Identity Management Frameworks for Cloud
|
|
|
- Austin Toby Walters
- 10 years ago
- Views:
Transcription
1 Identity Management Frameworks for Cloud Roshni Bhandari Department of Computer Science and Engineering Parul Institute of Technology, Vadodara UpendraBhoi Department of Computer Science and Engineering Parul Institute of Technology, Vadodara Dhiren Patel Department of Computer Engineering National Institute of Technology, Surat, India ABSTRACT Cloud computing is a new trend of computing paradigm that provides a set of scalable resources on demand. However, it also being a target of cyber attacks and creates risk for data privacy and protection. An Identity Management System (IDM) supports the management of multiple digital identities for authentication and authorization. This paper reviews various identity management frameworks that help making Cloud environment more secure. General Terms Identity management, Service provider, Identity provider, Cloud computing. Keywords Single-Sign-On (SSO); Identity and Access Management, Personal identifiable information (PII); identity federation management; provisioning; de-provisioning 1. INTRODUCTION 1.1 Cloud Computing In 2011, NIST [1] defined Cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., Networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud model consists of five essential characteristics that are ondemand self-service, broad network access, resource pooling, rapid elasticity, measured service; three service models that are software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS); and three deployment models that are private Cloud, public Cloud, and hybrid Cloud(see Figure 1). 1.2 Identity Management System An identity is a set of unique characteristics of anuser: an individual, a subject, or an object. An identity used for identification purposes is called an identifier [3].Service providers provide the authentication to the user identifiers. Identifiers provide digital identity to an SP about the user s identity, which helps the SP to decide whether to allow the user to use a service or not. Users may have multiple digital identities. An Identity Management System (IDM) supports the management of multiple digital identities. It also decides how to disclose personally identifiable information (PII) of entities to obtain a specific service. IDM performs the following tasks [4]: Fig 1: Cloud Computing [2] Set up identities: Comparing personally identifiable information with auser. Describe identities: Delegate attributes identifying auser. Record the use of identity data: Storethe identity activity in a system. Destroy an identity: After the completion of the work personally identifiable informationof the user become unusable. A set of parties uses IDM and collaborate to identify an entity. These parties are [3]: Identity provider (IdP). It issues digital identities. For example, governments issues identities of social security number or driving license, master card provider issues identities enabling payment. Service provider (SP). It provides services to entities on the bases of valid authentication. For example Net banking or online transaction. User. Users about whom claims are made. A claim could be, for example, a user name, or an etc. Identity verifier. It receives requests from the Service Provider for verifying a claim of users. It verifies whether the claims are correct or not. An IDM uses one of the following three categories of identifiers: Identifiers that both auser and Service Provider know. Identifiers that an entity knows and Service Providers can verify via the Identity Provider.Identifiers that an entity is (unique markers, for example retina).the 7 Laws of identity which are developed by Kim Cameron given below [5]: User Control and Consent: With the user s consent, the technical identity systems must only reveal information identifying a user. The System must protect the user against fraud and also verifying the identity of the users. 25
2 Minimal Disclosure for a Constrained use: The solution which discloses the minimum amount of identifying information and it is the long-term solution. Justifiable Parties: It involves the user and the service provider. The justification applies both to the userand service provider. Directed Identity: It involves only directional and unidirectional. Omni-directional identifiers use by public entities and "unidirectional" identifiers use by private entities. For example,when a computer user enters aclass room equipped with the projector it is an omni-directional identity beacon could be utilized to decide whether he wants to interact with it. If he does, a Uni-directional identity relation could be established between the computer and the projector. Pluralism of Operators and Technologies: In identity system the inter-working of multiple identity technologies run by multiple identity providers. Human Integration: The identity metasystem must define the human user to be a component of the distributed system integrated through unambiguous human-machine communication mechanisms