|
|
|
- August Short
- 10 years ago
- Views:
Transcription
1 SUCCESSFULLY MANAGING A WEB SINGLE SIGN ON PROJECT This paper is designed for senior managers wanting to know what their expectations should be of their WSSO project manager, consulting staff and project team during a WSSO implementation. It briefly touches on some of the key points to watch for when managing a web single sign on (WSSO) project in order to minimize risk, costs and time to deployment while ensuring a sustainable infrastructure by the enterprise staff after the consultants and product vendor specialists leave. Copyright, Guy Huntington, HVL. INTRODUCTION Deploying a Web Single Sign On (WSSO) project in an n-tier environment is akin to conducting a game of chess on multiple levels. A change in one tier can affect all the others. What looks simple therefore on an executive PowerPoint presentation extolling the virtues of WSSO, is very complicated in real life to implement and sustain. This paper is aimed at those who are either contemplating such an initiative or, those folks left holding the bag to deploy after the executive decision to proceed has been made. If your WSSO initiative involves only one application, a single operating system and the same type of web or portal servers, you may not need this paper. BUT, if you re in a large enterprise environment with multiple NOS s, web servers, portals, reverse proxies, different hardware platforms, multiple identity data stores and multiple applications to integrate into WSSO, read on. REALITY CHECK Contemplate for a moment your large WSSO deployment a year or two from now down the road when a majority of your applications are using it for authentication and various forms of authorization. What would happen if your WSSO didn t work for a minute, an hour or several hours? Your employees, customers and business partners would not be able to access or use any application dependant upon WSSO. What impact would that have on the enterprise s productivity, the enterprise bottom line, customer and business relationships etc.? It s with this sobering thought that I approach a WSSO project. WSSO is an incredible tool if well designed and implemented. Poorly executed, it has the potential to create single points of enterprise application failure and/or security breaches with potentially disastrous implications. If you want your project to succeed, there are several areas within your WSSO project you need to carefully review and manage. These include the identity, authentication, authorization, session management, auditing and infrastructure maintenance. 1
2 IDENTITY The identity is the bedrock of your access system. You might be surprised to find out there s work to be done in cleaning up account management to provide identity integrity. If you have multiple identity stores within your enterprise (network accounts, ERP, reverse proxy, CRM, different LDAP stores, etc.), get down to the nitty-gritty and ensure that the unique global ID you re providing to an identity is really unique. You need to be 100% confident that there is a oneto-one mapping between a unique ID and a real person. There is a significant and clear-cut difference between what is a real person and the roles that a person may play. You don t want the same person to have a unique ID for every role that they play. Within many large enterprises there will be confusion over the definition of what constitutes an identity, role, accounts and the unique ID used for these. In some enterprises, an individual may assume several identities with each having one or more roles along with unique ID s for the roles and/or the identities. Your job is to first get people to agree on a common set of definitions for accounts, identity, role, global unique ID and network ID s. This will quickly help you figure out what people mean when they use these words with respect to the systems they administer and use. Without this, you can waste a lot of time and effort due to many people making false assumptions about what other systems do. If you re using network accounts as an identity repository for authentication, determine how test accounts are used. Look for application areas such as help desks where people may need to assume an identity on behalf of someone else. Watch out for people possibly sharing accounts, thus assuming the same role or identity. A WSSO project crosses many different identity stores usually under different departmental and system administration. Many of these systems may not communicate well or at all with each other in providing identity updates (they may never have had to in the past). As a result, you may end up creating a WSSO system that still allows an identity into the applications months after that person whom the identity maps to was terminated, promoted, etc. In order to avoid this, you need access to the data structures for the identity repositories you re going to be using as well as maps of the business processes that create and update the repository data. This may be hard to obtain and/or take time for identity administrators to give it to you. Be wary of highlevel assurances from the identity administrators that everything will work. The devil is in the identity details! Determine in advance if you are going to need to accept and trust an identity being created and presented from outside your own systems (partner s portal, SAML identity, etc). The same applies for identities you ll be creating that your business partners or others may have to trust. Managing the identities may not be straightforward for your enterprise, your business partners or even your customers. Do test pilots well in advance to prove out that identity exchange between systems not only works but also has identity integrity as time passes. 2
