less. Connected Security provides a solution to unite enterprise, social, cloud, and mobile security strategies into a single common platform. The first fully-developed IRM solution, it s efficient, secure, and accurate - it directly contributes to business top-line revenue by giving consumers easy access to secure applications where they can buy services. About ForgeRock ForgeRock is redefining identity and access management for the modern web including public cloud, private cloud, hybrid cloud, and enterprise and mobile environments, ForgeRock products support mission-critical operations with a fully open source platform. ForgeRock s Open Identity Stack powers solutions for many of the world s largest companies and government organizations. For more information and free downloads, visit or follow ForgeRock on Twitter at 19 ForgeRock is the trademark of ForgeRock Inc. or its subsidiaries in the U.S. and in other countries. FORGEROCK.COM
G Cloud 6 CDG Service Definition for Forgerock Software Services
G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform
WHITEPAPER OpenIDM. Identity lifecycle management for users, devices, & things
WHITEPAPER OpenIDM Identity lifecycle management for users, devices, & things Introduction Organizations of all sizes employ a variety of different approaches to manage identity administration and provisioning
Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack
White Paper Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack 1. Overview 2. OpenAM 3. OpenIDM 4. OpenDJ 5. Getting Started Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity
PRODUCT BRIEF OpenAM. Delivering secure access for customers, applications, devices and things
PRODUCT BRIEF OpenAM Delivering secure access for customers, applications, devices and things Introduction Identity and access management is going through a new golden age. CEOs are pushing growth as their
WHITEPAPER ForgeRock Identity Management. Identity lifecycle management for users, devices, and things
WHITEPAPER ForgeRock Identity Management Identity lifecycle management for users, devices, and things Introduction Organizations of all sizes employ a variety of different approaches to manage identity
Identity Relationship Management
November 2013 Identity Relationship Management Identity Relationship Management Identity Relationship Management Kantara Initiative, Believers of the World Unite. The Internet of Things is completely redefining
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
The Circle of Life: Protecting Your Sun IAM Investment with ForgeRock s Open Identity Stack (formerly Sun Open Source IAM)
White Paper The Circle of Life: Protecting Your Sun IAM Investment with ForgeRock s Open Identity Stack (formerly Sun Open Source IAM) 1. Overview 2. Understanding the Options 3. Solving the Customer Problem
Securing your business
Securing your business Anders Askåsen Product Manager for OpenIDM * World Wide Coverage ForgeRock.com Enterprise Open Source Software ForgeRock Norway ForgeRock USA ForgeRock UK ForgeRock France Consulting
Enterprise Open Source Identity Middleware. Anders Askåsen, Product Manager
Enterprise Open Source Identity Middleware Anders Askåsen, Product Manager The Day the Music Died Our Mission ForgeRock is an independent software vendor (ISV), whose core mission is to deliver an enterprise-class
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
Extend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
Oracle Identity Analytics Architecture. An Oracle White Paper July 2010
Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
Two-Factor Authentication
Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
Okta White paper Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-dint-053013 Table of Contents
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
Build Your Mobile Strategy Not Just Your Mobile Apps
Mobile Cloud Service Build Your Mobile Strategy Not Just Your Mobile Apps Copyright 2015 Oracle Corporation. All Rights Reserved. What is is it? Oracle Mobile Cloud Service provides everything you need
CTERA Cloud Storage Platform Architecture
CTERA Cloud Storage Platform Architecture Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption The killer apps of cloud storage reviewed Putting cloud storage
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
How can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
Glinda Cummings World Wide Tivoli Security Product Manager
Featured Speaker IBM Security Solutions! Glinda Cummings World Wide Tivoli Security Product Manager 2010 IBM Corporation IBM Security Solutions! How IBM defines Cloud Computing IBM Security Solutions!
The organization decided that creating a more robust approach to customerfacing identity management represented a strategic opportunity.
