Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
|
|
|
- Gillian Moore
- 10 years ago
- Views:
Transcription
1 Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER IBM Corporation
2 Agenda Overview on Cloud Standards Identity and Access Management Discussion 2
3 Overview on Cloud Standards 3
4 Why an open Cloud is important? SOA Architecture Rise of the Dawn of WWW Service Oriented Social Business Advent of Cloud Business Agility Application Server HTTP, HTML, WSFL, XLANG, REST Java, Java EE, XML, XML Schema, SOAP, WSDL, UML, Web2.0,... Web Services, SCA, BPEL, SAML, XACML BPMN, SBVR, RIF, SOA Governance Framework, SOA Reference Architecture, Open Social, HTML 5, CMIS, OpenAjax, OAuth, Open Virtualization Format, Cloud Management, Cloud Audit, Reference Architecture, Cloud Standards Customer Council Cloud builds on and leverages the standards which preceded this market cycle
5 Context Cloud computing is a model for enabling cost effective business outcomes through the use of shared application and computing services. The value. if possible. is better economics in the execution of business processes. Hype around cloud has created a flurry of standards and open source activity leading to market confusion. As important as current standards development efforts are, they are not enough. There is a lack of a customer driven prioritization and focus within the cloud standards development process. 5
6 The landscape Dozens of new communities and organizations have formed around cloud standards including industries and governments (e.g. INCITS in US and CESI)
7 Cloud Standards Customer Council On April 7, 2011 industry leaders from across the world formed the first customer led consortium designed to shape the face of open standards based cloud computing. Drive user requirements into standards development process. Establish the criteria for open standards based cloud computing. Deliver content in the form of best practices, case studies, use cases, requirements, gap analysis and recommendations for cloud standards. Structure Participation. Primarily C-Level executive, VP of Development, IT management, Enterprise architects, cloud strategy Meetings Monthly virtual meetings. Quarterly face-toface co-located at OMG events. Participation through forums and subgroups. Oversight Managed by OMG Leadership Founding members form steering committee Standards Development This group will not produce standards but will provide guidance to existing standards development organizations Deliverables Web Presence- Community, Webcasts, Case studies, blog, vendor showcase, whitepapers, case studies awards. Candidate Deliverables ready to use content in the form of use cases, case studies, requirements, gap analysis and recommendations for cloud standards, and training. Awareness Drumbeat of awareness utilizing events, press, books, analysts partnerships and media.
8 Identity and Access Management 8
9 Agenda How to think about IAM from Cloud perspectives Industry Standards and Working Groups Scenarios Wrap-up 9
10 Trends affecting Cloud and IAM User and data mobility Perimeter security 10 API Calls Browser Access
11 Individuals will consider Cloud IAM from one or more of these perspectives FOR the Cloud What IAM capabilities are required in the cloud infrastructure and management platform? WITH the Cloud How can IAM be used to integrate onpremise and cloud based IT services? How can IAM enable cloud adoption? FROM the Cloud How can IAM services delivered via a cloud based model benefit on-premise or cloud based IT? How can IAM in the cloud be compared to equivalent on-premise solutions? 11
12 What is different about IAM in a Cloud Context? Consideration What makes it different? Data Locality Identity information may no longer be protected by the same laws and regulations as if it was in your on-premise environments. Multi-tenancy Cloud management interfaces are used by multiple tenants to manage their own use of the cloud. Cloud Provider Administration Cloud provider s administrators are not necessarily subject to the same controls as in the on-premise case. IAM can be an enabler for cloud adoption not just a security control motivated by risk management. 12
13 Identity/access model for a multi-tenant cloud must support a variety of roles and their entitlements Cloud Service Provider Cloud Services Consumer End user Service Integrator Consumer Business Manager Common Cloud Management Platform Business Manager Security & Risk Manager 13 Operations Manager Service Manager Service Composer Deployment Architect Infrastructure Consumer Administrator Service Component Developer Transition Manager Customer Care Offering Manager
14 Agenda How to think about IAM from Cloud perspectives Industry Standards and Working Groups Scenarios Wrap-up 14
15 Security Assertion Markup Language (SAML) Initially developed in 2001 Reasonable adoption among enterprises and cloud services Requires trust between identity provider and relying party partners OpenID User-centric SSO Initially developed in 2005 Wide adoption in web Lower adoption in enterprise context 15
16 OAuth An open protocol to allow secure API authorization in a simple and standard method from desktop and web applications. Initially developed in 2007 Adopted by Google, Twitter, Facebook,... Eliminates need for password based credentials to be used in API calls OpenID Connect Announced earlier in 2011 Based on OpenID 2.0 protocol Intended to achieve the same outcomes as OpenID but with RESTful APIs to simplify ubiquitous use. Designed to integrate with OAuth 16