3 It is often the case that a WSSO project leads to or, stems from, an identity project. Synchronizing and managing the identity stores is not trivial. Managing the identities across the enterprise and outside the enterprise requires a solid set of identity management tools. Do your tools have the ability to delegate identity administration to the most cost-effective management level(s) without a lot of coding? Equally important, make sure that you can lock down the security separately on each attribute within the LDAP directories. You need fine grained security control for each piece of the identity to maximize manageability while reducing risk. If you don t do a good job of sorting out the identities, your project may hit the reefs of authentication and authorization. Having a thorough understanding of identities, roles and real people is critical in creating a successful WSSO system. Without this you may be opening yourself up to administrative nightmares and/or potential security breaches. Equally as bad, you may find that you have major problems requiring significant re-working of your WSSO system. This may involve large amounts of additional, unplanned and unbudgeted time, money and resource allocations. 3
4 AUTHENTICATION Authentication requires careful planning and thought. The starting point is some form of risk assessment by the enterprise to determine what strengths of authentication will be acceptable for different applications. For instance, a username and password may be acceptable risk for authenticating an identity for some applications but considered insufficient strength for others where a digital cert, biometric, tokens or combination thereof may be required. You need management agreement on what constitutes acceptable risk or, you may find that a manager of a particular application or entire business unit may refuse to work with WSSO since they believe they cannot trust the authentication being presented to them. This can significantly affect and/or alter your project timelines while also creating unnecessary political problems for you to manage. Next, depending on the WSSO tools you re using, you must decide on a structure for differentiating the levels of authentication as well as implementing them. The tool needs to be configured for different authentication levels as well as allow room for future technologies and changes to enterprise security policies. Then there s the major issue of how to deploy the authentication methods with the WSSO, network and web server infrastructure. For example, you may decide you never want passwords to travel in the clear. Thus, you may want to divert a request for a web resource from a web or application server to a WSSO authentication server that uses SSL, TLS etc. After successful authentication, you ll want the option to either continue on with a secure connection to the user s browser or, redirect back to an unencrypted web or app server. There are cost and performance implications from doing so that you need to carefully think out and plan for. Have you thought about what happens with unsuccessful authentications? How much information is passed to the help desk or user, if any, to let them know why the authentication failed? Do you have plans to integrate password management with the WSSO system? Are you using online verification of digital certs? Will the digital certs work with different browser versions? What are the use cases and test parameters for determining there are no PKI/cert issues? What are the token management/ WSSO issues? What are the biometric standards you re going to adhere to? Is there an API in the vendor s toolkit to deal with this or, are you going to have to do customized coding? Have you considered how you ll set up multi-factor authentication using your WSSO tools? Can you do weighted authentication where you trust one type of a multi-factor authentication more than another? Can you create a trust formula to calculate a final value required for successful authentication? Many WSSO systems use non-persistent, encrypted cookies. These are placed on the user s browser to maintain state as well as let the SSO system know what level of authentication has been successfully achieved during the user session. You need to determine if your enterprise browser policy will accept this. Other WSSO systems will use application or SSL servers to help maintain state. Have you examined the cost, performance, installation and maintenance issues of doing so? 4
5 In some large enterprises there may be several authentication mechanisms run under the auspices of different departments, business units or system owners who are deeply entrenched. Instead of using only one authentication method for sign on, you may be forced to design a web based SSO solution that gives users the choice as to what authentication method they will use. In other words, the politics may force you to absorb the existing authentication methods so application owners don t have to change much. This can be very time consuming to do, complicated, costly and expensive to maintain. If you re heading down this path, make sure you have adequate budgets and the right human resources and software tools to accomplish this. There may be a fair bit of politics involved as you gain the different business unit and application owner support. Regardless of what type of single sign on project you do, an area either often overlooked or underrated by project sponsors and project managers is the amount of education needed to make WSSO successful when it comes to authentication and authorization. You may find your project under intense political pressure, cost increases and time