NetworkingPS Federated Identity Solution Solutions Overview



Similar documents
SAML-Based SSO Solution

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Extend and Enhance AD FS

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

SAML-Based SSO Solution

PingFederate. SSO Integration Overview

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Flexible Identity Federation

nexus Hybrid Access Gateway

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Provide access control with innovative solutions from IBM.

The Primer: Nuts and Bolts of Federated Identity Management

Secure the Web: OpenSSO

Introduction to SAML

Single Sign On In A CORBA-Based

CHAPTER - 3 WEB APPLICATION AND SECURITY

UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL SS. Single Sign-On (SSO) Solution

WebLogic Server 7.0 Single Sign-On: An Overview

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

The Top 5 Federated Single Sign-On Scenarios

The Primer: Nuts and Bolts of Federated Identity Management

PingFederate. Integration Overview

G Cloud 6 CDG Service Definition for Forgerock Software Services

White paper December Addressing single sign-on inside, outside, and between organizations

Controlling Web Access with BMC Web Access Manager WHITE PAPER

Quest One Identity Solution. Simplifying Identity and Access Management

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

SAML SSO Configuration

Improving Security and Productivity through Federation and Single Sign-on

PortWise Access Management Suite

Evaluation of different Open Source Identity management Systems

OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com

Federated Identity and Single Sign-On using CA API Gateway

SSO Plugin. Release notes. J System Solutions. Version 3.6

An Overview of Samsung KNOX Active Directory-based Single Sign-On

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

2013 AWS Worldwide Public Sector Summit Washington, D.C.

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

Google Identity Services for work

Web Applications Access Control Single Sign On

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Identity. Provide. ...to Office 365 & Beyond

API-Security Gateway Dirk Krafzig

How can Identity and Access Management help me to improve compliance and drive business performance?

Securing the Cloud through Comprehensive Identity Management Solution

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Enable Your Applications for CAC and PIV Smart Cards

managing SSO with shared credentials

Perceptive Experience Single Sign-On Solutions

When millions need access: Identity management in an increasingly connected world

Getting Started with AD/LDAP SSO

Cisco IP Solution Center MPLS VPN Management 5.0

A Standards-based Mobile Application IdM Architecture

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Active Directory and DirectControl

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific

Cisco Data Center Network Manager for SAN

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

MOVING TO THE NEXT-GENERATION MEDICAL INFORMATION CALL CENTER

OpenID Connect 1.0 for Enterprise

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

IBM Maximo technology for business and IT agility

SOA REFERENCE ARCHITECTURE: WEB TIER

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

TFS ApplicationControl White Paper

Centrify Cloud Connector Deployment Guide

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

Sentinet for BizTalk Server SENTINET

LDAP Authentication Configuration Appendix

PortWise Access Management Suite

Blackboard Building Blocks Technology for Decision-makers. A non-technical discussion of how third party products can be integrated with Blackboard

white paper 5 Steps to Secure Internet SSO Overview

Getting Started with Single Sign-On

How to Implement Enterprise SAML SSO

An Overview of Samsung KNOX Active Directory and Group Policy Features

WebNow Single Sign-On Solutions

Cisco UCS Central Software

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

The Role of Federation in Identity Management

PRODUCT BRIEF OpenAM. Delivering secure access for customers, applications, devices and things

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

CA Federation Manager

WEB-8000 Series and WEBs-N4. Our newest products are open 4 innovation.

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

PingFederate. IWA Integration Kit. User Guide. Version 3.0

Using DeployR to Solve the R Integration Problem

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION

Federated Identity Management Solutions

Improve your mobile application security with IBM Worklight

Transcription:

