Novell. Modular. Authentication Service (NMAS ª ) Security Services. WHITE PAPER
|
|
|
- Holly Warner
- 10 years ago
- Views:
Transcription
1 Novell Modular Service (NMAS ª ) Security Services WHITE PAPER
2 table of contents Novell Modular 2 NMAS PROVIDES FLEXIBLE AND 7 SECURE edirectory edirectory VOLUME LABELS 2 USER DEFINED 8 CLEARANCE LEVEL ASSIGNMENTS 2 STANDARD edirectory 8 ENFORCED RESTRICTIONS 3 EXTENSIBLE edirectory THROUGH NMAS DUAL PRODUCT OFFERINGS 3 SIMPLE PASSWORD/HASH STARTER PACK 3 CLEAR TEXT ENTERPRISE EDITION 3 SHA-1 NOVELL CLIENT SUPPORT 3 MD-5 CERTIFIED MODULES 3 STANDARD edirectory PASSWORD 10 REQUIREMENTS 4 PHYSICAL DEVICE 10 NOVELL PARTNERSHIPS 5 BIOMETRIC 11 CONCLUSION 6 CONSOLEONE ª MANAGEMENT
3 2 Novell Modular NMAS provides flexible and secure edirectory ª authentication Today organizations are looking to make access to corporate resources even more secure by implementing stronger forms of authentication and authorization. Organizations are also working to remove the complexity and administrative overhead of having to maintain passwords throughout an organization. Novell Modular Service (NMAS, pronounced en-mass) enables and enhances strong authentication solutions while removing the complexity of authentication to edirectory ª. By supporting the leading smart card, token, biometrics, and digital certificate vendorõs authentication products, NMAS provides a way to centrally and easily manage the array of authentication methods organizations may wish to implement in their environment. Additionally, NMAS graded authentication allows administrators to create a security policy that grants access to file system or directory resources based on the strength and combination of the authentication. Finally, by implementing NMAS with a partner product, organizations can remove the requirement of a username and password for authentication against edirectory. USER DEFINED is the process of determining whether someone or something is, in fact, who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. On each subsequent use, the user must know and use the previously declared password. The weakness in this is that passwords can often be stolen, accidentally revealed, or forgotten. STANDARD edirectory Before the introduction of NMAS, edirectory used a very secure two-process mutual authentication method, known as Òpassword challenge responseó user authentication. The first process involved user login where a password and nonce (identifiers that are used only once) values generated by both the client and server were hashed twice using two different hash algorithms and later encrypted using an RSA* encryption algorithm. The second process involved background authentication to an edirectory server.
4 Novell Modular 3 EXTENSIBLE edirectory THROUGH NMAS While Novell makes a concerted effort to make its password challenge response authentication method secure, many edirectory-installed organizations have determined that password authentication is insufficient for their security needs. Such organizations have decided to expand their network authentication from Òsomething you knowó (for example, a password) to Òsomething you haveó (for example, a smart card), or Òsomething that you areó (for example, a fingerprint). The NMAS framework is extensible in that it allows for these and other forms of alternative authentication methods. NMAS-supported authentication methods include both authentication modules developed by Novell as well as by third parties. A summary of each of these authentication methods follows. SIMPLE PASSWORD/HASH With NMAS, Novell provides login methods common with LDAP, Internet browsers, and other directories. These include clear text, SHA-1, and MD-5 login methods. CLEAR TEXT Clear text (or plain text) authentication is a process of sending a password over the wire in an unencrypted form. Aside from no authentication at all, from a security standpoint, this is the lowest form of user authentication. Because there is no encryption process, plain text authentication is normally quite fast. This authentication method is included in NMAS to provide faster authentication in networks requiring less security, as well as to provide interoperability with systems that use clear text authentication (for example, FTP/Telnet and POP3 ). SHA-1 Developed and published by the National Institute of Standards and Technology (NIST) in 13 and 15, the secure hash algorithm (SHA-1) is a popular hash algorithm for network authentication. A hash (or message digest) is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string. In terms of security, SHA-1/MD5 authentication is more secure than clear text because the password is altered when it travels across the network. is relatively fast because it is easy to compute a shorter hashed value. MD-5 Developed by Ron Rivest at MIT, this messagedigest algorithm takes a message of arbitrary length and produces a 128-bit message digest (or hash) output. MD-5 was, at one time, the most widely used secure hash algorithm. STANDARD edirectory PASSWORD As discussed previously, this is the password challenge response authentication method that uses different hash algorithms and, beginning with the release of NMAS, the DES (Data Encryption Standard) algorithm. The multiple ciphering