delays from several areas. With poor WSSO user community education, you may find that some new WSSO users will react poorly to change. As a result they may carry their unhappiness right up to the senior executive suite. You need excellent end user and executive team WSSO education and communication. If you do a good job of this, the executives can help dispel complaints rushing your way which otherwise might derail or slow down your project while consuming unplanned for project resources. At the same time you re planning the end user education, you also need to get on board the application owners into WSSO. Many application owners in your enterprise will be leery of a new authentication and authorization system. It s usually complicated to explain because of the many n- tier components used such as the security agents, how they redirect to your security servers, when and how they redirect back, etc. Therefore, you need a well-planned major education campaign with application owners on how your SSO authentication works in order to get their buy-in. A potential minefield to be aware of concerns authenticating real people having multiple identities and roles. As was mentioned earlier in the identity section of this paper, you need to ensure you re authenticating an individual and not a group of people having the same role, identity or network account. There has to be a one to one mapping between the unique ID and the real person you re authenticating. This problem becomes exasperated once you start sharing and trusting identities, authentications and/or authorizations between systems and enterprises. System administrators will want to know and trust that when you pass them an identity, it s the real person they think it is and not potentially more than one person using the same account. There s a lot more to consider than what s been outlined above. For example, how are you going to handle wireless authentications? Are you going to encrypt this traffic? What s the performance and cost impact from doing so? What happens with reverse proxy authentications? Does your WSSO system need to differentiate for an application if the user is internal or external to your network? 5
6 Have you thought about application-to-application (app-to-app) authentication? If you re like many enterprises, you re either starting to do this already or, rapidly moving in this direction. There are many things to consider which PowerPoint slides extolling the virtues of SSL, TLS, SOAP, XML and web based security services may leave out. You need to determine how the applications are inventoried and managed within the enterprise LDAP directory. Are you giving each application a unique global ID? In a large corporation with several hundred or thousand applications, this alone is a challenging task to set up and maintain. Next you need to determine how you re going to secure the connection between the app-to-app. It may be you re going to use SSL or TLS. This will involve the use of PKI digital certs on at least one end of the handshake. You re going to need to determine how the certs are managed, updated and what constitutes the responsibilities of the application owners in this respect, etc. Then you need to determine how the central WSSO infrastructure is going to work with the app-toapp authentication and authorization. Are you creating a web app-to-app authentication service? Do you require customized code for the software to make all the magic work or not? You ll need to do extensive testing on the service before you announce to the enterprise you re ready for business. These are just a few of the many, many questions and details to be followed up in creating a successful WSSO authentication system. Stitching the authentication system(s) together with the identity system and integrating to the authorization and auditing systems in a large enterprise is often not trivial. It may take a lot longer and consume more resources than you originally planned for. If you re in an enterprise that is tightly managed from a core enterprise IT group, you might be able to ignore some of the issues raised in this section. If however you re in a complicated enterprise with many groups of stakeholders running different systems, be wary of glossy assurances from vendors, consultants and your staff re how easy the authentication integration into WSSO will be to accomplish until you ve done your homework. 6
7 AUTHORIZATION Authorization in WSSO begins with some form of post-authentication action. Once a successful authentication has taken place, the WSSO system needs to make a decision on how to proceed with authorization. You need to map out the use case scenarios for authorization. This can be very complicated and/or time consuming. You and your WSSO team need to have very detailed discussions with application owners to understand exactly what is required to mesh their system to yours. In cases of heavily customized or homegrown applications, this can be very complicated, time and resource consuming. The use case scenarios should include be a firm understanding of the management models required. For example, delegated administration of the authorization may be required to extend to several levels of the enterprise. Are you going to use groups, roles, titles, position, geography or a matrix of these variables to determine an authorization? Is this information in your LDAP directories? How easy is it to work with? Who maintains it? How is it updated? Equally important is how a change in authorization models and/or applications made in one part of the enterprise makes its way into the WSSO system. If it s cumbersome or time-consuming for an authorization change to make it s way into WSSO, you may