BUYER CASE STUDY BuyerPulse Buyer Case Study: McKesson Utilizing Open Source IAM: Benefits in Cost, Customization, and Integration Sally Hudson Susan Funke Chris Skall Global Headquarters: 5 Speen Street
Table of Contents. Abstract. Cloud computing basics. The app economy. The API platform for the app economy
Table of Contents Abstract Cloud computing basics The app economy The API platform for the app economy Your API platform: in the cloud or on premises? The cloud deployment model Cloud characteristics The
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
IBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot
CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption Putting cloud storage
midpoint Overview Radovan Semančík December 2015
midpoint Overview Radovan Semančík December 2015 Agenda Identity Management Introduction midpoint Introduction midpoint Architecture Conclusion Identity Management Introduction Identity Management System
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
Moving to the Cloud: What Every CIO Should Know
Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling
<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications
Integrating your On-Premise Applications with Cloud Applications Agenda Hybrid IT Infrastructure An Emerging Trend A New Set of Challenges The Five Keys to Overcoming the Challenges
owncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
Things You Need to Know About Cloud Backup
Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
MOVING TO THE NEXT-GENERATION MEDICAL INFORMATION CALL CENTER
MOVING TO THE NEXT-GENERATION MEDICAL INFORMATION CALL CENTER Pharma companies are improving personalized relationships across more channels while cutting cost, complexity, and risk Increased competition
Real-World Scale for Mobile IT: Nine Core Performance Requirements
White Paper Real-World Scale for Mobile IT: Nine Core Performance Requirements Mobile IT Scale As the leader in Mobile IT, MobileIron has worked with hundreds of Global 2000 companies to scale their mobile
Speeding Office 365 Implementation Using Identity-as-a-Service
August 2015 www.sarrelgroup.com [email protected] Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Is Liferay Right for Your Organization? Seven Things to Consider When Choosing a Portal Platform
Is Liferay Right for Your Organization? Seven Things to Consider When Choosing a Portal Platform BY DAN LILIEDAHL, CTO, TANDEMSEVEN The outcome of your portal initiative and its success is directly related
DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
White Paper: Nasuni Cloud NAS. Nasuni Cloud NAS. Combining the Best of Cloud and On-premises Storage
Combining the Best of Cloud and On-premises Storage Introduction Organizations rely on corporate data for everything from product design to order processing. Files are the lifeblood of the modern enterprise
How To Integrate With Salesforce Crm
Introduction Turbo-Charge Salesforce CRM with Dell Integration Services By Chandar Pattabhiram January 2010 Fueled by today s fiercely competitive business environment, IT managers must deliver rapid,
Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
OKTA WHITE PAPER Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-3waysad-113012 Table
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
The Impact of PaaS on Business Transformation
The Impact of PaaS on Business Transformation September 2014 Chris McCarthy Sr. Vice President Information Technology 1 Legacy Technology Silos Opportunities Business units Infrastructure Provisioning
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development A RapidValue Solutions Whitepaper Contents Executive Summary... 03 Oracle Mobile Application Framework (MAF): The Complete Development
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding www.citrix.com Contents Introduction... 3 The On- boarding Problem Defined... 3 Considerations for Application On- boarding...
Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper
Okta White paper Top 8 Identity and Access Management Challenges with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-top8-113012
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
SUPERVALU Successfully Leverages Tablet Technology and Identity and Access Management Infrastructure for Increased Security and Business Productivity
BUYER CASE STUDY SUPERVALU Successfully Leverages Tablet Technology and Identity and Access Management Infrastructure for Increased Security and Business Productivity Sally Hudson IDC OPINION Global Headquarters:
API Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way
OpenAM Written and tested with OpenAM Snapshot 9 the Single Sign-On (SSO) tool for securing your web applications in a fast and easy way Indira Thangasamy [ PUBLISHING 1 open source 1 community experience
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Building a Cloud-Ready, Future-Proof Identity Infrastructure:
Building a Cloud-Ready, Future-Proof Identity Infrastructure: Three Keys to Success UnboundID Corp. 13809 Research Blvd Suite 500 Austin, TX 78750 512-600-7700 www.unboundid.com Executive Summary Social
How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment
WHITEPAPER How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment www.onelogin.com 150 Spear Street, Suite 1400, San Francisco, CA 94105 855.426.7272 EXECUTIVE SUMMARY
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility
Your Guide to Cost, Security, and Flexibility What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility 10 common questions answered Over the last decade, cloud backup, recovery
Select the right solution for identity and access governance
IBM Security Buyer s Guide June 2015 Select the right solution for identity and access governance Protecting critical assets from unauthorized access 2 Select the right solution for identity and access
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
White paper Contents
Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Management Challenges of Software
People-Focused Access Management. Software Consulting Support Services
People-Focused Access Management Software Consulting Support Services A beautiful experience. Anytime, anywhere. Access: One is an industry-leading Access Management platform that provides you with versatile
Kent State University s Cloud Strategy
Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience
Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Passlogix Sign-On Platform
Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
The Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
CA Technologies Strategy and Vision for Cloud Identity and Access Management
WHITE PAPER CLOUD IDENTITY AND ACCESS MANAGEMENT CA TECHNOLOGIES STRATEGY AND VISION FEBRUARY 2013 CA Technologies Strategy and Vision for Cloud Identity and Access Management Sumner Blount Merritt Maxim
Simplify Identity Management with the CA Identity Suite
SOLUTION BRIEF CA DATABASE IDENTITY SUITE MANAGEMENT IDENTITY FOR MANAGEMENT DB2 FOR z/os DRAFT Answer the cover question by stating how the solution can deliver the desired benefits; typically, technical
EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.
KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings [email protected] October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single
ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT
OMADA IDENTITY SUITE - Adaptable Identity Management and Access Governance Governance Compliance Identity Management Cloud Self-Service Security Complete control of who has access to what is an essential
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