5 4 Novell Modular techniques provide a very secure password authentication method. Because of the increased security it offers, the standard edirectory password authentication is slower than clear text or SHA-1/MD5 authentication. PHYSICAL DEVICE Another way that userõs can authenticate is through the use of a physical object that the user carries with himself or herself and proves his or her identity (Òsomething you haveó) and is granted access accordingly. Third-party authentication developers have written authentication modules for two types of physical devices: smart cards and tokens. Smart Cards A smart card is a plastic card, about the size of a credit card, that includes an embedded microchip that can store data and perform cryptographic functions. Depending on what is stored on the microchip, a smart card can be used for a variety of tasks. With NMAS, a smart card can be used to establish an identity when authenticating to edirectory. For example, the ActivCard* Gold smart card lets a user prove his or her identity by using his or her private key and associated X.50 v3 user certificate that is stored on the smart card. Arcot* has also provided an NMAS module for authentication against edirectory via the Arcot WebFort*. PKI NMAS supports X.50 v3 certificates from the leading PKI vendors for authentication. NMAS 1.0 has an X.50 method that supports certificates and private keys wrapped in a cryptographically secure PKCS#12 file. Using these PKCS #12 files, users can authenticate against edirectory with their private key. NMAS 2.0 will have an advanced X.50 v3 method that not only supports authentication via PKCS#12, but also supports CRL and OCSP validation of the certificate via a validation service that runs on edirectory. This validation service and other features can be utilized by installing Novell Certificate Server ª 3.0. With NovellÕs Certificate Server 2.0 product that is shipped with NMAS, a network administrator has a directory integrated PKI (Public Key Infrastructure) where the administrator can issue X.50 v3 user certificates for, among other things, edirectory authentication. Token A token is a hand-held hardware device that generates a one-time password to authenticate its owner. Token authentication systems are based on one of two alternative schemes: challenge-response and time-synchronous authentication. By employing tokens, users do not need to use a weak password and the challenge and response occurs in such a way that replay attacks are thwarted. With the challenge-response approach, the user logs in to an authentication server, which then issues a prompt for a personal identification number (PIN) or a user ID. The user provides the PIN or ID to the server, which then issues a ÒchallengeÓÑa random number that appears on the userõs workstation. The user enters that
6 Novell Modular 5 challenge number into the token, which then encrypts the challenge with the userõs encryption key and displays a response. The user types in this response and sends it to the authentication server. While the user is obtaining a response from the token, the authentication server calculates what the appropriate response should be based on its database of user keys. When the server receives the userõs response, it compares that response with the one it has calculated. If the two responses match, the user is authenticated to the network. If they donõt match, access is denied. NMAS partners providing tokens include, but are not limited to: Vasco Data Security* provides an NMAS module for edirectory authentication using its Digipass* token. RSA Security* provides an NMAS module for edirectory authentication using the RSA SecurID token along with RSA ACE/Server* security software. BIOMETRIC Another authentication technique supported by edirectory is biometric authentication. Biometrics is the science and technology of measuring and statistically analyzing human body characteristics (Òsomething you areó). Biometric authentication can be classified into two groups: static biometric authentication and dynamic biometric authentication. Static biometric authentication captures and verifies physiological characteristics linked to the individual. Common static biometric characteristics include fingerprints, eye retinas and irises, and facial features. Dynamic biometric authentication captures and verifies behavioral characteristics of an individual. Common dynamic biometric characteristics include voice or handwriting. Biometric authentication requires readers or scanning devices, software that converts the scanned information into digital form, and, wherever the data is to be analyzed, a database or directory that stores the biometric data for comparison with entered biometric data. In converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data scanned when a user tries to gain access. Some of the biometric vendors whoõve partnered with Novell are: BioID has provided an NMAS module that uses a unique multi-modal biometric technology to recognize a combination of personal traits to grant or deny access to edirectory. Identicator*, a division of Identix*, provides an NMAS module for edirectory authentication using its BioLogon* 2.0 fingerprint authentication software. SAFLINK Corp.* provides at least three NMAS modules for edirectory authentication using licensed biometric authentication technology for facial, fingerprint, and voice authentication. SecuGen provides an NMAS module for fingerprint recognition within SecuGenÕs family of biometric PC peripherals to secure authentication against edirectory.