be setting yourself up for potential security breaches. People will find ways to work around cumbersome processes. You also want to focus on authorization exceptions. The reality is application security management is full of exceptions. Someone will need access to a system for which they normally would not be granted access. When an exception needs to be made, who decides? How does it affect WSSO? How is the change made? Who makes it? How easy is it to make? How is the change tracked? What s the quality assurance process for this? Authorization in large enterprises having many applications is usually very complicated. Beware of simple sounding solutions or the belief that the WSSO product will somehow solve all your authorization challenges with little modification. Oftentimes, changes need to be made to business processes, management models and code in the WSSO product and/or the applications. You ll need to focus in on testing and management of the WSSO authorization rules. Long before the authorization rule is implemented in the production system, you will want to know that extensive testing and debugging is done on the rules, otherwise potential security breaches may be made. In a large enterprise, you may end up with hundreds, thousands or even tens of thousands of authorization rules. The management of authorization rules in a large enterprise can be extremely complicated, time and resource consuming if not properly planned for. 7
8 What are the business and security processes for agreeing to rule changes? How do you create the rules and test them in your test and pre-prod environments? How do you move the rules from test towards production? How much time and effort is involved per authorization rule change? What s the quality control? How do you search and find rules when you have a problem? How easy is it to find a specific authorization rule amongst hundreds or thousands? How do you know which authorization rules pertain to a specific of set of web resources or applications? Do you need to manage some form of delegation of who gets to see view or edit authorization rules? What s the business process for this? What s the management process for this? How easy is it to implement and maintain? Can your toolkit do this? How are you going to handle protecting applications running on virtual servers? What are your strategies for protecting the numerous ways a URL can be specified and called? Who creates the strategy for this? Who signs off on this strategy within the enterprise? How do you educate the application owners about the various ways to lock down a URL? How is it tested before it s implemented? How are you going to enforce this? The implementation and ongoing management of authorization is where the pedal hits the metal for WSSO. There are a lot of potential landmines when implementing new authorization strategies. All too often you ll find out you probably assumed the WSSO product would handle it only to find out the hard way it either doesn t or, it s going to cost unplanned for money, time and resources to solve. This may be a result of not understanding your own processes as well as challenges with the selected toolkit. You need to understand your own authorization processes in great depth, get beyond the sales spiels and dive to the detail within the WSSO products. Caveat emptor! 8
9 SESSION MANAGEMENT Successfully Managing a WSSO Project Setting up WSSO authentication and authorization systems also requires attention and planning to session management. In large enterprise wide WSSO deployments, this can be complicated to set up and maintain. Each application you integrate into WSSO is going to have its own session management conditions based on risk for timeouts and logouts. Your job is to figure out enterprise standards, if there are any, then decide how to provide exceptions to the standards for applications where it s warranted such that the protection matches the risk. Getting agreement at the enterprise level may take longer than you think. Then you need to examine the requirements for each application as they are integrated into WSSO. What are their idle session timeouts? What is the application s maximum session timeouts? What are the user and application logout procedures? With this in hand, the key question to ask your team and the vendors is how are you going to implement and maintain this? When it comes to applications such as portals, reverse proxies and others, you may find integrating their session management requirements into WSSO isn t always as straightforward as you may have thought. They may not be well setup to integrate their session management with WSSO. This may require lots more planning, coding, workarounds, time and expense you didn t anticipate. Equally important is how you test for security integrity once you ve set everything up. Do you have plans to try and break your own system? Can you find ways to spoof session management? Have you put the vendor s claims about their software to real life tests? What are your ongoing security testing programs? The claims you re making to senior management need to be based on fact and not assumption. It won t do any good after a security breach to find out a basic hole existed from your implementation which testing could have taken care of. Oftentimes, after extensive testing, the remaining weaknesses will be the process for updating all the components and notifying the WSSO system administrators of changes. Make sure your testing takes into account the underlying business and technical support processes. See if you can take advantage of your own processes to break your system. 9