offering protection against identity attacks. Consistent Experience Across Contexts: It means that user request for services to the service provider then the service provider match the digital identities and provide his services on the basis of digital identities. Functional area of identity management[6]: User provisioning: Creating and maintaining user identities for access to services.modeling and mapping: Using a management model to efficiently map users to resources. Delegated administration: Delivering a means to distributed administrators for defining a hierarchy of roles to manage to access services. Self-registration or self-service: Delivering delegated identity and editing down to individual users. Workflow: Managing identity approval processes. Auditing, logging, and reporting: Managing the necessary use of tools to history of useable life-cycle management steps, and reporting that information as well as reporting it against actual access-control lists on managed platforms. Password management: Providing an administrative interface specifically for password policies and synchronization. Integration: Using a toolkit such as a meta directory service to link multiple identity sources together for easier updating. Various Identity Management Framework which manages the electronic identities. These Frameworks include SAML, Liberty Alliance, Windows Card space, PRIME, OpenID, OAuth, OneLogin, Windows identity Foundation, etc.. The rest of the paper is organized as follows: Section 2 derives Importance of Identity management in the Cloud. Section 3 describes the Identity management Frameworks. Section 4 summarizes and compares Identity management frameworks in thecloud. Section 5 concludes this survey and the Section 6 covers the references. 2. IMPORTANCE OF IDENTITY MANAGEMENT IN CLOUD In Cloud computing, entities may have multiple accounts associated with different Service Providers. Likewise, entities may use multiple services offered by the same Service Provider (e.g., Gmail and Google Maps are offered by Google). A Cloud user has to provide his personally identifiable information (PII), which identifies him. Sharing PIIs of the same entity across services along with associated attributes can lead to the mapping of PIIs to the entity [7]. The main issue is how to secure PII from being used by unauthorized or untrusted parties in order to prevent serious crimes against privacy, such as identity theft [8]. The owner of data, including PII, is responsible for his privacy in Cloud computing. The owner needs technical controls supporting this challenging task.in a Public Cloud [9], to improve security use identity management features such as a singlesign-on. This would limit user provisioning and avoid multiple access system that work of monitoring of the activities of the end user.in a Private Cloud [9], which is managed by the organization, thus it is protected by a firewall. These types of Clouds integrate with client s identity management systems for SSO, user authentication, authorization, audit, provisioning, role management and compliance.identity Management Maturity Model for three types of services i.e. Software as a service (SaaS), Identity as a service (IDaaS) and Infrastructure as a Service (IaaS) is providing the security in it. Identity Management reduces the cost and the complexity of internal infrastructure to external SaaS and Cloud applications. Identity management Lifecycle (see Figure 2) is useful to manage user identities and their credentials. Cloud provisioning means on-demand Provisioning. User Provisioning includes Active Directory and Light Weight Directory Access Protocol. Fig 2: Identity management Lifecycle [10] Single-Sign-On: It is useful to manage personal information of user in online business. User can Only one time login and use multiple application. One log-on provides access to all resources of the network, LAN or WAN. It can be illustrated in two different scopes. client/server relationship and e- commerce domain. Client/server relationship: Single sign-on is a user authentication process that permits a user to enter one name and password in order to access multiple applications. E-commerce: The single sign-on is designed to centralize consumer financial information on one server- not only for the consumer's convenience but also to offer increased security by limiting the number of times the consumer enters credit card numbers or other sensitive information used in billing [21]. Types of Single-Sign-On are given below [21]: Password Synchronization The password synchronization is the process of changing each password for different applications of the same value, so that the user always enters the same password. Once the user installs password synchronization software, users will enter the same password when they login to any of the synchronized systems, such as to their network, finance system, , calendar. Legacy SSO (Employee/Enterprise SSO) There are two types in which Script based and Application wizard based involve. In Script based Write a script that would take the target application credentials and launch the application and in Application Wizard based Runs a service on the client that continually monitors the workstation for login dialog boxes. Web Access Management (WAM) 26
