Extranet Access Management Web Access Control for New Business Services

Size: px
Start display at page:

Download "Extranet Access Management Web Access Control for New Business Services"

Transcription

1 Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control with SSO

2 2013 Evidian The information contained in this document represents the view of Evidian on the issues discussed at the date of publication. Because Evidian must respond to changing market conditions, it should not be interpreted as a commitment on the part of Evidian, and Evidian cannot guarantee the accuracy of any information presented after the date of publication. This is for informational purposes only. EVIDIAN MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. We acknowledge the rights of the proprietors of trademarks mentioned in this book.

3 Contents Increase Revenue... 4 Protecting and Managing Enterprise Internet Access...6 Increase the return on investment for your web portal by extending it to enterprise applications...7 SAM Web Controls the Accesses to the Insurance Company's Applications...8 Controlling Access Centrally or on the Applications...8 Keeping an Access Control List up to date...8 Simplified Access with Web SSO and a Personalized Welcome Page...8 SAM Web Speeds Up Web Services Implementation...9 Secure Web Access Control with SSO Control and Secure User Access...10 Enforce Access Control for any Applications...10 Control Access to Applications and URLs...10 Dynamic Authorizations...10 Authentication Methods...11 Track all User Activity...11 Encrypt Confidential Data...11 Protect Web Resources Against Attacks...12 Creating User Accounts...12 Using the Enterprise LDAP Directories...12 Account Creation by the User...12 Reinitializing a Primary Password...12 Using Multiple Identities...12 Universal Single Sign-On...12 Improve the User Experience and Security with Single Sign-On...13 Single Sign-On to External Web Sites...13 Personalize the End-user s Web Environment...13 The User Can Opt to Manage Sensitive Passwords Himself...13 Extensible to J2EE, SOA and Web Services Project Accesses...14 Extensible to Non-Web Access and Legacy Applications...14 Instant Security for a Low Cost of Ownership...14 A Non-intrusive Solution for Easy Deployment...14 More Effective Administration...15 Lower Ownership Costs A2 08LT Rev02 3

4 Increase Revenue A large B2B insurance company has found a simple way to increase its revenue, by selling a new service to its existing enterprise customers. The new service allows enterprise customers to delegate contract management and accident declaration inside their organization. With this new service The HR departments can manage the list of attributes of contracts and insured employees directly, through a web application. Employees can fill out their own accident declarations and obtain any type of information they may need about their personal situation. Figure 1. New Service Enterprise customer Super User Declare new employee Modify contract attributes HR Manager User Declare accident Consult personal information Employees For Customer enterprise, this new service Speeds up insurance operations by delegating contract management to the HR department. Lowers the central cost of insurance contract management by delegating accident declaration to the customer enterprise employees, and by implementing an information self-service. The accessed data is critical for the insurance company. Since the data is used to compute invoice and premium reimbursement, it can impact the bottom line of the enterprise. Since the data may contain personal health information, it can engage the insurance company's legal responsibility. 39 A2 08LT Rev02 4

5 At the same time, the security risks are important. The people using the new services are not insurance company employees. The security rules for employee workstation are not managed by the insurance company's security policy. Users can access the service through the "wild, wild web". In a second phase, the insurance company wishes to sustain the investments made within the framework of its web project by extending it to the staff of its own enterprise and to their web applications spread over several organizations. To limit its costs, minimize vulnerabilities and maximize staff efficiency, these new services must be based on the authentication and administration services set up in the first phase of the project. Protecting access to data is a key issue for the business success of this new service. 39 A2 08LT Rev02 5

6 Protecting and Managing Enterprise Internet Access In order to protect its data, the insurance company has implemented a secure web access point with three main functions: A network filter, implementing standard firewall mechanisms An HTML code filter, implementing high-level HTML code analysis to protect it from malicious incoming code User access control, implementing strong authentication and access authorization checks to protect it from malicious users Figure 2. Strong Access Control Point LDAP Enterprise customer Firewall Firewall Access Management HR Manager Super User HTML Code Filter Customers & Contracts User Premium Calculation Employees Secure Access Manager - Web Edition 39 A2 08LT Rev02 6