17 Service Provisioning Markup Language (SPML) XML based framework for identity provisioning Initially developed in 2001 Low adoption among enterprise application vendors Simple Cloud Identity Management (SCIM) Formed in late 2010 designed to make managing user identity in cloud based applications and services easier make it fast, cheap, and easy to move users in to, out of, and around the cloud 17
18 OASIS Identity in the Cloud TC TC initially formed in 2010 Developing profiles of open standards for identity deployment, provisioning and management in cloud computing Cloud Standards Customer Council Formed in 2011 Broader than just identity, security Intends to influence existing standards efforts, not create new standards 18
19 Cloud Security Alliance Formed in 2009 To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. Not intended to be a standards body Australian chapter: 19
20 Agenda How to think about IAM from Cloud perspectives Industry Standards and Working Groups Scenarios Wrap-up 20
21 WITH the Cloud Integrate on-premise identity governance with the Cloud Identity lifecycle management Cloud Consumer (on-premise IT) Cloud Consumer (cloud tenancy) Cloud Management Extend on-premise identity governance capabilities to IT services hosted in the Cloud Standards are not widely adopted at this time SPML is one potential standard Examples: Manage users and groups within a GoogleApps domain from on-premise identity lifecycle management Run adapters from traditional identity provisioning solutions on cloud based instances. 21
22 WITH the Cloud Integrate on-premise authentication with the Cloud Reuse existing onpremise identity and credential stores Au Users n n Cloud Consumer (on-premise IT) Cloud Consumer (cloud tenancy) FSSO 22 e th tio a ti c Cloud Management Federated Single Sign-on (FSSO) may be the integration approach FSSO standards include SAML, OpenID Example: Use SAML to integrate with Salesforce.com
23 FROM the Cloud Strong authentication from the Cloud Potential integration with on-premise or cloud IT FSSO Cloud Consumer (on-premise IT) Authentication 2FA in the Cloud Users FSSO Cloud Consumer (cloud tenancy) Cloud Management 23 Federated Single Sign-on (FSSO) may be the integration approach FSSO standards include SAML, OpenID Example: authentication based on possession of a mobile device
24 FROM the Cloud Identity and access management from the Cloud Authentication, IAM administration IAMaaS Cloud Consumer (on-premise IT) Identity lifecycle management, SSO and access management policy An alternative model for delivery of IAM services, while retaining the rich capabilities of on-premise systems Suitable for many, but not all customers Example: IAMaaS delivered by traditional IAM vendors or their partners (e.g. Lighthouse Gateway) 24
25 WITH the Cloud Integrate access management of on-premise portal with Cloud management platform 2. Authenticate to on-premise portal Cloud Consumer (on-premise IT) 3. Authorized invocation of Cloud BSS APIs Users 1. Authenticate to authorize delegated access for on-premise portal [could be onetime] 25 Cloud based applications Cloud Management On-premise portal aggregates across multiple cloud providers Use of Cloud APIs is authorized based on user identity, not just the enterprise s Example: Use OAuth for scoped, delegated authorization of Cloud BSS APIs
26 FOR the Cloud Monitoring the cloud service provider s privileged users Cloud Consumer Cloud Management Platform Privileged Users Important part of securing the cloud infrastructure Example: Management, monitoring and auditing of privileged users operating the cloud infrastructure 26
27 FOR the Cloud Identity-enabled Infrastructure as a Service Cloud Consumer Directory Federation SSO Authorization and Entitlement Services Cloud Management Platform Images enabled with common authentication services Examples: Windows Desktop as a Service with Active Directory SSO, user switching for end users in Desktop as a Service Linux VMs with LDAP enabled SSH 27
28 FOR the Cloud Identity-enabled Platform as a Service Cloud Consumer Directory Federation Authorization and Entitlement Services Cloud Management Platform Application environments pre-configured with IAM technology and best practices Examples: Authentication via LDAP server component Federation infrastructure 28
29 Agenda How to think about IAM from Cloud perspectives Industry Standards and Working Groups Scenarios Wrap-up 29
30 What can we learn from companies who have already adopted public cloud solutions? Single Biggest Misconception about Public Cloud (% of Respondents) 30 Appirio, State of the Public Cloud: The Cloud Adopters Perspective, October
31 Conclusion Identity and access management is a logical starting point for integrating on-premise and cloud security services There is a lot of standards activity for identity, access and cloud currently underway Mature, pre-cloud standards are suitable for applying to some cloud scenarios now Identity and access can be demonstrated as an enabler for cloud adoption, not just a control driven by risk and compliance. 31
