A SECURITY MODEL THAT WORKS FOR YOU!
|
|
|
- Osborne Shepherd
- 10 years ago
- Views:
Transcription
1 A SECURITY MODEL THAT WORKS FOR YOU! SEPTEMBER 13, COPYRIGHT JERI HALE- UT DALLAS ALL RIGHTS RESERVED
2 Jeri Hale, University of Texas at Dallas Director of IR Quality, Compliance, and Accessibility at UTD with over 27 years experience in security, internal controls, implementations, process design, business analysis, and development. Designed Security, Integrations, and HCM custom applications at UTD. Currently responsible for compliance reviews, audit coordination, and quality consulting for all enterprise applications. Ben Dai, Tunabear Consulting, Inc. Principle Consultant for Tunabear Consulting, Ben s extensive PeopleSoft experience, along with MBA, CPA, and HUB certifications give him unique perspective and insight. Under Ben s direction and hands-on efforts, Tunabear developed many of the customizations and integrations needed for the security model.
3 Enrollment: 17,800 Among top ranked schools management/geosciences & best value Ranked 29 th in world s most outstanding young universities (Times Higher Education) Executive MBA Ranked #1 in Texas and #10 in USA (Financial Times)
4 Boutique Consultancy with User Experience Methodology for tight communication links Usability Assessments Key Milestones Customer Satisfaction Role on the Security Implementation: Web Services (Inbound Integrations) PeopleCode Role Rules Outbound Integrations App Engine Dynrole & Data Storage Solutions
5 PeopleSoft 9.0/9.1 Enterprise Portal FMS / SCM HCM / Global Payroll Campus Solutions PeopleTools Linux DB Server NT Application Server/Web Server Oracle Database Business Intelligence Enterprise Edition Higher Ed Constituency Hub Identity Manager Server Technology Linux DB NT Application/Web SciQuest Higher Markets
6 UT Dallas security model overview for business/student applications "computing cloud UT Dallas critical control objectives: Accessibility Auditability Administrative feasibility Functional/Technical Methods meeting control objectives Portal as single point of entry for security administration and computing cloud
7 THE CHALLENGE THE COMPUTING CLOUD
8
9 TECHNICAL/FUNCTIONAL How do we secure it? USER EXPERIENCE How do we maintain it? AUDITABILITY How do we control and track changes? EFFICIENCY How do we keep it clean? ADMINISTRATION How can we AFFORD effective security and controls?
10 Situation Shared HCM/FMS Databases at UT System Domain UTD-Specific Portal/Campus Solutions Varied User Types Technical(Developers/Batch IDs) Functional (Super Users and Functional Processes) Departmental (Campus-Based Department Users) End-Users (Self Service) Systems (Sys Adm / Integrations) Other Campuses Technical Challenges Campus-specific User IDs Campus-specific authentication services Campus-specific Portal Content Multiple EmplIDs for Campus & Shared HCM/FMS Campus-specific Row Security Campus-specific Process Schedules Campus-specific Primary Permissions Campus-specific Business Processes Campus-specific IT and Security Policies Campus-specific Dynamic Role Criteria
11 THE SOLUTION THE SECURITY MODEL
12 Web Services communicates between two electronic devices over the Internet usually includes a broker that looks for web-based messages formatted in XML protocol Digital Certificate brokers encryption keys using web services for Secure Socket Layer (SSL) communications over the server Lightweight Directory Access Protocol(LDAP) accesses and maintains distributed directories on web services LDAP Attributes identifies attributes associated with an LDAP account that grant it access to various internet services
13 User Profile Defines PeopleSoft user accounts Roles Identifies PeopleSoft object permissions for a user Permission lists Grants access to PeopleSoft objects Dynamic roles Assigns roles using programs and web services
14 Security Model UT Dallas s conceptual model for securing its enterprise application systems within the cloud Golden Roles Role-based (rather than access-based) roles. These are the roles we centralized on the portal Role System Identifier identifies systems to which the Golden Roles pertain Role Map maps PeopleSoft roles to standard roles in hosted systems (i.e., SciQuest/OBIEE) Constituent Roles sources roles from LDAP attributes
15 Accessible Auditable Security Model Design Administratively Feasible
16 Easy Signon - LDAP Authentication/Single Sign-on Across Domains Role-Based Roles = Assigned Duties Desktop Single set of roles OR ability to map to a single set of roles across all systems in the computing cloud Provisions standardized across all systems based on campus business process requirements Permissions attached to roles within each database Auto-Provisioning Access assigned based on users identifying information (Employee Applicant Student Alumni)