7 Increase the return on investment for your web portal by extending it to enterprise applications To control its employees' access and protect the data on the web applications spread all over its organizations, this insurance company has introduced modules known as Web agents on each of the target web servers. Figure 2.1. Architecture Web Agents de SAM Web SAM Web Audit Employees Employees SSL Authentication Welcome Page SSO Web Agents SSO MySAP Enterprise Browsers SSL Web Agents WebLogic In the present case, the web agents are installed on the web server of two organizations: Finance and Internal Publications. The web agents of the Finance organization secure the access to MySAP, while the web agents of the Internal Publications organization secure the access to WebLogic. This architecture uses the same authentication and administration server deployed with the Evidian security gateway. The administration server enables you to define and implement an enterprise-specific security policy. However, the employee LDAP base is different from the one used for the partners' accesses. The following security functions are implemented: Authentication of users based on password, and on their profile for direct access to the Finance and Internal Publications URLs Single Sign-On To enable the enterprise to be always more efficient and cooperate more closely with its partners, the solution would allow this architecture to be extended to partner Web Services. This solution would also allow this enterprise to deploy commercially-available or open-source J2EE server applications. 39 A2 08LT Rev02 7

8 SAM Web Controls the Accesses to the Insurance Company's Applications SAM Web is a web security gateway that intercepts every HTML request and verifies the associated user's access rights. Controlling Access Centrally or on the Applications Each time a customer requests a URL, SAM Web checks customer access rights before allowing or if necessary denying the request. The SAM Web access control modules are placed either at the entrance to the most protected area of the information system (gateway mode), or on the server on which the application to be protected is located (Web agent mode). In the first phase of the project, the insurance company uses SAM Web in gateway mode within the DMZ. SAM Web is thus a mandatory gateway to the applications. All application accesses must be authorized. In the second phase, the company deploys web agents on its application servers spread over different organizations. Keeping an Access Control List up to date The insurance company has delegated the role of "user access manager" for enterprise customer employees to the HR managers: it is these HR managers who can declare, modify, and remove the access rights of their employees. The delegated management application is an in-house application that feeds the SAM Web LDAP directory to implement access rules. Simplified Access with Web SSO and a Personalized Welcome Page This SAM Web Single Sign-On feature simplifies access by providing: Primary authentication when the user first connects to SAM Web A welcome page that shows only authorized applications Transparent secondary access to target applications without supplementary user authentication, whatever the authentication method of the primary authentication (OTP or login/password). This function is called Single Sign-On. 39 A2 08LT Rev02 8

9 SAM Web Speeds Up Web Services Implementation The simple and powerful SAM Web architecture is a key factor for secure deployment of new web business services. SAM Web Features Non-intrusive solution and integration with LDAP directories Robust authentication, SSO and URL control Reverse Proxy Architecture or Web Agent Centralized Administration SAM Web Management Console Centralized Audit Implementing new Web Services Accelerate the creation of 24x7 on-line web access Guarantee the security and confidentiality of information Access to information is dynamically implemented according to each user's characteristics. Separate security from web applications and allow the use of customized architecture Add new web servers and applications simply Fewer clicks to revoke job relevant access Track all user and administrator activities 39 A2 08LT Rev02 9