32 Cloud IAM s Can of Worms What types of new identity management methods and tools are needed to support your cloud deployments? Are new standards mandatory for integrating your on-premise and cloud identities? What would those standards need to address? Do you consider identity providers such as Google and Facebook suitable for supporting your cloud deployments? If so, why? If not, why not? How does IAM affect the economics of moving to the cloud? 32
33 References 33
34 References Cloud Computing Security Considerations, Australian Department of Defence Cloud Computing - Benefits, risks and recommendations for information security, European Network and Information Security Agency Cloud Controls Matrix, Cloud Security Alliance Guidelines on Security and Privacy in Public Cloud Computing (SP ), NIST 34
35 IBM Cloud Security Guidance Based on cross-ibm research and customer interaction on cloud security Highlights a series of best practice controls that should be implemented Broken into 7 critical infrastructure components: Building a Security Program Confidential Data Protection Implementing Strong Access and Identity Application Provisioning and Deprovisioning Governance Audit Management Vulnerability Management Testing and Validation 35
36 Discussion 36
37 Backup (Roles example) 37
38 Thanks! Computing Clouds are like cats, they only obey to who feed them! 38 38
Virtualized, Converged Data Centers and Cloud Service Providers
Internet 2 Conference Crystal Gateway Marriot Arlington, Virginia Session: April 20, 2010, 1:15-2:30 PM, Location: Rosslyn I/II Virtualized, Converged Data Centers and Cloud Service Providers Joseph Ziskin
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
BYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity
BYE BYE PASSWORDS The Future of Online Identity Hans Zandbelt Sr. Technical Architect CTO Office - Ping Identity 2015 Copyright 2014 Ping Identity Corp. All rights reserved. 1 Agenda 1 2 3 Cloud & Mobile:
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
Federated Identity and Single Sign-On using CA API Gateway
WHITE PAPER DECEMBER 2014 Federated Identity and Single Sign-On using Federation for websites, Web services, APIs and the Cloud K. Scott Morrison VP Engineering and Chief Architect 2 WHITE PAPER: FEDERATED
Extend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
Interoperable Provisioning in a Distributed World
Interoperable Provisioning in a Distributed World Mark Diodati, Burton Group Ramesh Nagappan, Sun Microsystems Sampo Kellomaki, SymLabs 02/08/07 IAM 302 Contacts Mark Diodati ([email protected])
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
The Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
Guideline on Implementing Cloud Identity and Access Management
CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for
IBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
Entitlements Access Management for Software Developers
Entitlements Access Management for Software Developers Market Environment The use of fine grained entitlements and obligations control for access to sensitive information and services in software applications
TrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
The Challenges of Web single sign-on
Serge Vereecke Security Architect IBM Security Services [email protected] The Challenges of Web single sign-on GSE Event September 7, 2012 Agenda Single sign-on technology Why single sign-on Challenges
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
How to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
Securing WebFOCUS A Primer. Bob Hoffman Information Builders
Securing WebFOCUS A Primer Bob Hoffman Information Builders 1 Agenda Gain an understanding of the WebFOCUS Architecture Where can security be implemented? Review the internal WebFOCUS repository and resource
Connecting Users with Identity as a Service
Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service
SAML:The Cross-Domain SSO Use Case
SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 [email protected] Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397
Identity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
Cloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
White Paper The Identity & Access Management (R)evolution
White Paper The Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 A New Perspective on Identity & Access Management Executive Summary Identity & Access Management
GETTING STARTED WITH IDENTITY AND ACCESS MANAGEMENT
IBM Security Systems Identity and Access Management May 23, 2013 GETTING STARTED WITH IDENTITY AND ACCESS MANAGEMENT FOR CLOUD SECURITY Version 1.0 by Shane Weeden Archit Lohokare P a g e 2 Table of Contents
White paper. Planning for SaaS Integration
White paper Planning for SaaS Integration KEY PLANNING CONSIDERATIONS: Business Process Modeling Data Moderling and Mapping Data Ownership Integration Strategy Security Quality of Data (Data Cleansing)
The Role of Identity Enabled Web Services in Cloud Computing
The Role of Identity Enabled Web Services in Cloud Computing April 20, 2009 Patrick Harding CTO Agenda Web Services and the Cloud Identity Enabled Web Services Some Use Cases and Case Studies Questions
Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps
Sofia Event Center 14-15 May 2014 Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps Radi Atanassov SharePoint MCM & MVP
BOF2337 Open Source Identity and Access Management Expert Panel, Part II. 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA
Open Source Identity and Access Management Expert Panel, Part II 23 September 2013 5:30p Hilton - Golden Gate 6/7/8 San Francisco CA slide 2 Expert Panel Emmanuel Lécharny, Apache Software Foundation Howard
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
People-Focused Access Management. Software Consulting Support Services
People-Focused Access Management Software Consulting Support Services A beautiful experience. Anytime, anywhere. Access: One is an industry-leading Access Management platform that provides you with versatile
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
Gabriel Magariño. Software Engineer. [email protected]. www.javapassion.com/idm. Overview Revisited
Gabriel Magariño Software Engineer [email protected] www.javapassion.com/idm Overview Revisited Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus
MY1LOGIN SOLUTION BRIEF: PROVISIONING. Automated Provisioning of Users Access to Apps
MY1LOGIN SOLUTION BRIEF: PROVISIONING Automated Provisioning of Users Access to Apps MY1LOGIN SOLUTION BRIEF: PROVISIONING Automated Provisioning of Users Access to Apps The ability to centrally provision
Hybrid Cloud Identity and Access Management Challenges
Hybrid Cloud Identity and Access Management Challenges Intro: Timothy P. McAliley [email protected] Microsoft Premier Field Engineer, SQL Server, Washington, DC CISA, CISM, CISSP, ITIL V3,
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment
WHITEPAPER How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment www.onelogin.com 150 Spear Street, Suite 1400, San Francisco, CA 94105 855.426.7272 EXECUTIVE SUMMARY
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
SECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
Ensuring the Security of Your Company s Data & Identities. a best practices guide
a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics
Identity, Privacy, and Data Protection in the Cloud XACML David Brossard Product Manager, Axiomatics 1 What you will learn The issue with authorization in the cloud Quick background on XACML 3 strategies
IT Exam Training online / Bootcamp
DumpCollection IT Exam Training online / Bootcamp http://www.dumpcollection.com PDF and Testing Engine, study and practice Exam : 70-534 Title : Architecting Microsoft Azure Solutions Vendor : Microsoft
Domain 12: Guidance for Identity & Access Management V2.1
Domain 12: Guidance for Identity & Access Management V2.1 Prepared by the Cloud Security Alliance April 2010 Introduction The permanent and official location for this Cloud Security Alliance Domain 12
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
Securing the Cloud through Comprehensive Identity Management Solution
Securing the Cloud through Comprehensive Identity Management Solution Millie Mak Senior IT Specialist What is Cloud Computing? A user experience and a business model Cloud computing is an emerging style
Cloud Security. Let s Open the Box. Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research
t Cloud Security Let s Open the Box t Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research Facts about Ericsson Ericsson is a world-leading provider of telecommunication equipment and
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities. With so
Identity in the Cloud Use Cases Version 1.0
Identity in the Cloud Use Cases Version 1.0 Committee Note 01 08 May 2012 Specification URIs This version: http://docs.oasis-open.org/id-cloud/idcloud-usecases/v1.0/cn01/idcloudusecases-v1.0-cn01.pdf (Authoritative)
Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015
Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud
SAP HANA Cloud Portal Overview and Scenarios
SAP HANA Cloud Portal Overview and Scenarios HERUG 2014 Conference - Montevideo April 2014 Twitter: @portal_sap / #hanacloudportal HERUG 2014 Conference Event Website Event overview Information and Agenda
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
Federated Identity for Cloud Computing and Cross-organization Collaboration
Federated Identity for Cloud Computing and Cross-organization Collaboration Steve Moitozo Strategy and Architecture SIL International 20110616.2 (ICCM) Follow me @SteveMoitozo2 2 Huge Claims You want federated
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report
KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT Executive Overview SAML (Security Assertion Markup Language) is a standard that facilitates the exchange of security information. Developed by
Open Source Identity Management
Open Source Management OpenAlt 2015 Radovan Semančík November 2015 Ing. Radovan Semančík, PhD. Software architect Co-owner of Evolveum (open source company) Architect of midpoint project Apache committer
An Introduction to SCIM: System for Cross-Domain Identity Management
An Introduction to SCIM: System for Cross-Domain Identity Management Nicholas Crown UnboundID Session ID: IAM-107A Session Classification: General Interest Agenda Why Standards-Based Provisioning? History
TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE
White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
SECURE CLOUD COMPUTING
Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud
Government's Adoption of SOA and SOA Examples
Government's Adoption of SOA and SOA Examples Presented by : Ajay Budhraja, Chief of Enterprise Services ME (Engg), MS (Management), PMP, CICM, CSM, ECM (Master) AIIM, ITIL-F Copyright 2008 Ajay Budhraja