17
18
19
20 Database Audit Triggers for role assignments Writes ANY change to an audit table (Online or SQL updates) Downside on same database looking at Oracle Governance, Risk, and Compliance Platform for this purpose LDAP data logged upon login Expired IDs archived before role removal Logon Logs archived before purged Access/Role assignment reports for entire cloud from Portal Electronic justification for Role-Based Access
21 Automate User Creation and Constituent (SS) Role Assignment at Signon Centralize Security Administration Single Task for Role Assignment Across the Cloud Row Security Roles Dynamic Role Assignment Based on Jobcode, Dept Mgr ID, Project Team, Chartfield Attributes, etc. Role Grant for Functional Roles Extends administrative capabilities to functional security administrators
22
23 THE DETAILS HOW WE DID IT
24
25 User Creation/Updates with Signon PeopleCode Log Tables Multiple User Types using ID Type Table Role System Identifiers User Sync Messaging Dynamic Role Rules: PeopleCode Role Rules with Web Services to access criteria in source systems Query Rules - Criteria Inside Portal Custom AE Dynrole Process Sciquest Signon XML Portal Content Reference Links Dynamically assigned OBIEE SQL Access to Portal Database
26 1) LDAP Authentication (signon PeopleCode) 2) Creates User Profile 3) User Types = Different ID s Human Capital Management Campus Solutions 4) PeopleSoft SSO (cross-domain webserver alias)
27
28
29 INITIAL PROVISIONING HCM HECH - Person Data/ Relationships OIM - NetID & Address) LDAP - Access Attributes Campus Solutions Portal - Role Assignment R O L E S Y S I D HCM - User Profiles/ Constituent Roles FMS - User Profiles/ Constituent Roles Campus Sol User Profiles/ Constituent Roles OBIEE (Applicable Users/Roles)
30 SECONDARY PROVISIONING HCM Empl Status, JobCode Position, Dept, etc. Request System: Manual Role & Row Sec Requests FMS- Chartfield Attribute, Project Team, etc. W E B S E R V I C E S CS Prog/Plan Status, Class Instructor, etc. Portal - Role Assignment R O L E S Y S I D HCM - User Profiles/ Constituent Roles FMS - User Profiles/ Constituent Roles Campus Sol User Profiles/ Constituent Roles OBIEE (Applicable Users/Roles)
31 Clone user sync message for each system Correct EmplID for Correct System Uses Role System Identifiers to filter by target Sends manually and automatically assigned roles Sends changes to user profile locks, password changes, rowsecclass, and primary permissions
32 LDAP Attributes to mapped to Constituent Roles used for Self Service and assigned/updated during Signon Dynamic role assignment Based on attributes in Psoft tables (Job Data, Student Data, Project Data, etc.) Custom Web Services among systems deliver assignment criteria Dynamic role assignment customization -- ONLY updates when someone s roles should be changed Large files with many changes are messaged to Portal, where dynamic role rules run
33 Hourly on the half hour: Job data refreshed from Job Record Hourly on the hour: PeopleCode Rules with custom web services Query Rules against Job Record/Role System IDs
34
35 Required Users in Temp Table (as delivered) Identify required changes against RoleUser (mod) Assign only changes Trigger User Sync messages Routing based on Role System Identifier
36 PeopleSoft Roles Mapped to Sciquest Roles Employees are Shoppers Web Service to FMS Identifies Approvers and accessible Cost Centers XML sends User Info, SciQuest Role (functional access), Cost Centers (row access) Creates Sciquest User
37
38 Dynamically assigned based on Role-System IDs Limits required security maintenance for Portal Content References Query rules inserted at signon and updated on the hour
39
40 Universal interface utilizing standard XML SOA model Disparate systems working as one Powerful Flexible and scalable, secure and synchronous
41 Beyond Single Sign On Disparate Applications working seamlessly External vs. Internal Bottom line that defines success SOA, Web Services, Cloud -- User does not have to know where they are, just WHAT THEY ARE DOING
42 HECH/OIM Testing with the Model no test Active Directory Load Testing Message Queues - User Sign-on vs. Dynamic Role Dynamic Role locks on User Profile Logging for Finding out PURGE the logs, app message queues, archive tables, audit tables, process scheduler Rebuild audit triggers when move from one environment to another Timeouts across domains
43
<Insert Picture Here> PeopleTools Security, What's New in PeopleTools 8.50
PeopleTools Security, What's New in PeopleTools 8.50 Tom Lenz & Sushma Patel Principal Support Engineer Oracle PeopleTools Global Customer Support The following is intended to outline
PeopleSoft Enterprise Directory Interface