10 Secure Web Access Control with SSO Control and Secure User Access Traditionally, as businesses move online, security enforcement falls to the administrators of each application. As applications are added, the number of administrators and security policies quickly becomes unmanageable. This kind of patchwork approach to security results both in security breaches and end-user frustration. Enforce Access Control for any Applications SAM Web allows you to define and manage what applications and resources users can access. Instead of having each resource manager control security on their servers, SAM Web centralizes access control management of web resources. Through an easy-to-use console, an administrator can control user access dynamically. New employees can be added to the appropriate groups and gain access to multiple applications immediately. With SAM Web, former partners and employees can be deprived of access to company services with a mouse click. With SAM Web, you can enforce a comprehensive security policy across internal as well as external web resources. Control Access to Applications and URLs Dynamic Authorizations The SAM Web URL access control modules can be placed either at a security gateway on a line interruption or on the applications themselves on the same servers. SAM Web allows the implementation of three architecture types: Purely "gateway" architecture in which the access control module is placed at a line interruption on a single gateway Purely "Web agent" architecture in which the access control module is placed on the application servers to be protected Mixed "Web agent"/"gateway" architecture in which, depending on the security policy, network and application architecture and optimization of network flows, the control points may be located either on the line interruption or on servers. URL and application access authorizations can be calculated dynamically using simple "And", "Or", "Not" rules applied to the user attributes available in the LDAP directory. These rules are centrally defined by the administrator then applied by the access control modules. 39 A2 08LT Rev02 10

11 Authentication Methods SAM Web can authenticate users with different methods such as: Classical identifier and password Virtual keyboard for identifier and password. This lets you enter your identifier and password by clicking on a keyboard displayed on the PC s screen. A virtual keyboard improves the protection of the identifier and password against key loggers, without using a strong authentication device. One-time password Smart card with X.509 certificates X.509 certificates (including CRL and OCSP) Kerberos token SAML token (e.g. VPN access) Radius-based authentication Track all User Activity Any proper access management policy requires monitoring. SAM Web tracks all user accesses or access attempts, in order to protect web resources and thus enable security administrators to monitor who has accessed what and when. Manage Securely and Quickly Multiple Web Accesses 1. Separation between the security infrastructure and application deployment. 2. A non-intrusive solution without any developments. 3. Offering high scalability and availability. SAM Web is compatible with log analysis tools such as NetIQ WebTrends. This makes it easier for administrators to review security audit records. Encrypt Confidential Data To guarantee the confidentiality of the data exchanged on the Internet, the partners must open encrypted sessions. As more and more companies now work on line, encrypting each web application is becoming a problem, because not all applications can be encrypted. With SAM Web, all communications with the browser can be encrypted. Customers, employees and partners can dialogue in all confidence within the community of sites managed by SAM Web. 39 A2 08LT Rev02 11

12 Protect Web Resources Against Attacks Creating User Accounts SAM Web helps prevent attacks against web resources exposed on the Internet. The SAM Web gateway hides the real address of web resources. It alters the URL of web applications to prevent hackers from knowing the network topology. SAM Web also acts as a gatekeeper for all web accesses, making it easier to protect against worms or other attacks the web applications that require an access code. SAM Web is consistently integrated into existing user management processes. Using the Enterprise LDAP Directories SAM Web reuses the user definition contained in the enterprise's different LDAP directories. The LDAP directories may be from different suppliers, have different structures and be located on different sites. Account Creation by the User Depending on the existing security policy, a user may be authorized to create a personal account in a predefined LDAP directory, by connecting to SAM Web. The account can then be integrated by an administrator into the company's general access control policy. Reinitializing a Primary Password Using Multiple Identities Universal Single Sign-On When a user forgets his or her primary password, SAM Web offers the user the possibility to reinitialize this primary password using a question/answer form. The user does not need any assistance from the help desk. The password creation policy defined by the enterprise (number of characters, non-use of an already existing password, etc.) is then applied. A user can access several domains using the same name. Each identity is then defined in a different LDAP directory. We then talk in terms of different domains. These different domains may, for instance, correspond to different enterprises, subsidiaries or organizations. SAM Web enables the user to choose his domain during initial authentication. He is then granted the rights associated with the identity of the domain he has chosen. Traditional security solutions impede efficiency and taint the user experience. SAM Web's streamlined approach to security improves user loyalty. By facilitating navigation with single sign-on and improving the user experience with customized content, SAM Web improves user productivity and confidence. 39 A2 08LT Rev02 12