7 6 Novell Modular CONSOLEONE ª MANAGEMENT log in using Òsomething they areó and Òsomething NMAS is managed through NovellÕs Java ª authored, GUI-based, common management interface, ConsoleOne. ConsoleOne is an easy-to-install snap-in module. Specific ConsoleOne property pages let the administrator manage authentication methods, the sequence of those methods, and the security grade associated with those methods. Each of these management tasks is explained further below. Managing Methods. During the installation of the snap-in module, NMAS extends the edirectory schema and creates new objects in the edirectory treeõs Security container. These new objects are the Authorized Login Methods container and Login Policy objects. All authentication methods are stored and managed in the Authorized Login Methods container. By default, NMAS installs the standard edirectory password authentication method. Additional authentication methods can be installed using a wizard launched from the Authorized Login Methods container using the Create New Object option. Managing Sequences. Assigning how a user authenticates using NMAS is done by defining a login sequence and then enrolling a user with a method (e.g., password, token, biometric, etc.). Sequences incorporate one or more authentication methods and are stored in the Login Policy object in the Security container. A sequence includes the methods and the order in which those methods execute during user authentication. For example, suppose your organization implements a login policy that requires users to they know.ó As the administrator, you decide to require each user to authenticate using the Identicator BioLogon method, along with a SHA-1 password method. You would first decide the sequence of login prompts (Identicator prompt first followed by SHA-1 password or vice versa) and then create the sequence in the Login Sequences property page. The NMAS framework lets administrators easily chain both Novell and third-party authentication methods as part of a login sequence. No collaborative engineering work between different companies is needed. The NMAS framework does the collaboration. This makes it possible to create a sequence using the Identicator fingerprint reader, a Vasco token, and a standard edirectory password. Graded. This powerful feature lets administrators determine a scale or grade of the authentication methods supported and grant access rights accordingly. For example, the organizationõs security policy might specify that a biometric is a stronger form of authentication than a password. As a result, a user successfully authenticated with a biometric might receive access to a large set of resources because the administrator has greater confidence in that form of authentication. Conversely, a user authenticating to the network with a password might be granted a subset of access rights. This allows the administration of network access rights to be more finely controlled through authentication by requiring stronger forms of
8 Novell Modular 7 authentication from those users who need access to highly sensitive information and/or wider access. The example below demonstrates how NMAS could be implemented in a healthcare organization to control the confidentiality of medical records by ensuring that the proper level of authentication has occurred. Also notice that information contained on a NetWare volume designated as a secure location cannot be copied or moved to a volume with lower security restrictions. NMAS lets administrators assign any one of the following labels to edirectory volumes: Biometric & Password & Token Biometric & Password Biometric & Token Password & Token Biometric Password Token Logged In The access requirements associated with each of these labels are self-evident, except perhaps with the access requirements of the Logged In label, which enables access without requiring the use of a specific NMAS login method. All users who have authenticated to edirectory have at minimum, read-only rights to any volume labeled Logged In. edirectory VOLUME LABELS Graded authentication lets network administrators assign security labels to NetWare volumes based on the number and type of login factors deemed necessary to enable access to these volumes. For example, an administrator might assign a Biometric & Token label to a NetWare volume and subsequently create a login sequence that would include both a biometric and token authentication method. All edirectory volumes have the Logged In label by default, so an administrator must label only those volumes requiring restricted access. Below is a screenshot from ConsoleOne showing the properties of a user, Joe. Notice that Joe is authorized to login with Biometric & Token and Biometric. Additionally, Joe has Logged in as a default security clearance which will allow him to attach and read NetWare volumes if his ACLs permit.