3 1. Request resource 2. Authentication challenge 3. User login 4. HTML SAML signed (or encrypted) response 5. Browser post SAML response 7. Web response supplied International Journal of Computer Applications ( ) It is a form of identity management that controls access to web resources, providing authentication management, policybased authorizations audit and reporting services. It is a browser based application. Cross Domain SSO In Cross Domain SSO Multiple states that manage user credentials. A user authenticated in one states gets signed-on to an application using another states typically within the same enterprise. Federated SSO Example of federated SSO is Liberty Alliance, OASIS, IBM/Microsoft. It is used to Establishment of trusted partnerships, New revenue opportunities and New, efficient, and production models. In One Login Only one password can make very secure. It can encrypt the sensitive data and send it by the SSL save channel, Reduced operational cost, Reduced time to access data It Improved user experience no password lists to carry. 3. IDENTITY MANAGEMENT FRAMEWORKS 3.1 SAML Security Assertion Markup Language is an XML-based Open standard data format for exchanging authentication and authorization data between two parties an identity Provider and Service Provider over an internet[11].the Consortium for defining SAML standard and security is OASIS(Organization for the Advancement of Structured Information Standards)[12].There are three SAML versions: SAML 1.0, SAML 1.1 and the new major version of SAML is 2.0 became an official OASIS standard in March The Component of SAML are assertions, Protocols, Bindings and Profiles[12]. Assertions: The transaction from the identity Provider to the Service Provider is called a SAML assertion. Protocols: It is used to communicate assertions between the service provider and identity Provider. Bindings: It is used to Map the SAML Protocol on to lower level network communication Protocols which are used to transport the SAML assertion between the identity Provider and Service Provider. Profiles: It is the highest level of SAML Component that is the use cases between identity Provider and Service Provider that indicates how assertion,protocols and Bindings will work together to Provide single-sign-on. The web browser Single-Sign-on profile may be initiated by the Identity Provider or the Service Provider. If Initiated by the Identity Provider, the assertion is either signed, encrypted, or both. The Figure 3 shows that the Identity Provider Initiated SAML, assertion Flowchart. In this Browser send the request to an identity provider for access resource. Identity provider redirects with AuthRequest to Browser. Identity provider getsauthrequest from Browser. The identity provider sends the challenge for credentials or proof to Browser like username or password. Browser login with username and password. Identity provider response with signal in HTML form to Browser. Browser POST SAML response to the Service Provider. Service Provider checks authentication and authorization from SAML Assertion. Then service provider supply resources to the browser. In the case of service provider initiated SAML Assertion flowchart, the service provider redirected the user back to the identity provider s federation web page with a SAML request. SAML is Single-Sign-On Process so that only one time login with username and password and use multiple applications and services at a time. So it reduces the time taken by users to log into multiple applications and platforms. SAML also improves the effectiveness of all Networks. It also reduces the Administrative Overhead. SAML does not require user information to be maintained and synchronized between databases. The limitations of SAML are single point of failure. It added the cost and also the necessary information disclosure between the trusting site and SSO authority. Identity Provider Browser 6. SP ensures authentication and authorization from SAML assertion Identity Provider Fig 3: Identity Provider Initiated SAML Assertion Flowchart [12] 3.2 Liberty Alliance Liberty Alliance defines sets of protocols that collectively offer solutions for identity federation management, crossdomain authentication and session management [13]. Liberty Alliance Circle includes User, Identity Provider and Service Provider. It is the single-sign-on in which no need to authenticate again. Steps for single-sign-on being as given in Figure 4. 1) User SP: Request for services. 2) SP User: Choose the IDP,where the User federated his identity. 3) SP User: SP acknowledges the IDP chosen and redirects the User to IDP sites. 4) User IDP: Authenticate the User against the IDP and also contain the Information about the SP. 5) IDP User: IDP generates SAML Token. 6) IDP User: Send Response with the Token inside the message. 