PeopleSoft Enterprise Directory Interface Today s self-service applications deliver information and functionality to large groups of users over the internet. Organizations use these applications as a cost-effective
1 Attack Top Attackers Report, Top Targets Report, Top Protocol Used by Attack Report, Top Attacks Report, Top Internal Attackers Report, Top External Attackers Report, Top Internal Targets Report, Top
USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August
CS HCM Integration FAQ May 2010
CS HCM Integration FAQ May 2010 Document Purpose The purpose of this document is to ensure that our Customers, as well as the Oracle Field, Support, Consulting and Strategy teams understand the CS-HCM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
Course Duration: 3.5 Days. CPE Hours Available: 32 CPE. Knowledge Level: Intermediate. Field of Study: Auditing. Prerequisites: None
Auditing PeopleSoft To effectively manage risk in most organizations today, internal auditors and control specialists must have a thorough knowledge of PeopleSoft security and control features. During
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator
IDENTITY MANAGEMENT ROLLOUT: IN A HURRY Jason Blackader, UNIX Systems Administrator Undergraduate, Graduate, Continuing Ed Industrial Design, Communication Design, Design Sciences, Arts & Media Two Campuses
Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008
Oracle Business Intelligence Enterprise Edition LDAP-Security Administration White Paper by Shivaji Sekaramantri November 2008 OBIEE LDAP-Security Administration Before You Start... 3 Executive Overview...
Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Group Management Server User Guide
Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
Okta White paper Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-dint-053013 Table of Contents
September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence
September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple
Banner overview. Authentication to Banner & 3 rd Party Apps. Authorization to Banner & 3 rd Party Apps
Banner overview Authentication to Banner & 3 rd Party Apps Authorization to Banner & 3 rd Party Apps 1 Section 1 Higher Education Enterprise Resource Planning (ERP) system. Original vendor SunGard Higher
identity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
Oracle Cloud 25.09.14. Bjarte Drivenes Enterprise Architect. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Oracle Cloud 25.09.14 Bjarte Drivenes Enterprise Architect Copyright 2014 Oracle and/or its affiliates. All rights reserved. Copyright 2014 Oracle and/or its affiliates. All rights reserved. Agenda Private
Pentaho Reporting Overview
Pentaho Reporting Copyright 2006 Pentaho Corporation. Redistribution permitted. All trademarks are the property of their respective owners. For the latest information, please visit our web site at www.pentaho.org
Shared Accounting Module Trading Partner Integration Guide
Trading Partner Integration Guide Document Version 2.2 Table of Contents How to Use This Document... 2 Section 1: Services and Options... 2 Section 2: SAM Technical Overview... 7 Section 3: Getting Started...
OracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
White Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation
Integrating Biometrics into the Database and Application Server Infrastructure Shirley Ann Stern Principal Product Manager Oracle Corporation 1 Agenda! Introduction Importance of the infrastructure Role
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple how-to whitepapers will
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
IBM Security Access Manager for Web
IBM Security Access Manager for Web Secure user access to web applications and data Highlights Implement centralized user authentication, authorization and secure session management for online portal and
Swedbank Payment Portal Implementation Overview
Swedbank Payment Portal Implementation Overview Product: Hosted Pages Region: Baltics September 2015 Version 1.0 Contents 1. Introduction 1 1.1. Audience 1 1.2. Hosted Page Service Features 1 1.3. Key
Protected Trust Directory Sync Guide
Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory
OTM Performance OTM Users Conference 2015. Jim Mooney Vice President, Product Development August 11, 2015
OTM Performance OTM Users Conference 2015 Jim Mooney Vice President, Product Development August 11, 2015 1 Program Agenda 1 2 3 4 5 Scalability Refresher General Performance Tips Targeted Tips by Product
ACE Management Server Deployment Guide VMware ACE 2.0
Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support
Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support Learning & Development Specialist Customer Support Services Been with Microsoft for 7 years Professionally
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.