9 8 Novell Modular ENFORCED RESTRICTIONS Users are prohibited from accessing edirectory volumes that require login factors that are not included in their clearance level. For example, a user with Biometric & Token clearance does not gain access to volumes labeled Biometric & Password & Token, nor could that user access CLEARANCE LEVEL ASSIGNMENTS Enforcing user access to labeled edirectory volumes is done through assigning clearance levels to users. At the discretion of the network administrator, an edirectory User object can be assigned one or many clearance levels. A userõs access is dependent on both the label of the edirectory volume and the clearance the user has when logging in. No matter what method a user uses to log in, he or she cannot access volumes with similar-method security labels unless he or she has been granted clearance that allows such access. The clearance level names are identical to the security label names. That is, an administrator can assign User objects clearance levels such as Biometric & Password & Token, Biometric & Password, Biometric & Token, and so on down the list shown above. In addition, administrators can assign a Multilevel Administration clearance. Multilevel Administration clearance provides read-write access to ALL areas on the networkñ a clearance that should be assigned to only a select few. volumes labeled Password. This ensures that users cannot access areas with security labels that are higher than or entirely different from their clearance level. Users are granted read-only access to volumes with labels that require fewer but at least one of the factors stated in their clearance level. For example, if a user is granted Biometric & Token clearance and requests that clearance at login, that user gains read-only access to volumes labeled Biometric and those labeled Token. In the example above, even though the userõs clearance level may appear to be sufficient to be granted read-write access to volumes labeled Biometric and those labeled Token, the user is intentionally denied read-write access. This is a security measure to ensure that confidential information remains on the volume where it resides without that information being accidentally or maliciously copied to an area where it should not be stored. DUAL PRODUCT OFFERINGS NMAS is available in two product offerings, namely the Novell Modular Service Starter
10 Novell Modular Pack and the Novell Modular Service Enterprise Edition. Each are described in detail below. STARTER PACK Available as a free Web download and bundled with certain Novell products, the Novell Modular Service Starter Pack lets network administrators create single-method login sequences using any of the available Novell methods. This way, administrators can set up departments and even individual user access to edirectory volumes according to perceived security needs. CERTIFIED MODULES Novell assures the compatibility of the methods available for Web download or included in either product, by insuring that each pass the ÒYesÑ Tested and ApprovedÓ and ÒeDirectory EnabledÓ certification tests. To maintain the assurance that the modules remain unaltered, NMAS will only allow Novell digitally signed modules to be installed. As Novell works with more partners to develop authentication modules, Novell will continue to test and certify new modules. Upon certification, these digitally signed modules may be made available to NMAS users through Web download. ENTERPRISE EDITION Available as a for-purchase product, the Novell Modular Service Enterprise Edition allows for multi-factor authentication by allowing one or more Novell or third party methods to be chained together in a desired sequence order. In addition, the graded authentication feature allows administrators to base volume access rights according to the methods used for authentication at login. NOVELL CLIENT SUPPORT Novell has updated its Windows* 5/8 and Windows NT* clients to efficiently support the NMAS login methods. With NMAS, edirectory users can indicate the login sequence that they will use to log in to edirectory and, if needed, the clearance they need. The login sequence and clearance may be selected in a new tabbed page in the Novell Client ª login dialog. REQUIREMENTS Server: NetWare 5.1 SP2 with edirectory 8 or Windows NT/2000 with edirectory 8.5 and NICI 1.5 Client Platform: Windows NT 4 SP3 or higher, Windows 5 OSR2B, or Windows 8 SP1 Novell Client: Novell Client for Windows 5/8 version 3.2 or higher Novell Client for Windows NT/2000 version 4.7 or higher Processor: 486/33 or higher Memory: 64 MB minimum on server; 40 MB on client Hard Disk Space: 100 MB of available disk space on the NetWare 5 server. Note: If PKIS 2.0 and ConsoleOne are already installed, only 10 MB is required. Rights: Administrator rights to the NetWare 5 server to install NMAS from a client; NT administrator rights to install client software on Windows NT
11 NOVELL PARTNERSHIPS Novell encourages vendors of authentication devices to contact Novell for potential partnerships, including partnerships in both integration and marketing. Also, Novell has streamlined the integration process between Integrated Service Vendors (ISV) and Novell, enabling Novell ISVs working with Novell shops to integrate with NMAS in as little as one week. To inquire on more details contact Novell toll-free at (800) and ask for an NMAS Product Manager. CONCLUSION As organizations look to provide enhanced security to their networks, choosing to implement different and multiple login methods is a logical approach. NMAS makes implementing an advanced authentication system in your edirectory tree easy and painless. Novell partners with the worldõs leading authentication developers to provide a solid security framework that allows many different forms of authentication to work together to provide enhanced security in edirectory managed networks. Graded authentication provides the ability to grant access rights according to the authentication method used. This