7) User SP: Send the Token. 8) SP IDP: SP Communicate with IDP for Verification of User Authentication. 9) IDP SP: IDP response with assertion to the SP. 10) SP User: SP Provide the services to the user on the basis of Assertion. 11) SP User: Response with the service. 12) SP User:SP Provide the service to the User. While Authentication proves the identity, there is another concept which is called Authorization. The purpose of authorization is to provide access rights to the users with certain levels. After completing the Authentication, Authorization and Single Sign-On mechanism, Liberty Alliance specifications also support the Single Sign-Out mechanism. The user sends request for single Logout to identity Provider. Identity Provider Forward this request to Service Provider. The service Provider does Process for Log out. Service Provider sends response to the Identity Provider. Identity Provider forward Single Log out confirmed to the user.the Liberty Alliance is Single-Sign-On and it authenticate and Authorize user Profiles. It also Provide the Scalability [14]. 27
4 User 1. Request Service Provider The messages in steps 3, 5, 6, and 7 must be carried over and SSL/TLS channel to preserve their confidentiality. 3. Response + Redirection 2. Obtain IDP 4. Auth request 6. Response + Token 5. Process Auth 7. Request + Token 8. Verified token 9. Response 11. Response 10. Process Assertion 12. Transactions Fig 4: Single-Sign-On [14] 3.3 Windows CardSpace Windows CardSpace is an Identity-metasystem which provides a way, for managing multiple digital identities of a user [15]. It is based on the Concept of an Information Card ( InfoCard).It is claims based access platform/ architecture, developed for windows XP. It uses a plug-in for Internet explorer 7 browser. Microsoft CardSpace is built on WS- Federation protocol which consists of the following standards providing a basic model for federation between Identity Providers and Relying Parties: WS-Trust, WS-Security Policy, WS-Security. In this identity system three parties are involved: Identity provider: It issues digital identities (as trusted third-party). For example, a credit card provider might issue digital identities (security tokens) enabling payment. Even individuals can be Idp if they use self-issued identities like the signing of websites, using username and password. Relying Parties: It requires identities to provide a service to a user for example, a web site. Service requestor: they are individuals and other entities about whom claims are made. The CardSpace identity metasystem makes use of XML based protocols, including the Web Services protocols and SOAP. The message flows of the CardSpace framework are as follows. Here (see Figure 5) CardSpace-enabled User agent (CEUA), Relying Party (RP) and Identity Provider (IDP) are involved[15]. 1) CEUA RP: HTTPGETLoginHTML Page Request. 2) RP CEUA: HTML Login Page + InfoCard Tags (XHTML or HTML object tags). 3) CEUA RP: CEUA retrieves security policy via WS Security Policy. 4) CEUA User: User picks an InfoCard. 5) CEUA IdP (Identity Provider): User Authentication. 6) CEUA IdP: CEUA retrieves security token via WS Metadata Exchange and WS-Trust. 7) CEUA RP: CEUA presents the security token via WS- Trust. 8) RP CEUA: Welcome, you are now logged in. Fig 5: CardSpace Model of Identity Management [15] They are more flexible than simple user names and passwords. It employs strong cryptography, which makes their use more secure than passwords. It can potentially present any type of identity claim that makes sense to all of the interacting parties and which users are willing to release. The CardSpace framework is criticized due to its reliance on the user s judgment of the trustworthiness of an RP. Most do not pay attention when asked to approve a digital certificate of an RP, either because they do not understand the importance of the approval decision or because they know that they must approve the certificate in order to get access to a particular website. RPs without any certificates at all can be used in the CardSpace framework. In a case where a single IdP and multiple RPs are involved in a single working session the security identity metasystem within the session will rely on a single layer of authentication that is the authentication of the user to the IdP. If a working session is hijacked or the password is cracked the security of the entire system is compromised. To defeat the security imitation mentioned above use the Zero-Knowledge Proofing, Selective Disclosure, Anonymous Credential [15]. 