10 AUDITING While many people consider auditing almost as an afterthought, this is an area to be strongly thought out for reasons of legality, security and/or managing service level agreements. While many applications will have their own in-depth security (e.g. ERP), it may be very important to have an end-to-end audit view of all applications touched by a user during a WSSO session. In the old days few users touched many systems. Today, a user s session may include touching many systems frequently. You, your security and legal staff need to determine what acceptable risk is for auditing. In general, it makes sense to have a high level overview of what applications a user touched during a session and when they did it. This kind of information has relatively low data volume. This should be supplemented with increased auditing on an application-by-application basis. You need to determine which HTTP actions you re going to monitor as a result of the risk assessment. For example, you may only want to audit only one of several possible HTTP actions. Then you need to create audit rules for the application, which take precedence over the more general enterprise audit standards. Next you need to do some performance modeling to determine the impact which collecting the audit files will make on your system. The files may grow rapidly if there is much detailed tracking involved. There needs to be strong business and technical processes built into your WSSO system administration to monitor for this or, you may unwillingly bring your own system to its knees as the files sop up server performance and disk space. For business, technical or legal reasons, enterprise service level agreements may require portions of the audit data to be intertwined with other traffic occurring between systems and users e.g. FTP audit data etc. You need to find out early on what information is required from WSSO and then determine how you will get portions of your WSSO system audit data intertwined with the other data. This could be complicated, expensive and time consuming. Your WSSO administrators must be well trained to read and configure the audit logs coming from the WSSO servers and potentially the web and application servers the security agents are sitting on top of. When all hell breaks loose and your system is going down or gone down, you better have the team ready with an arsenal of tools and processes to quickly troubleshoot, diagnose and remedy the situation. Some WSSO vendor s audit logs are cryptic or lacking in detail. There may be inadequate information in the vendor s support materials to really understand the nuances of the system. This is critical in a highly tense situation. Do NOT let the consultants walk out the door without your staff knowing how to handle these situations. Demand excellent audit training and support material from the project consultants and the vendor. 10
11 Knowing the WSSO audit log system is a good starting point but not enough. In an n-tier environment, the problem may lie in a process that s gone screwy in one of the web, application, directory, portal or reverse proxy servers. WSSO is the system where many of these other systems have a common touch point. In a potential system failure, people may start pointing fingers at each other with you in the middle without adequate data to back them up. Your job is to minimize this risk. There should be clear business processes, meetings and training between the infrastructure parties that lead to inter-testing with sharing of audit logs under approved processes. While this may take a lot of patience and effort to get people to agree, prioritize and do, ask yourself how much the enterprise will loose for every minute you re down? That should help you garnish the support from the executive suite to get everybody on the same page. In the early days of the cold war, the distant early warning line (or DEW line) was deployed into North America to give advance warning of incoming threats. You need to be thinking the same thoughts with respect to your WSSO system. Unfortunately, WSSO vendors and consultants often view auditing as a measurement of something that happened rather than monitoring something that s happening. You must direct your staff, vendors and consultants to give you the tools such that you can be alerted to a developing problem before it escalates into a system failure. Being able to parse and understand the audit logs in real time is a key part of this. Many vendors toolkits are lacking in this regard. You re likely to end up writing your own code. You WSSO system administrators need a WSSO management console that can trigger alarms from audit log information in near real time. If an authentication or authorization server comes under attack or, the WSSO system performance starts to slow due to some aberration or, something like authentication failures starts to dramatically climb, you d like to know of it a few seconds later and have the expertise and processes to be rectifying it before it becomes a disaster. These are just a few of the many audit considerations you need to be aware of and plan for. Don t wait until it s too late to find out the hard way that you should have paid more attention to your audit requirements. 11