13 Improve the User Experience and Security with Single Sign-On When users are expected to provide a password for each internal and external application, enforcing security infringes on accomplishing business. Managing multiple login information is time-consuming and frustrating. Users find shortcuts such as choosing weak passwords or leaving them in conspicuous places. Password-related help-desk calls make up a significant portion of help-desk costs. Multiple passwords not only impede business by damaging the user experience and productivity, they also lead to security breaches. With SAM Web, customers, partners or employees access internal and external Web resources with one user name and password. After an initial authentication by SAM Web, they can navigate freely among the resources that they are allowed to access. Transparently to the user, SAM Web supplies each application with the appropriate password, in particular by means of forms. Single Sign-On to External Web Sites With the activity of organizations extending beyond the firewall across multiple domains, single sign-on also needs to follow the same path: Intranet portals often allow access to purchasing web sites or subscription services, extranets can cover multiple partner sites. With SAM Web, portal managers can control their web environment by adding and removing resources dynamically. Users can access resources outside of the enterprise without being prompted for another password. SAM Web's Single Sign-On solution improves security, user experience and reduces help desk calls. Personalize the End-user s Web Environment While navigating the Web is notoriously impersonal as users often have irrelevant links on their welcome page, SAM Web customizes the user experience, giving users a feeling of community. With SAM Web, users in certain industries and geographic areas can be provided with personal information and access. Customers and partners access to services can be multi-tiered. This ability to respond to users' needs with SAM Web makes users feel like members of a trusted community by providing seamless navigation between authorized applications. The User Can Opt to Manage Sensitive Passwords Himself Passwords can be managed either by the manager or by the end-user. Group passwords can be transparent to the users. For instance, the manager can grant members of a certain group access to analyst reports without informing them of the company password. Similarly, when employees access their web mail accounts, the portal administrator will not know their password. 39 A2 08LT Rev02 13

14 Extensible to J2EE, SOA and Web Services Project Accesses Thanks to AccessMaster's modular architecture, the SAM J2EE module extends SAM Web functions by offering an integrated SSO solution to J2EE, SOA and Web Services environments. Using a common authentication and administration server, SAM Web and SAM J2EE cooperate to offer users a Single Sign-On both for Web environments and J2EE and Web Services environments. Thanks to SAML technologies, SAM J2EE simply extends the SAM Web access control functions to interconnect portals or Web applications to J2EE servers or to internal and external Web Services. Extensible to Non-Web Access and Legacy Applications Not all applications are web-enabled. Secure Access Manager Standard Edition can address non-web applications; it complements SAM Web to provide a complete and integrated solution for securing and simplifying access to non-web, legacy and clientserver applications. Instant Security for a Low Cost of Ownership With SAM Web, you do not have to sacrifice convenience for security. SAM Web does not require any modification or component on user desktops or target systems. The other solutions in the marketplace today are overcomplicated, requiring months to deploy and consuming precious IT resources. Keep Control of Security 1. Centralized administration: minimize costs of security skills and minimize security administration tasks. 2. Flexible Administration: add or revoke simply new web servers and applications in few clicks. 3. Secure access control to instantly know who has accessed what (central audit). A Non-intrusive Solution for Easy Deployment Thanks to its non-intrusive architecture, SAM Web can be fully deployed in a matter of hours, enabling the extended corporation to change as quickly as the market does. Downloadable from the Web, SAM Web is one piece of software and is standards based. 39 A2 08LT Rev02 14

15 More Effective Administration Lower Ownership Costs SAM Web enables portal or web server managers to seamlessly manage access to any web application without deploying any software, and without reorganizing the directories. There is no need to modify any existing administration processes or applications. SAM Web reuses the existing LDAP user directories to apply a security policy to the enterprise resources. SAM Web enables you to dramatically reduce additional IT costs. No need to redefine or modify user directories. Increases your return on investment for web projects, by facilitating the extension of portal projects to Java and SOA environments. No need to update SAM Web when a protected application is updated. The end result is a full security solution that most simplifies access to end-users, with the least ownership cost. 39 A2 08LT Rev02 15

16 For more information go to

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Sarbanes-Oxley Compliance and Identity and Access Management

Sarbanes-Oxley Compliance and Identity and Access Management A Bull Evidian White Paper Summary of Contents Introduction Sarbanes-Oxley Reference Framework IAM and Internal Controls over Financial Reporting Features Improve Efficiency with IAM Deploying IAM to Enforce

More information

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

Last Updated: July 2011. STATISTICA Enterprise Server Security

Last Updated: July 2011. STATISTICA Enterprise Server Security Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...