NetworkingPS Federated Identity Solution Solutions Overview OVERVIEW As the global marketplace continues to expand, new and innovating ways of conducting business are becoming a necessity in order for companies to abide by corporate security practices and remain in compliance with existing governmental regulations. In order to keep sensitive data within the hands of the right people, more and more corporations are seeking out multi-layer identity management solutions that encompass more than basic request-based user provisioning capabilities. NetworkingPS (NPS) promotes a bottoms-up approach in its product and services offerings that span every aspect of identity management, from basic to more advanced user lifecycle management activities. NetworkingPS Multi-Layer Identity Framework Federated Web SSO Federated Web Provisioning Federated Web Services Enterprise RBAC Enterprise Identity Management Platforms Application Servers NPS product and services offerings span every layer of identity management, from federated user provisioning and detailed role management activities, to basic user provisioning. NPS product and service offerings all correspond to this multi-layer model of identity management, from fundamental user provisioning and administrative capabilities to fine-grained application role management. The NPS end-to-end identity management strategy consists of the following elements: USER PROVISIONING o Automated Account Management Activities o User Lifecycle Management o Federated User Provisioning o Real-time Administration of User Privileges and Attributes

o User Event Logging o Password Management o Reporting ROLE MANAGEMENT o Discovery, Definition and Cleanup of Existing Roles through Automated Role Mining o Real-time Enforcement of User Roles o Enterprise-wide management of formal and informal business-level roles o Linkage between business roles and IT roles o Lifecycle Management of Roles: role owner, role changes, role review, role assignment and role retirement o Creating a consistent development process for new roles and tying those roles into an automated role management solution ACCESS MANAGEMENT o Single Sign On for Web-based and Web Services-Enabled o Token Exchange between Federated and Enterprise o Single Sign On for Federated /Cross-Domain SSO o Defined user access controls based on minimum required necessary to perform job functions NPS End-to-End Identity Management Offerings Web-Based (Browser) Internal Partner Web-Services Enabled

As in any layered approach to identity management, solutions cannot be limited to internally-run corporate resources. The process of extending your enterprise s user provisioning and user authentication capabilities beyond your corporate domain is the fundamental driver behind federation. NPS supports a complete federation model through its partnership with the Ping Identity product suite. PRODUCT OFFERINGS PingFederate 4 PingFederate is the industry-leading federated identity server for enabling single sign-on to online services for employees, customers and business partners. The only standalone federated identity server, PingFederate integrates and coexists with existing Identity Management deployments. As a result, enterprise-wide identity federation is achievable without extensive upgrades to Identity Management systems. Advanced Features Multi-Protocol Configuration Console- By providing a single use case-driven configuration console to support all versions of SAML as well as WS-Federation, PingFederate 4 simplifies configuring environments with multiple protocol connections. Hardware Security Module Support- PingFederate may be integrated with an optional Hardware Security Module for PKI operations to enable compliance with FIPS 140-2 requirements. Off-the-Shelf Integration Kits- To reduce the cost of integration of single sign-on with your applications and identity management systems, only PingFederate provides an entire suite of pre-built integration kits.

Enterprise Deployment Architecture- Only PingFederate enables you to federate applications residing in multiple domains and manage all partner connections from a single server. Through PingFederate, identity federation is a centralized service available to your entire organization. Role-Based Administration- Organizations often divide administrative activities across multiple individuals. PingFederate supports role-based access with differing responsibilities: User Admin, Admin, Auditor, and Crypto Admin. Advanced Federation Functionality- As the most advanced federated identity server available, PingFederate provides a number of features not found in many competitive offerings such as support for multiple Identity Providers, Identity Mapping, User Attribute Management (including X.509 Attribute Sharing Profile) and more. Risk-Free Trial Evaluation- Download PingFederate today and use it absolutely cost- and risk-free for the first 100,000 transactions or 90 days, whichever comes first. PingTrust 2 PingTrust is a Security Token Server that extends Identity Management Systems to Web services. With PingTrust, digital identities are associated with Web service requests to provide enhanced services while simultaneously ensuring appropriate information access and regulatory accountability. PingTrust manages validation and exchange of digital identities between browser-based and browser-less applications and the Web services to which they connect. Token Generation: SAML 1.1, SAML 2.0, Custom Tokens via SDK Token Validation: SAML 1.1, SAML 2.0, Kerberos v5, X.509 Username Tokens, SSO Tokens, Custom Tokens via SDK Flexible Deployment Options: Web Service Clients, Web Service Providers, Web Clients,.NET Clients, IWA Environments, Internal and Cross-Organization, Gateway Independent WS Security Interceptors: PingTrust includes interceptors that handle WS Security processing for Java-based Web Service Clients and Web Service Providers. Interceptors simplify configuration and deployment by effectively eliminating the need for customers to develop their own WS Security processing code. Adv ance d Feat ures