12 INFRASTRUCTURE MAINTENANCE Successfully Managing a WSSO Project Following on from the audit discussion of understanding audit files in near real time, you need to focus on WSSO infrastructure maintenance. Earlier on in this paper, the question was posed as to the consequences from WSSO not working. Your job is to ensure that the infrastructure is always up. It s my experience that this is an area requiring extensive planning, documentation, testing and one that too often escapes adequate management attention in the beginning. It starts off with the physical infrastructure planning for the production version of the authentication and authorization servers. Well before you ve ordered your hardware, very careful thought needs to be done in advance for capacity planning, performance, failover and disaster recovery. What are the short, mid and long-term capacity requirements? What are the assumptions you ve made for the authentication, authorization and auditing models? Are your authorization models based on page views or on HTTP requests? Have you checked with the WSSO vendor to see when a trip to the policy server is required? What are the caching conditions you re using in your model? Does your model take into account overhead from encrypting and decrypting traffic? How can you justify your assumptions? Beware the vendors published performance numbers. These are for competitive sales analysis, not necessarily mimicking the conditions on your hardware, your users, your applications, your network and your WSSO settings you decide upon. How are you going to test for real world use on your systems? How are you going to measure performance? What kind of system checks are you going to make on your WSSO servers at the hardware and WSSO application level? Are these automated? Who s setting this up? How does it intertwine with the many back-end enterprise support systems? What are the escalation procedures? If you re using more than one network OS and various hardware platforms running web, app and portal servers that each in turn have a WSSO security agent running on them, the infrastructure support of this can be extremely complicated and time consuming to setup, test, maintain and troubleshoot. Do you have the right people on your team to do this? What tools does the vendor give you to integrate with the support systems? What additional tools do you require? What s your failover strategy? How do you do routine maintenance? Who gets notified? What s your quality assurance strategy for all this? You must have: Extensive documentation Extensive scripts to automate as much as possible of the maintenance processes Extremely knowledgeable staff who understand the nuances of supporting an n-tier model Complete toolkits to quickly respond to a problem or disaster in the making, rather than after the fact Extensive testing to prove that all the aforementioned works in real life. 12
13 What is your strategy for security hardening all WSSO components? Do you have a plan, documentation and testing for things like internal and external attacks on the WSSO system? What is your migration plans for the WSSO software? What kind of testing, toolkits, documentation and procedures are required for migrating out of a test environment, to pre-production and production? Do you have enough hardware, budgets and people to do set up these environments and then manage it? If you are interfacing with multiple types of web, app and portal servers, running on different NOS s, creating the test environments for these with WSSO may not be trivial. Do NOT let the consultants and vendors set the WSSO system and infrastructure up with few of your own staff understanding why things were done the way they were. This is folly. There are so many nuances unique to each n-tier system than you cannot afford to have the knowledge of these nuances that affected WSSO design, walk out the door with the consultants. You cannot afford long fix times to your mission critical WSSO system due to a lack of knowledge or understanding of your staff. Make sure the consultants, project manager and your staff adopt excellent documentation standards from the outset of your project. Ensure a solid knowledge transfer occurs at all steps along the way or, you and your enterprise may pay an unnecessary stiff price for partial or full WSSO system failure or security breaches. 13
14 CONCLUSION Managing a web based SSO project in a large enterprise is not trivial. The n-tier environments of most large enterprises creates a wide set of variables and nuances that must be addressed in WSSO planning. All too often enterprise managers find out this reality the hard way. It s easy to let the consultants and technical staff hunker down into their cubicles and meeting rooms, only to find out a fair way into the project that some of the pieces aren t properly stitched together and/or the project won t be delivered on time and budget. There are a number of warning signs in advance to help steer you out of danger. Watch out for extensive process but not enough diving to the details. Expect and demand tough detailed upfront questioning of all the systems WSSO will touch before the project gets down to the doing stage. Watch for and demand extensive testing plans that are well staged throughout the project. Don t wait several months to find out you had major problems that could have been detected earlier. Continuous testing will also help verify claims that your identity, authentication and authorization data stores, networks and other infrastructure owners make as to their systems integrity and performance. Look and demand for very detailed system maintenance management plans. Making the WSSO system work with your infrastructure plumbing and their alarm and response systems can be complicated. It s also mission critical. Make your team demonstrate to you screen by screen how either they or other managers are going to manage hundreds or thousands of rules. Visualize in your mind your systems a few years down the road with the hundred or thousands of rules. Picture the change requests. Figure out the delegation model. Relate this picture in your head to the workflows your team is showing you on the pilot screens today. Don t let the WSSO team and consultants buffer your