More information

Oracle Access Manager. An Oracle White Paper

Oracle Access Manager. An Oracle White Paper Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents

More information

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003 Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

API-Security Gateway Dirk Krafzig

API-Security Gateway Dirk Krafzig API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing

More information

CA SiteMinder SSO Agents for ERP Systems

CA SiteMinder SSO Agents for ERP Systems PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security

More information

SSO and Call Center. Summary. An Evidian White Paper. Version 1.1b

SSO and Call Center. Summary. An Evidian White Paper. Version 1.1b SSO and Call Center An Evidian White Paper Version 1.1b Summary SSO and Organization A Mobile Telephony Operator s Call Center Business Process Tools for Handling Emergency Situations Some Advantages not

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

IT@Intel. Improving Security and Productivity through Federation and Single Sign-on

IT@Intel. Improving Security and Productivity through Federation and Single Sign-on White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data

More information

SharePoint 2013 Logical Architecture

SharePoint 2013 Logical Architecture SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.

More information

Perceptive Experience Single Sign-On Solutions

Perceptive Experience Single Sign-On Solutions Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is intended

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016

Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016 Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016 The World s Changed What is my account balance? The World s Changed Internal Security Standards

More information

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER OVERVIEW OF OPEN VIRTUAL DESKTOP Mathieu SCHIRES Version: 1.0.2 Published April 9, 2015 http://www.inuvika.com Contents 1 Introduction 2 2 Terminology and

More information

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity

More information

Why MobilityGuard OneGate?

Why MobilityGuard OneGate? Any Scenario for Access Just One Solution Why MobilityGuard OneGate? Scenarios 1 Access from Anywhere 2 Strongly Identify Your Users 3 No more Post-IT notes with Single Sign-On 4 Three Click Access Administration

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

IBM Maximo technology for business and IT agility

IBM Maximo technology for business and IT agility IBM Software Tivoli March 2010 IBM Maximo technology for business and IT agility IBM asset and service management solutions 2 IBM Maximo technology for business and IT agility Contents 2 Executive summary

More information

Enterprise SSO Manager (E-SSO-M)

Enterprise SSO Manager (E-SSO-M) Enterprise SSO Manager (E-SSO-M) Many resources, such as internet applications, internal network applications and Operating Systems, require the end user to log in several times before they are empowered

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

Collaboration solutions for midsized businesses Buyer s guide

Collaboration solutions for midsized businesses Buyer s guide Collaboration solutions for midsized businesses Buyer s guide Increase productivity by improving collaboration across and beyond your business. Give employees access to the information, people and resources

More information

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

SonicWALL SSL VPN 3.5: Virtual Assist

SonicWALL SSL VPN 3.5: Virtual Assist SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

Vidder PrecisionAccess

Vidder PrecisionAccess Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...

More information

StoneGate Administrator's Guide SSL VPN 1.1

StoneGate Administrator's Guide SSL VPN 1.1 StoneGate Administrator's Guide SSL VPN 1.1 Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current end-user license agreement,

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Intelligent Application Gateway with SA server using AD password and OTP Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Service management White paper. Manage access control effectively across the enterprise with IBM solutions. Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access

More information

White Paper Secure Reverse Proxy Server and Web Application Firewall

White Paper Secure Reverse Proxy Server and Web Application Firewall White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security

More information

Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software

Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software FAST, RELIABLE, & JUST WORKS! White Paper Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software Proxy Networks, Inc. 877-PROXY-US or 617-453-2700 www.proxynetworks.com

More information

WatchGuard SSL 2.0 New Features

WatchGuard SSL 2.0 New Features WatchGuard SSL 2.0 New Features For Secure Remote Access, Identity Management, and Network Access Control Introduction WatchGuard SSL 2.0 unifies identity and access management capabilities, with features

More information

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as

More information

Web Access Management. RSA ClearTrust. Enhancing control. Widening access. Driving e-business growth. SSO. Identity Management.