3.4 PRIME Privacy and Identity Management for Europe (PRIME) Project Produced Privacy architecture, and a Prototype and various application Scenarios[16]. Three parties are involved in PRIME: User, Service Provider and Certification Authority. User requests for services or resources to service provider and Service Provider provide the services as per user demand. Certification Authority is a special type of service provider is certifying authority that issues certificates that is digitally-signed statement. The PRIME involves four cryptographic tools namely secure communication, anonymous communication, pseudonyms, credentials and proofs of ownership of credentials. The execution of transaction is given in Figure 6. PRIME is an User-controlled privacy-enhancing means that each individual user is put into control w.r.t. His/her PII as much as possible. It is Comprehensive means bringing diverse research areas (cryptography, system architecture, policies) and prototypes together e.g. Designing and evaluating early prototypes, learning some lessons how to integrate their achievements, and closing the remaining gaps. It is a large scale means that system architecture, security and privacy mechanisms, prototypes, terminology, and tutorials are developed, presented to the public and evaluated. The 28
5 Limitations of PRIME is the product is not standardized and it is only possible unless it is interoperable with existing systems. It has its middleware which should be implemented on senders and receiver side console, which is an extra overhead [16]. Phase I agreed contract Phase II Ongoing contract execution User Service request Offer User s requirement Accept/Reject (certified) data (certified) data Service Provider Fig 6: Execution of a transaction[16] agreed contract store data, activate obligations Obligations enforcement access control to user s data 3.5 OpenID OpenID is a Safe, Faster, and Easier way to log in to websites. OpenID is a decentralized model for identity management, which allows service providers to delegate the authentication of users to identity providers. In this model, the identity of a user is represented by a URL, called an OpenID identifier. Hence, users don t need to create a separate account for each site; instead, they just have to use their OpenID identifier, and the authentication procedure will be conducted through the user s identity provider [17]. OpenID is supported in many programming languages like Java, PHP, Perl C/C++, C##, python. The Flow of OpenID as shown in Figure 7and given below [17]: The user requests access to a service or resource at the Service Provider site.the Service Provider requires the authentication of the user and asks for his OpenID identifier. The user provides an OpenID identifier. OpenID 2.0 allows the user to simply provide the identifier of his identity provider, enhancing this way his privacy by reducing the chances of being traced through his identifier.the SP performs a discovery process using the supplied identifier to locate the IdP of the user.the SP and the IdP perform an association process, that is, they generate a shared secret through a DiffieHellman key exchange.the SP constructs an authentication request and redirects the user to the IdP site through an HTTP redirection.the user gets authenticated by the IdP, for example, by providing his credentials. User SP IdP 1. Access to SP site 2. OpenID login 3. Users OpenID identifier login 4. Discovery 5. Association 6. Authentication request (HTTP redirection) 7. Authentication 8. Authentication response (HTTP redirection) 10. User is authenticated 9. Verification of response Fig 7: OpenID Authentication protocol [17] The IdP constructs an authentication response, which contains an assertion about the result of the authentication. The IdP signs the request. The user is then redirected back to the SP site in order to continue with the authentication process.the SP verifies the authentication response and reads the attribute values included within.the user gets authenticated at the SP site and is able to access to the requested service. It provides the control of sharing information and faster & easier registration login. The limitations of OpenId are Phishing Attacks. 3.6 OAuth In OAuth is an Open Authentication method where user can share his stored resources to one site with another site without having to hand out his/her username and password[18]. It is flexible and designed to work with mobile devices and desktop applications. Example of OAuth is given as below. User as BOB, Service Provider as Fuji (a photo sharing site), 2 photos BOB uploaded are protected resources. BOB wants to share his vacation journey photos with his friends, BOB using Faji, a photo sharing site, for sharing his journey photos, he signs with faji.com with his account and share his photos which he marks private. BOB wants to share his photos with his grandma but his grandma has no internet connection so BOB plans to order prints and have them mail to grandma. Being a responsible person BOB use, Beppa, environmentally photo printing service. Here Beppa is the consumer and must use OAuth to gain access to the photos in order to print them. In Beppa, printing service, 3 locations or supports or options are there: flicker, Fotolog and Fuji. When Beppa added support for Fuji photo import, Beppa obtain a consumer key and consumer secrete from Fuji to be used with Faji soauthenabled API. Beppa requests from Faji a request token at this point, the request token is not User specific and can be used by Beppa to gain User Approved from BOB to Access his Private photos. When Beppa receive the request token, it redirects BOB to the Fuji OAuth User authorization URL with the request token and asks Fuji to redirect BOB back once approval has been granted to the URL. After successfully logging into Fuji, BOB is asked to grant access to the pipe. Fuji informs BOB and the type of access being granted. BOB can approve or deny access. BOB waits for Beppa to present him with his photos fetched from his Fuji account. While BOB waits, Beppa uses the authorized request token and exchanges it for an access token. Here Request tokens are only good for obtaining user's approval while access tokens are used to access protected resources, BOB s photos. In this 29