enterprise manager responsible for WSSO from the details. You need a manager who can understand the details. WSSO is a detailed application infrastructure-plumbing project. The devil is in the details. If your WSSO manager stays up at only the high process and vision level, you may end up in trouble when reality sets in. Choose your consultants and staff wisely. Too many people say they can do WSSO but have not lived a complicated project. It s a lot more than some WSSO toolkits and consulting project management processes. Beware the slick answers. Demand and expect details with realistic appraisals of the situations. If you do your homework well and properly plan for web based SSO, you re in good shape. When properly implemented, WSSO can help standardize identity, web and application security, enhance ease of use and position the enterprise for rapid, secure integration with business partners and customers systems. 14
15 USEFUL REFERENCES Successfully Managing a WSSO Project Single Sign On Underneath The Hood - What Senior Managers Need To Know - (pdf). This paper covers the areas of planning for a Web Single Sign On project that senior managers should be aware of before starting a project. Five Minute CEO/CIO Briefing on Web Security- (pdf) or (html) The first in a series of papers covering web security by Guy Huntington, HVL. This briefing covers seven questions CEO/CIO s should be able to answer to understand web security. Reducing Total Cost of Ownership in Web Security- Six Points to Saving Money (pdf) or (html) The second in a series of briefings on web security by Guy Huntington, HVL. This briefing is designed to quickly educate senior managers where to look for cost savings in web security deployments. Web Security PowerPoint Presentations ( Put together by Guy Huntington, HVL and Derek Small, Nulli Secundus from their web security, directory and ERP experiences, these presentations cover general and specific issues in web security, identity management, single sign on, LDAP directories, PeopleSoft LDAP integrations and People- Soft Oblix integrations. Secrets and Lies: Digital Security in a Networked World : Bruce Schneier, CTO of CounterPane and a noted cryptography expert wrote an excellent book covering the issues of digital security. It s a must read for IT managers. SAML (Security Assertion Markup Language): This is the emerging standard for authentication and authorization. It s being put together by OASIS, the Organization for the Advancement of Structured Information Standards. OASIS is a nonprofit, international consortium that creates interoperable industry specifications based on public standards such as XML and SGML, as well as others that are related to structured information processing. ABOUT THE AUTHOR Guy Huntington, President of HVL, recently was the project manager for Boeing s global single sign on initiative. He.specializes in leading enterprise re-engineering projects including B2B s, B2C s and intranets integrating web security and LDAP directory infrastructure into the many disparate systems within each enterprise including data warehouses, ERP s, etc. Guy has lead many projects over the years, authored numerous papers, on-line presentations, written an electronic book and given many speeches on the use of the web in business. Guy can be contacted at , [email protected] or 15
101 Things to Know About Single Sign On
101 Things to Know About Single Sign On IDENTITY: 1. Single sign on requires authoritative sources for identity. 2. Identity authoritative sources needs to contain all the enterprise identity data required.
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT Executive Overview SAML (Security Assertion Markup Language) is a standard that facilitates the exchange of security information. Developed by
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Enterprise Job Scheduling: How Your Organization Can Benefit from Automation
WHITE PAPER Enterprise Job Scheduling: How Your Organization Can Benefit from Automation By Pat Cameron Introduction Today's companies need automation solutions to attain the high levels of availability,
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
How to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
Controlling Web Access with BMC Web Access Manager WHITE PAPER
Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
FileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
CA Single Sign-On Migration Guide
CA Single Sign-On Migration Guide Web access management (WAM) systems have been a part of enterprises for decades. It is critical to control access and audit applications while reducing the friction for
For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.
Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Configuring Salesforce
Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
Get started with cloud hybrid search for SharePoint
Get started with cloud hybrid search for SharePoint This document supports a preliminary release of the cloud hybrid search feature for SharePoint 2013 with August 2015 PU and for SharePoint 2016 Preview,
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Test Run Analysis Interpretation (AI) Made Easy with OpenLoad
Test Run Analysis Interpretation (AI) Made Easy with OpenLoad OpenDemand Systems, Inc. Abstract / Executive Summary As Web applications and services become more complex, it becomes increasingly difficult
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
INTEGRATING THE TWO WORLDS OF PHYSICAL AND LOGICAL SECURITY
A White Paper Author: Guy Huntington, President, Huntington Ventures Ltd. Date: February 20, 2009 1 Integrating the Two Worlds of Physical and Logical Security Guy Huntington, Huntington Ventures Ltd.