Web Access Management. RSA ClearTrust. Enhancing control. Widening access. Driving e-business growth. SSO. Identity Management. RSA ClearTrust Web Access Management Enhancing control. Widening access. Driving e-business growth. Identity Management Authentication Centralized Security Policy SSO Access Management RSA ClearTrust Web

More information

Welcome Guide for MP-1 Token for Microsoft Windows

Welcome Guide for MP-1 Token for Microsoft Windows Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Understanding Enterprise Cloud Governance

Understanding Enterprise Cloud Governance Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination

More information

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations

More information

Best Practices for Secure Remote Access. Aventail Technical White Paper

Best Practices for Secure Remote Access. Aventail Technical White Paper Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.

More information

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

White Paper. McAfee Cloud Single Sign On Reviewer s Guide White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF

A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF Whitepaper 08/17/2015 Summary 1. Introductio... 3 1.1 What is TMG / UAG?... 3 2. How can

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide ii Preface Copyright Information: Symantec Corporation Copyright

More information

A brief on Two-Factor Authentication

A brief on Two-Factor Authentication Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.

More information

ADMINISTRATOR S GUIDE

ADMINISTRATOR S GUIDE STONEGATE SSL VPN 1.4.3 ADMINISTRATOR S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current

More information

Cybersecurity and Secure Authentication with SAP Single Sign-On

Cybersecurity and Secure Authentication with SAP Single Sign-On Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle

More information

Integrating EJBCA and OpenSSO

Integrating EJBCA and OpenSSO Integrating EJBCA and OpenSSO EJBCA is an Enterprise PKI Certificate Authority issuing certificates to users, servers and devices. In an organization certificate can be used for strong authentication.

More information

Avaya Mailbox Manager and Unimax 2nd Nature A Comparison

Avaya Mailbox Manager and Unimax 2nd Nature A Comparison Unifying Voice Administration Technical Brief Avaya Mailbox Manager and Unimax 2nd Nature A Comparison SUPPORT FOR MAILBOX MANAGER WILL END WITH M O D U L A R M E S S A G I N G 5. 1. U N D E R S TA N D

More information

Leveraging SAML for Federated Single Sign-on:

Leveraging SAML for Federated Single Sign-on: Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Security solutions Executive brief. Understand the varieties and business value of single sign-on. Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies

More information

TFS ApplicationControl White Paper

TFS ApplicationControl White Paper White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets

More information

Citrix Password Manager 4.1

Citrix Password Manager 4.1 F E A T U R E S O V E R V I E W Password Manager 4.1 The access platform provides on-demand access to information, and Password Manager makes that information available with a single logon. Password Manager

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

Enterprise Single Sign-On City Hospital Cures Password Pain. Stephen Furstenau Operations and Support Director Imprivata, Inc. www.imprivata.

Enterprise Single Sign-On City Hospital Cures Password Pain. Stephen Furstenau Operations and Support Director Imprivata, Inc. www.imprivata. Enterprise Single Sign-On City Hospital Cures Password Pain Stephen Furstenau Operations and Support Director Imprivata, Inc. www.imprivata.com Application Security Most organizations could completely

More information

Copyright http://support.oracle.com/

Copyright http://support.oracle.com/ Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

WebNow Single Sign-On Solutions

WebNow Single Sign-On Solutions WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,

More information

BlackShield Authentication Service

BlackShield Authentication Service BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.

More information

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT Foreword by Prof. Wolfgang Lassmann... 15 Foreword by Dr. Sachar Paulus... 17 1 Introduction...

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information