allows network access rights to be finely controlled through authenticationñ an additional layer of security protecting sensitive data. NMAS is one of many components that build solutions that deliver on the One Net vision at Novell. By simplifying security administration, securing access to data, and accelerating productivity, NMAS gives your organization the power to change with Net services software from Novell. Copyright 2001, Novell, Inc. All rights reserved. Novell and NetWare are registered trademarks, and ConsoleOne, edirectory, NMAS, Novell Certificate Server and Novell Client are trademarks of Novell, Inc. in the United States and other countries. *All third-party trademarks are the property of their respective owners. Novell Product Training and Support Services For more information about Novell s worldwide product training, certification programs, consulting and technical support services, please visit: For More Information Contact your local Novell Authorized Reseller, or visit the Novell Web site at: You may also call Novell at: US/Canada Worldwide Facsimile Novell, Inc South Novell Place Provo, Utah USA
www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013
www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013
www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
RSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
Multi-Factor Authentication
Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide
RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security
Novell Password Management
Novell Password Management Administration Guide Novell Password Management 3.1x March 9, 2007 ADMINISTRATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
SELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT ADMINISTRATOR'S GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Authentication Tokens
State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Authentication Tokens No: NYS-S14-006 Updated: 05/15/2015 Issued By: NYS ITS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
BlackShield ID MP Token Guide. for Java Enabled Phones
BlackShield ID MP Token Guide for Java Enabled Phones Copyright 2010 CRYPTOCard Inc. http:// www.cryptocard.com Trademarks CRYPTOCard and the CRYPTOCard logo are registered trademarks of CRYPTOCard Corp.
Innovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
Endpoint Security VPN for Windows 32-bit/64-bit
Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist
Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing
Administration Quick Start
www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
TrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
An Enterprise Approach to Mobile File Access and Sharing
White Paper File and Networking Services An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Novell Filr Competitive
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
Smart Card Setup Guide
Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
VPN Client User s Guide. 9235966 Issue 2
VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the
Two-Factor Authentication
Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Implementation Guide for protecting
Implementation Guide for protecting Remote Web Workplace (RWW) Outlook Web Access (OWA) 2003 SharePoint 2003 IIS Web Sites with BlackShield ID Copyright 2010 CRYPTOCard Inc. http:// www.cryptocard.com
Novell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
GINA Implementation in the RSA Authentication Agent 6.1
TECHNOLOGY GINA IMPLEMENTATION BACKGROUNDER IN THE GINA Implementation in the RSA Authentication Agent 6.1 for Microsoft Windows RSA SecurID for Microsoft Windows is an authentication solution that proves
Managed Portable Security Devices
Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Citrix and Terminal Services Guide SecureLogin 8.1
Citrix and Terminal Services Guide SecureLogin 8.1 September, 2015 www.netiq.com/documentation Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn.
PROXKey Tool User Manual
PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7
NetIQ Certificate Server 8.8 SP8. Administration Guide
NetIQ Certificate Server 8.8 SP8 Administration Guide September 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Full Disk Encryption Pre-Boot Authentication Reference
www.novell.com/documentation Full Disk Encryption Pre-Boot Authentication Reference ZENworks 11 Support Pack 4 Beta April 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
SafeNet Authentication Client (Windows)
SafeNet Authentication Client (Windows) Version 8.1 SP1 Revision A User s Guide Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Certificates for computers, Web servers, and Web browser users
Entrust Managed Services PKI Certificates for computers, Web servers, and Web browser users Document issue: 3.0 Date of issue: June 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
BlackShield ID PRO. Steel Belted RADIUS 6.x. Implementation Guide. Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved
BlackShield ID PRO Steel Belted RADIUS 6.x Implementation Guide Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved License and Warranty Information CRYPTOCard and its affiliates retain
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
Frequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
PINsafe Multifactor Authentication Solution. Technical White Paper
PINsafe Multifactor Authentication Solution Technical White Paper Abstract PINsafe is a flexible authentication solution that offers a wide range of authentication models. The use of the patented one-time
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Directory-enabled Lights-Out Management
Directory-enabled Lights-Out Management white paper Abstract... 2 Remote management products... 2 Business needs... 3 Customer environment... 3 Benefits... 3 Directory architecture... 4 Overview... 4 Objects...
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
E-CERT C ONTROL M ANAGER
E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...