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
Top 10 Considerations for Selecting the Right RMM Solution
1 Introduction The most successful IT service providers are those that find ways to differentiate themselves from the competition and consistently strive to retain loyal customers. In an increasingly crowded
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
FIREWALL CLEANUP WHITE PAPER
FIREWALL CLEANUP WHITE PAPER Firewall Cleanup Recommendations Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity Table of Contents Executive Summary... 3 The
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Simplify Your Windows Server Migration
SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Automating User Management and Single Sign-on for Salesforce.com OKTA WHITE PAPER. Okta Inc. 400 2nd Street Suite 350 San Francisco CA, 94107
OKTA WHITE PAPER Automating User Management and Single Sign-on for Salesforce.com Okta Inc. 400 2nd Street Suite 350 San Francisco CA, 94107 [email protected] 1-888-722-7871 Table of Contents 1 The Growth
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Integrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6
Imperva Technical Brief Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6 The PCI Security Standards Council s (PCI SSC) recent issuance of an Information Supplement piece
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1
Auditing a Web Application Brad Ruppert SANS Technology Institute GWAS Presentation 1 Objectives Define why application vulnerabilities exist Address Auditing Approach Discuss Information Interfaces Walk
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Troux Hosting Options
Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4
SAML single sign-on configuration overview
Chapter 46 Configurin uring Drupal Configure the Drupal Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with a Drupal-based web application. Configuration also specifies
Oracle Access Manager. An Oracle White Paper
Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
ArcGIS for Server: Administrative Scripting and Automation
ArcGIS for Server: Administrative Scripting and Automation Shreyas Shinde Ranjit Iyer Esri UC 2014 Technical Workshop Agenda Introduction to server administration Command line tools ArcGIS Server Manager
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Password Reset PRO INSTALLATION GUIDE
Password Reset PRO INSTALLATION GUIDE This guide covers the new features and settings available in Password Reset PRO. Please read this guide completely to ensure a trouble-free installation. March 2009
A Buyer s Guide to Enterprise Performance Management Suites
White Paper A Buyer s Guide to Enterprise Performance Management Suites Seven Key Requirements in Choosing an EPM Solution Table of Contents Seven key requirements to evaluate in an EPM solution 3 1. Breadth
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality
EVALUATION GUIDE Evaluating a Self-Service Password Reset Tool This guide presents the criteria to consider when evaluating a self-service password reset solution and can be referenced for a new implementation
Why self-signed certificates are much costlier and riskier than working with a trusted security vendor
The Hidden Costs of Self-Signed SSL Certificates Why self-signed certificates are much costlier and riskier than working with a trusted security vendor Introduction Even when business is booming, smart
Table of contents. Enterprise Resource Planning (ERP) functional testing best practices: Ten steps to ERP systems reliability
Enterprise Resource Planning (ERP) functional testing best practices: Ten steps to ERP systems reliability Table of contents Introduction.......................................................2 Step 1:
Approaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
REAL SECURITY IS DIRTY
REAL SECURITY IS DIRTY INFORMATION SECURITY AND RISK MANAGEMENT ARE PURSUITS OF BRUTAL SELF- REFLECTION. The most logical business decisions come from facing ugly truths. Before any business spends a dime
Perform-Tools. Powering your performance
Perform-Tools Powering your performance Perform-Tools With Perform-Tools, optimizing Microsoft Dynamics products on a SQL Server platform never was this easy. They are a fully tested and supported set
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
Host Access Management and Security Server
Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.
White Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
Buying, Using and Integrating NetSuite
Buying, Using and Integrating NetSuite By About This guide is meant to help business considering implementing NetSuite. Regardless of whether you re a small business implementing a CRM or EPR for the first
SAML single sign-on configuration overview
Chapter 34 Configurin guring g Clarizen Configure the Clarizen Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with Clarizen. Configuration also specifies how the application
GETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Monitoring, Managing, Remediating
MANAGED SERVICES Packages include: Fault management Troubleshooting & escalation Proactive monitoring WAN status 800# Incident & inventory management Quarterly reviews Managed device database Online dashboard
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
Multi-Factor Authentication
Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Request for Proposal (RFP) Toolkit
Request for Proposal (RFP) Toolkit A Message from the CEO Hi, this is Ryan Flannagan, founder and CEO of Nuanced Media. Thanks for downloading the RFP Toolkit. My team and I are excited that you ve decided
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Administrator Guide. v 11
Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main
Five Tips to Ensure Data Loss Prevention Success
Five Tips to Ensure Data Loss Prevention Success A DLP Experts White Paper January, 2013 Author s Note The content of this white paper was developed independently of any vendor sponsors and is the sole
Resolving Active Directory Backup and Recovery Requirements with Quest Software
Resolving Active Directory Backup and Recovery Requirements with Quest Software By Mike Danseglio Sponsored by Table of Contents Backing Up Effectively... 1 Identifying an Incident... 2 Recovering from
THINGS YOU NEED IN DOCUMENT MANAGEMENT SOFTWARE. Presented By:
THINGS YOU NEED IN DOCUMENT MANAGEMENT SOFTWARE Presented By: With over 15 years experience with document management solutions OnPoint DMS and Cabinet Paperless are pleased to offer you some insight on
