Extending Identity and Access Management



Similar documents
Choosing an SSO Solution Ten Smart Questions

Enterprise Single Sign-On City Hospital Cures Password Pain. Stephen Furstenau Operations and Support Director Imprivata, Inc.

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Citrix Password Manager 4.5 Partner and Sales FAQ

Citrix Password Manager 4.1

Global Headquarters: 5 Speen Street Framingham, MA USA P F

IBM Tivoli Access Manager for Enterprise Single Sign-On

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Authentication: Password Madness

Passlogix Sign-On Platform

(A) User Convenience. Password Express Benefits. Increase user convenience and productivity

IBM Security Access Manager for Enterprise Single Sign-On

Securing the Cloud through Comprehensive Identity Management Solution

White paper December Addressing single sign-on inside, outside, and between organizations

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Top 5 Federated Single Sign-On Scenarios

PROTECT YOUR WORLD. Identity Management Solutions and Services

An Oracle White Paper December Implementing Enterprise Single Sign-On in an Identity Management System

Identity Management and Single Sign-On

Gabriel Magariño. Software Engineer. Overview Revisited

<Insert Picture Here> Oracle Identity And Access Management

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Provide access control with innovative solutions from IBM.

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

An Oracle White Paper Sep Buyer s Guide for Enterprise Single Sign On

An Oracle White Paper December Integrating Oracle Enterprise Single Sign-On Suite Plus with Strong Authentication

Enhancing Password Management by Adding Security, Flexibility, and Agility IBM Redbooks Solution Guide

identity management in Linux and UNIX environments

How To Get A Single Sign On (Sso)

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Security management solutions White paper. Extend business reach with a robust security infrastructure.

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Quest One Identity Solution. Simplifying Identity and Access Management

Endpoint Virtualization for Healthcare Providers

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

The Return on Investment (ROI) for Forefront Identity Manager

managing SSO with shared credentials

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Citrix Access Gateway

How the Quest One Identity Solution Products Enhance Each Other

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Connecting Users with Identity as a Service

Deriving a Trusted Mobile Identity from an Existing Credential

Centralized Self-service Password Reset: From the Web and Windows Desktop

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Server-based Password Synchronization: Managing Multiple Passwords

PortWise Access Management Suite

Identity Relationship and Access Management for the Extended Enterprise

NETWRIX IDENTITY MANAGEMENT SUITE

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

What s New in Juniper s SSL VPN Version 6.0

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

What s New in BridgeTrak 8.0?

- Identity & Access Management

PortWise Access Management Suite

FileCloud Security FAQ

Azure Active Directory

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

5 Day Imprivata Certification Course Agenda

expanding web single sign-on to cloud and mobile environments agility made possible

Identity and Access Management

Enterprise Single Sign-on (ESSO)

NCSU SSO. Case Study

Citrix MetaFrame Password Manager 2.5

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

Identity Governance Evolution

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Microsoft Enterprise Mobility Suite

When millions need access: Identity management in an increasingly connected world

Integrated Identity and Access Management Architectural Patterns

CA SiteMinder SSO Agents for ERP Systems

NetWrix Logon Reporter V 2.0

Windows Least Privilege Management and Beyond

Automated User Provisioning

Bridging the Great Divide. The Convergence of Physical and Logical Security

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

nexus Hybrid Access Gateway

Transcription:

Extending Identity and Access Management Michael Quirin Sales Engineer Citrix Systems 1 2006 Citrix Systems, Inc. All rights reserved.

Company Overview Leader in Access Infrastructure NASDAQ 100 and S&P 500 company (CTXS) $909 million in 2005 revenue (25% growth) ~50% revenue from outside of No. America 3,000+ employees in 35 countries 6,200 partners in over 100 countries 180,000 customers 94% customer loyalty 75% of all Internet users Microsoft Global ISV of the Year 2003 and 2005 2 2006 Citrix Systems, Inc. All rights reserved.

Identity Management - Defined Solutions used to identify users in a system (employees, customers, contractors, etc.) and control user access to resources. IDC Identity & Access Management is becoming the glue that ties together all the internal and external elements in an application ecosystem. Brian Burke, IDC 3 2006 Citrix Systems, Inc. All rights reserved.

Hype Cycle for Identity and Access Management Technologies, 2006 4 2006 Citrix Systems, Inc. All rights reserved.

Citrix View on IAM User Identification Who is the user? Do we trust them? Provisioning What accounts should the user have? Authentication Is the user who they say they are? Access Control What permissions should the user have? Access Method How is the user gaining access? Auditing What has this user previously accessed? 5 2006 Citrix Systems, Inc. All rights reserved.