6 case Beppa exchanges the request token for an access token in the first request and in the second request gets the photos. BOB show that Beppa capture his photos without using his username and password. OAuth use Digital Signature, Hash Algorithm, Shared Secret, Nonce, TimeStamp. If the OAuth standard is extended with support for info cards or other functionality in the future, it might easily be supported in your application. It is Easier to manage or maintain configure them for example extranet login models with mixed authentication like SAML. It is Less data to store on servers. 3.7 OneLogin OneLogin is the Single-Sign-On and Identity management for Cloud based Applications. It is nice web applications for Saas. It is used to improve the security of Saas Apps, having a Centralized Password, user can have a more secure password throughout his network of apps because the user does not have to remember them all. OneLogin works by installing a browser extension which effectively Pastes the credentials into the apps and logs user in. It supports the major Browser like Firefox, Safari, Chrome and also supports the major OS s- windows, Mac, Linux. The Active Directory &LDAP, are available. It also provide the De-Provisioning. OneLogin s Cloud identity platform comes complete with secure single sign-on for web, mobile and ipad, federated search, user provisioning, deep directory integration with real-time user sync, out-of-band multi-factor authentication, VPN integration and compliance reporting. OneLogin s catalog contains thousands of pre-integrated applications, including Google Apps, Innotas, LotusLive, NetSuite, Microsoft Office 365, Oracle CRM On-Demand, Salesforce.com, Success Factors, WebEx, Workday, Yammer, Service Now [19].The Advantages of OneLogin are [19]:Beautiful UX (User experience), Simple to set up, easy to use, Cross Platform and Cross Browser Support, Autologin from links- nice, 2 factor authentication available, Directory Integration (AD, LDAP), Easy to add new apps (including custom apps). The limitations of OneLoginare [19]:Doesn t do role based security, only application level, De-provisioning doesn t delete or lock the applications, only prevents access to onelogin. 3.8 Windows Identity Foundation Windows identity Foundation is a Microsoft software framework for building identity aware applications. It is a set of.net Framework classes. It is a framework for implementing claims-based identity in applications. The web services that use Windows Identity Foundation, the.net frame work version 3.5 SP1 [20]. The Characteristics of Windows Identity Foundation are as below [20].It allows developers to build claims-aware applications by providing a application programming interfaces (APIs). It provides templates which building claims-aware applications.it provides utilities that create a trust relationship between a Relying Party application and a Security Token Service (STS).It also provides a ASP.NET controls that help developers create web pages in claims-aware applications.it includes a utility that helps developers translate between claims and NT tokens. It includes functionality that allows identities to be maintained across multiple service boundaries. It provides tools to help developers build custom security token services using ASP.NET.The Claim-based identity involves Claim, Security Token, Security Token Service and Relying Party. Claim is identity information such as a name, address, age. In Security Token the user delivers a set of claims along with his request. In a Web service, these claims are carried in the security header of the SOAP envelope. In a browser-based Web application, the claims arrive via an HTTP POST from the user s browser, and may later be cached in a cookie if a session is desired. They must be serialized somehow, and this is where security tokens come in. It is a serialized set of claims that is digitally signed by the issuing authority. In security token service it is the plumbing that builds, signs, and issues security tokens according to the interoperability protocols. In Relying Party When you build an application that relies on claims. 