Exam : P_ADM_SEC_70 Title : SAP Certified Technology Professional - Security with SAP NetWeaver 7.0 Version : Demo 1 / 5 1.Which of the following statements regarding SSO and SAP Logon Tickets are true?
Synchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory
WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide
TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide October 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator
Take Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
Arisant s Identity Management (IdM) for K-12 Education
Arisant s Identity Management (IdM) for K-12 Education IMPLEMENTING A NEW IDENTITY FOR ONLINE EDUCATION Top IdM Drivers Security/Privacy 81% Increase User Services & Access Disparate Systems 57% Regulatory
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
Installation & Configuration Guide User Provisioning Service 2.0
Installation & Configuration Guide User Provisioning Service 2.0 NAVEX Global User Provisioning Service 2.0 Installation Guide Copyright 2015 NAVEX Global, Inc. NAVEX Global is a trademark/service mark
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Onegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
Denodo Data Virtualization Security Architecture & Protocols
Denodo Data Virtualization Security Architecture & Protocols XLS Security Architecture & Protocols We include hereinafter a description of the security support in the Denodo Platform. The following diagram
OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA
OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA Technical Guide Active Directory/Infinite Campus Integration in the KETS Environment Version 1.3 February 24, 2015
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
Detailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19 WWW.EISOO.COM
Detailed EISOO AnyBackup Family 1 / CONTENT Chapter 1. About AnyBackup Family... 4 Chapter 2. Detailed... 5 2.1 Data Protection... 5 2.2 Regular Backup... 6 2.3 Regular Backup and Restore for File... 7
The Top 3 Identity Management Considerations When Implementing Google Apps for the Enterprise
The Top 3 Identity Management Considerations When Implementing Google Apps for the Enterprise Google Apps for Work (formerly known as Google Apps) is quickly becoming one of the most popular cloud-based
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions
Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
PeopleSoft Financials Overview
PeopleSoft Financials Overview How Does This Course Work? Getting Around You can use your Keyboard to move through the tutorial screens. Click the Down Arrow to display a page and move to the next page.
Single Sign On for ShareFile with NetScaler. Deployment Guide
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
Oracle Data Integrator 11g New Features & OBIEE Integration. Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect
Oracle Data Integrator 11g New Features & OBIEE Integration Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect Agenda 01. Overview & The Architecture 02. New Features Productivity,
There are more security levels in ARCHIBUS, as described bellow.
Glossary: VPA = Virtual Private ARCHIBUS restriction SSO = Single Sign-On LDAP = Lightweight Directory Access Protocol WebCentral = ARCHIBUS Core Engine IIS = Internet Information Services (IIS, formerly
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Active Directory Integration WHITEPAPER
Active Directory Integration WHITEPAPER Even as enterprises continue to adopt more cloud applications, Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) still play a critical role
Active Directory Integration 855.426.7227. www.onelogin.com twitter.com/onelogin ONELOGIN WHITEPAPER
Active Directory Integration Even as enterprises continue to adopt more cloud applications, Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) still play a critical role in how information
The Centrify Vision: Unified Access Management
The Centrify Vision: Unified Access Management Control, Secure and Audit Access To Your On-Premise and Cloud-based Infrastructure On-premise Centrify the Enterprise Cloud Personal Devices Mobile Devices
DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
Creating a Strong Security Infrastructure for Exposing JBoss Services
Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products
Introduction. Connection security
SECURITY AND AUDITABILITY WITH SAGE ERP X3 Introduction An ERP contains usually a huge set of data concerning all the activities of a company or a group a company. As some of them are sensitive information
Finance Reporting. Edition (OBIEE) Training
Finance Reporting Oracle Business Intelligence Enterprise Edition (OBIEE) Training Corazon Wong July 2009 Topics to be Covered Data Warehouse Overview OBIEE Answers and Dashboards Business Intelligence
owncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
HelpSystems Web Server User Guide
HelpSystems Web Server User Guide Copyright Copyright HelpSystems, LLC. Robot is a division of HelpSystems. HelpSystems Web Server, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013
Government of Canada Directory Services Architecture Presentation to the Architecture Framework Advisory Committee November 4, 2013 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks Objective for