Managing Identities and the Front Door Single Sign-On to Windows, Web and host-based applications Access to Any Application One Primary Logon Windows Enterprise SSO Solution Web Distinct credentials for each backend application/resource Host 6 2006 Citrix Systems, Inc. All rights reserved.

Providing Self-Service Each time an end-user calls the help desk, it costs the organization $25-$50. Forrester 30 percent of all calls to the help desk are for password resets Gartner Group 7 2006 Citrix Systems, Inc. All rights reserved.

User Access Speed and Productivity Hot Desktop Speed and Security for Shared Workstations 90% faster than standard desktop logons SmoothRoaming optimized Built in workstation security Eliminates workstation lockouts User switches audited Integrates with Biometric, Smartcard and Proximity aauthentication solutions 8 2006 Citrix Systems, Inc. All rights reserved.

Password Management Survey Who has more than 5 user accounts to manage for application access? Who uses the same password (or 2) for all their accounts? Who uses sticky notes or a spreadsheet to manage accounts? Who changes their password by incrementing a number? Who never changes their password on applications? 9 2006 Citrix Systems, Inc. All rights reserved.

Changing the Locks Regulatory Compliance Driven SOX, GLBA, HIPAA Automated Password Generation Complex Password Policies Password Expiry Management Timer controls Audit Trails Proof just in case 10 2006 Citrix Systems, Inc. All rights reserved.

Simplifying 2-Factor Authentication With a skeleton key, the front door must be stronger! Direct integration for network login and SSO application credentials Eliminates need for application integration with 2-factor authentication Where costs range from $500 to $4,000 for investigation, development, and testing per application* Mix and match form factors for the right access scenario * Reference: Forrester - Justifying E-SSO: Benefits Beyond The Help Desk 11 2006 Citrix Systems, Inc. All rights reserved.

Integration with User Provisioning Citrix Password Manager provides a standards-based (SPML v2) interface to user provisioning systems Available connectors: Courion AccountCourier and PasswordCourier HP Select Identity IBM Tivoli Identity Manager As user accounts are provisioned, credentials are automatically encrypted and stored in Password Manager User Provisioning System App #1 App #2 App #3 Active Directory (or LDAP) End User (Single sign-on) 12 2006 Citrix Systems, Inc. All rights reserved.

Citrix Password Manager for Authentication, Auditing, Provisioning Challenge Decrease support calls and lower helpdesk costs User Access Speed and Productivity Achieve regulatory compliance Automate employee life cycle Solution SSO decreases forgotten passwords Self-service password reset decreases support calls Increase speed to access applications Hot Desktop for shared workstations Automated password changes Password expiry protects applications Enforces termination procedures Logs all logon and password events Account Provisioning Integration One-click user de-provisioning 13 2006 Citrix Systems, Inc. All rights reserved.

Seamless SmartAccess example Office Kiosk Hotel In Transit In Transit Full Access, all applications and features Browser based email only No print or local save Full native email including sync No access to financial documents 14 2006 Citrix Systems, Inc. All rights reserved.

Action Control Advanced Endpoint Sensing Granular Access Rights Action Control Which User + User Scenario View Only Edit Print Save 15 2006 Citrix Systems, Inc. All rights reserved.

Citrix Access Gateway for Access Control and Presentation Challenge Decrease remote access support costs Protect customer data (e.g. Healthcare) Protect proprietary data (e.g. Patents) Decrease access vulnerabilities Solution Simple mgmt./administration Clientless access option Advanced Access Control auto-changes access/viewing privileges by user, location, device, and connection Action Rights Control auto-changes data manipulation privileges by user, location, device, and connection End-point scanning prevents unsafe network and information access 16 2006 Citrix Systems, Inc. All rights reserved.

Before you leave, let s recap IAM User Identification Who is the user? Do we trust them? Provisioning What accounts should the user have? Authentication Is the user who they say they are? Access Control What permissions should the user have? Access Method How is the user gaining access? Auditing What has this user previously accessed? 17 2006 Citrix Systems, Inc. All rights reserved.

Demo Presentation Server 4.0 Application Virtualization Smooth Roaming Web Interface 4.2 Simple Web Access Password Manager 4.1 Password Management Enterprise Single Sign On Advanced Access Control 4.2 Smart Access Central Landing Page for Application and File Resources 18 2006 Citrix Systems, Inc. All rights reserved.