4. REVIEW OF IDENTITY MANAGEMENT FRAMEWORK IN CLOUD A comparison of different identity frameworks is given in Table 1. It also suggests that in some of the identity frameworks, the registration and identity provider initiation are not required. Although most of the frameworks support single-sign-on, earlier identity frameworks were adopted by e- mail providers and corporate organization use and government; currently they are extensively used in social networking sites and mobile apps. 5. CONCLUSION In this paper, we have discussed the concept of Cloud Computing, Identity Management and reviewed different Identity Management Frameworks. An Identity Management Framework helps align Identity Management initiatives with the organization s business goals and security strategy. It also focuses on issues related to Authentication, Authorization, Integrity, Non-repudiation, Data Confidentiality, Provisioning and De-provisioning.Based on the requirements of an application and regulatory compliances; suitable framework can be chosen. Table 1. The Comparison of Different identity Frameworks Identity Liberty Windows Windows Identity SAML PRIME OPENID OAUTH OneLogin Framework Alliance Cardspace Foundation Started in NET Current SAML ID-WSF 2.0, OPENID framework PRIME OAUTH 2.0 OneLogin WIF 4.5 Version 2.0 Liberty Registration required? NO Manifested through the installation of managed cards into the selection Restricted to registered user NO Explicit identity services preregister for a consumer key & secret Protocols SAM, LDAP,XML XML based Cryptographi XRDS, JSON,HTTP RDF,X.509 WS-Trust, WS- 30
7 Used Relying party/servic e provider initiated Identity provider initiated Main Purpose Currently used in XML, SOAP, HTTP c protocols HTTP Security, WS- Federation NO NO Singlesign-on for enterprise users Google Apps Create an open network identity infrastructure Healthcare, govt, Financial services Singlesign-on for websites Windows Vista For Data Minimization Android Apps 6. REFERENCES [1] Mell, P., and Grance, T The nist definition of Cloud computing (draft), NIST. [Online]. avilable: _Cloud-definition.pdf. [2] Bhavesh, B., Patel, A., Patel, D. R. and Patel, H Incorporating honeypot for intrusion detection in Cloud infrastructure. In Proceedings of the 6 th International Conference on Trust Management. [3] Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Othmane, L. Ben and Lilien, L An entity-centric approach for privacy and identity management in Cloud computing. In Proceedings of the 29 th IEEE Symposiumon. IEEE in Reliable Distributed System. [4] Wikipedia Identity management systems. [Online].avilable: ement_systems. [5] The Laws of identity. [Online]. avilable: [6] king, C. and Perkins, C The role of identity management in information security: part 1-The planning view. [Online]. avilable: [7] A. Gopalkrishnn, "Cloud Computing Identity Management, Journal of SETLabs Briefings, 2009, Vol. 7, No. 7, pp [8] Gellman, R Privacy in the Clouds: risks to Privacy and Confidentiality from loud, World Privacy Forum. [9] Telecom Review Importance of identity management in Cloud. [Online]. Available: ent&view=article&id=92:importance-of-identitymanagement-in-cloud-computing&catid=37:novemberdecember-2011-issue&itemid=73. [10] Identity and Access Management: IAM Architecture and Practice. [Online]. Available: 20and%20Practice_2.jpg. [11] K. D. Lewis, and J. E. Lewis, Web single sign-on authentication using SAML, International Journal of Computer Science Issues, 2009, Vol. 2, pp Singlesign-on for Consumers Expected for OAUTH V2.0 API authentication between applications Single-Sign- On for Companies to secure access web application Tempering/Disclos ure of Credential or other Sensitive data Google, Yahoo, Facebook Twitter Mobile Apps Yahoo, Google [12] J. Somorovsky, A. Mayer, A. Worth, J. Schwenk, M. Kampmann, and M. Jensen, On breaking SAML: Be whoever you want to be, In WOOT, [13] Cantor, S., Kemp, J., Champagne, D., Aarts, R., and Kavsan, B. Liberty ID-FF Bindings and Profiles Specification, Version: 1.2-errata-v2. 0. [Online]. Available: [14] Dwiputera, A. F., and Ruppa, I. S Single sign-on architecture in public networks (Liberty Alliance). In Proceedings of the INFOTECH seminar on advanced communication Services (ACS). [15] Bhargava, B., Singh, N., and Sinclair,Asher Privacy in Cloud Computing Through Identity Management. Technical Report. Computer Science, Purdue University. [16] Camenisch, J., Shelat, A., Sommer, D., Fischer- HÄubner, S., Hansen, M., Krasemann, H., Lacoste, G., Leenes, R., and Tseng, J Privacy and identity management for everyone. In Proceedings of the Workshop on Digital Identity Management. [17] Nunez, D., Agudo, I., and Lopez, J Integrating openid with proxy re-encryption to enhance privacy in Cloud-based identity services. In Proceedings of theieee 4 th International Conference on Cloud Computing Technologyand Science (CloudCom). [18] Hueniverse Beginner s Guide to OAuth. [Online]. Available: [19] OneLogin. [Online]. Available: [20] Windows Identity Foundation. [Online]. Available: on. [21] Single-Sign-On. [Online]. Available: IJCA TM : 31
Privacy in Cloud Computing Through Identity Management
Privacy in Cloud Computing Through Identity Management Bharat Bhargava 1, Noopur Singh 2, Asher Sinclair 3 1 Computer Science, Purdue University 2 Electrical and Computer Engineering, Purdue University