Java and.net Integration Libraries: SDKs enable easy integration of PingTrust functionality into both Java and.net applications (even integrating.net clients with Java services). User Attribute Sharing: Attribute Retrieval, Subject, role & attribute mapping High Performance and Availability: Multiple clustered servers managed by a single console enable high availability and near-linear scalability. Authentication/Identification: Requestors authenticate to PingTrust with a Username token (with password) in a WSS header or IWA via Kerberos. Requestors can be identified (without being authenticated) with a User ID token (without password) in a WSS header, and PingTrust enforces the policy. Intuitive Administration: A Web-based configuration console provides requestor management, credential generation and management, X.509 Certificate management and a policy-based metaphor to configure large numbers of requestors PingLogin PingLogin is a next-generation user authentication and single sign-on framework for online services and Web applications. With a focus on flexibility and extensibility, PingLogin provides a foundation for organizations to re-factor their approach to consumer authentication by centralizing authentication and eliminating vendor lock-in while reducing integration and ongoing maintenance costs. Advanced Features Open and Standards-Based: Wherever possible PingLogin supports open standards instead of proprietary protocols. Additionally, certain product modules are available through shared source and open source licenses. Extensible and Flexible A flexible set of APIs gives customers a robust framework for integrating PingLogin into existing Web applications and environments. As business and security requirements change, organizations should be free to add or modify functionality and not be bound to the release cycles of the product. High Performance: Consumer applications authenticate millions of users daily. Consequently, lightweight mechanisms to support authentication, session management and single-sign on are critical to meet consumers expectations for response time and performance. Focus on Authentication: As a best-of-breed solution for consumer authentication, PingLogin retains a separation between authentication and application authorization. Web Services Integration: While LDAP binding is supported, the PingLogin architecture assumes that Web services will be one of the primary mechanisms used by customers to

integrate with external authentication providers and identity stores. Therefore, an extensive API set is provided for accessing identity stores and performing user attribute retrieval. Simplicity: Throughout the product, there is always a simple implementation model for basic use cases that can be built upon as necessary to address differing (and sometimes opposing) business and technical requirements. Risk-Free Trial Evaluation: Download PingLogin today and use it absolutely cost- and riskfree for the first 100,000 transactions or 90 days, whichever comes first. ABOUT PING IDENTITY Ping Identity was founded in 2002 by industry veterans committed to simplifying the way in which digital identities are used and managed. The company has emerged as a market leader in the Identity Management industry through its unique dedication to delivering technologies and services that enable organizations to improve security, expand collaboration with trading partners and reduce the burden of regulatory compliance. The Ping Identity product family enables a full array of authentication services, including federated single sign-on, identity verification, and access control for a broad variety of both internal and external web applications and web services. The identity federation technology provided by the Ping Identity product suite is designed to improve customer security, enable easier collaboration with trading partners, and reduce the burden of regulatory compliance. Because of the highly disparate security requirements of the various components that make up distributed application architectures, a new approach is required for managing user identity verification, authentication and access control. Ping Identity's technologies and services deliver results that exceed the expectations of some of the most admired companies in the world, including American Express, Boeing, Cisco, New York Life and Pulte Homes.. NetworkingPS is a mid-sized Information Technology professional services firm based in Piscataway, NJ, specializing in a wide variety of managed security services offerings. Leveraging their highly-skilled staff of professional consultants, NPS has earned a reputation for their proficiency in planning, designing, assessing, implementing and supporting systems, applications, networks and operations activities for their nationwide, crossindustry client base. Industry research shows that clients today want an open computing environment in conjunction with an open marketplace with alternate channels of distribution. In addition, organizations wish to integrate new technology into their existing systems, as well as have both their computing resources and user base managed and supported in a cost-effective manner that will support their business priorities. NPS is responding to these customer requirements by focusing its resources on helping customers plan, build, implement and maintain the business information systems, networks, and operations they need to compete in today s changing business environment. Building on its core competencies in software, systems, networks, and services, NetworkingPS provides a complete range of information processing solutions. For more information about the Ping Identity Product Suite or other NPS offerings, please contact NPS at: http://www.networkingps.com or call us at our toll-free number, (888) 717-4010.