An Efficient Windows Cardspace identity Management Technique in Cloud Computing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 61-66 An Efficient Windows Cardspace identity Management Technique
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
An Identity Management Survey. on Cloud Computing
Int. Journal of Computing and Optimization, Vol. 1, 2014, no. 2, 63-71 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijco.2014.458 An Identity Management Survey on Cloud Computing Ardi BENUSI
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
WHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO)
WHITEPAPER NAPPS: A Game-Changer for Mobile Single Sign-On (SSO) INTRODUCTION The proliferation of mobile applications, including mobile apps custom to an organization, makes the need for an SSO solution
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth
Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth Marcos A. P. Leandro, Tiago J. Nascimento, Daniel R. dos Santos, Carla M. Westphall, Carlos B. Westphall
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Active Directory Integration WHITEPAPER
Active Directory Integration WHITEPAPER Even as enterprises continue to adopt more cloud applications, Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) still play a critical role
Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540
Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
Comparing Identity Management Frameworks in a Business Context
Comparing Identity Management Frameworks in a Business Context Jaap-Henk Hoepman, Rieks Joosten, and Johanneke Siljee [email protected], [email protected], [email protected] TNO, the Netherlands
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
The Top 3 Identity Management Considerations When Implementing Google Apps for the Enterprise
The Top 3 Identity Management Considerations When Implementing Google Apps for the Enterprise Google Apps for Work (formerly known as Google Apps) is quickly becoming one of the most popular cloud-based
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment
WHITEPAPER How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment www.onelogin.com 150 Spear Street, Suite 1400, San Francisco, CA 94105 855.426.7272 EXECUTIVE SUMMARY
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
IBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
Trend of Federated Identity Management for Web Services
30 Trend of Federated Identity Management for Web Services Chulung Kim, Sangyong Han Abstract While Web service providers offer different approaches to implementing security, users of Web services demand
SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service
Document Version: 1.0 2014-09-01 Content 1....4 1.1 Release s....4 1.2 Product Overview....8 Product Details.... 9 Supported Browser Versions....10 Supported Languages....12 1.3 Getting Started....13 1.4
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Authentication and Authorization Systems in Cloud Environments
Authentication and Authorization Systems in Cloud Environments DAVIT HAKOBYAN Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:203 Abstract The emergence of cloud computing paradigm offers
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
Domain 12: Guidance for Identity & Access Management V2.1
Domain 12: Guidance for Identity & Access Management V2.1 Prepared by the Cloud Security Alliance April 2010 Introduction The permanent and official location for this Cloud Security Alliance Domain 12
Federated Identity for Cloud Computing and Cross-organization Collaboration
Federated Identity for Cloud Computing and Cross-organization Collaboration Steve Moitozo Strategy and Architecture SIL International 20110616.2 (ICCM) Follow me @SteveMoitozo2 2 Huge Claims You want federated
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
Identity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
Take Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
CLAIMS-BASED IDENTITY FOR WINDOWS
CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Flexible Identity Federation
Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Office 365 deploym. ployment checklists. Chapter 27
Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics
Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics B.Prasanalakshmi Assistant Professor Department of CSE Thirumalai Engineering College
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Office 365 deployment checklists
Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.
Extending DigiD to the Private Sector (DigiD-2)
TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Negotiating Trust in Identity Metasystem
Negotiating Trust in Identity Metasystem Mehmud Abliz Department of Computer Science University of Pittsburgh Pittsburgh, Pennsylvania 15260 [email protected] Abstract Many federated identity management
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
TrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
