SSO Case Study: The USPS Gives SSO Its Stamp of Approval. May 10, 2005. Wayne Grimes, Manager, Customer Care Operations, USPS



Similar documents
OracleAS Identity Management Solving Real World Problems

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Authentication: Password Madness

Guide to Complete EIA SSO (Single Sign-On) Registration. 1. Open your Internet Browser, enter this address, and press Enter

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Passlogix Sign-On Platform

HOBCOM and HOBLink J-Term

Global Headquarters: 5 Speen Street Framingham, MA USA P F

White paper December Addressing single sign-on inside, outside, and between organizations

Integrating Hitachi ID Suite with WebSSO Systems

Enterprise Single Sign-On City Hospital Cures Password Pain. Stephen Furstenau Operations and Support Director Imprivata, Inc.

SAML SSO Configuration

1. How to Register Forgot Password Login to MailTrack Webmail Accessing MailTrack message Centre... 6

Delegated Administration Quick Start

ADSelfService Plus Client Software Installation Guide

Extending Identity and Access Management

Centralized Oracle Database Authentication and Authorization in a Directory

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

Identity Access Management IAM 101. Mike Conlon Director of Data Infrastructure

Single Sign-on (SSO) technologies for the Domino Web Server

Integrated Approach to User Account Management

Single Sign-on Frequently Asked Questions

NCSU SSO. Case Study

<Insert Picture Here> Oracle Identity And Access Management

RSA Authentication Manager 8.1 Help Desk Administrator s Guide

Deploying Single-sign On with RDC 46 OnSite: An examination of methods to allow Single-Sign-On for existing RDC 46 OnSite environments

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

SAML-Based SSO Solution

Single sign on may be the solution

Microsoft Online Services from Bell. Welcome Kit

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Configuring user provisioning for Amazon Web Services (Amazon Specific)

Configuring User Identification via Active Directory

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Server-based Password Synchronization: Managing Multiple Passwords

Group Policy Objects: What are They and How Can They Help Your Firm?

seamless simplicity to simple identity management in education.

Identity and Access Management Point of View

IceWarp Server - SSO (Single Sign-On)

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

G Cloud 6 CDG Service Definition for Forgerock Software Services

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

IBM Security & Privacy Services

Service Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1

Getting Started with AD/LDAP SSO

The Benefits of an Industry Standard Platform for Enterprise Sign-On

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

Okta/Dropbox Active Directory Integration Guide

Network Identity and the Liberty Alliance Project

Creating a generic user-password application profile

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

Extend and Enhance AD FS

PROTECT YOUR WORLD. Identity Management Solutions and Services

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

Google Apps and Open Directory. Randy Saeks

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

White Paper. What is an Identity Provider, and Why Should My Organization Become One?

managing SSO with shared credentials

How to pull content from the PMP into Core Publisher

Guide to Evaluating Multi-Factor Authentication Solutions

5 Day Imprivata Certification Course Agenda

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

API-Security Gateway Dirk Krafzig

can I customize my identity management deployment without extensive coding and services?

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Canadian Access Federation: Trust Assertion Document (TAD)

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE

SchoolBooking SSO Integration Guide

Can I customize my identity management deployment without extensive coding and services?

Identity Management and Single Sign-On

Integration with Active Directory. Jeremy Allison Samba Team

DIGIPASS Authentication for GajShield GS Series

The Convergence of IT Security and Physical Access Control

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

101 Things to Know About Single Sign On

Mac OS X and Directory Services Integration

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Seven Ways to Create an Unbeatable Enterprise Mobility Strategy

Crawl Proxy Installation and Configuration Guide

Building Secure Applications. James Tedrick

SECUREAUTH IDP AND OFFICE 365

Web Applications Access Control Single Sign On

The Who, What, When, Where and Why of IAM Bob Bentley

Oracle Enterprise Single Sign-on Logon Manager. Installation and Setup Guide Release E

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

Host Access Management and Security Server

Business-Driven, Compliant Identity Management

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Outsourcing Your IT Services Not Your Business. Mike A. Williams, Vice President Global Shared Services Global Commercial Services

Transcription:

SSO Case Study: The USPS Gives SSO Its Stamp of Approval Wayne Grimes, Manager, Customer Care Operations, USPS May 10, 2005

Today s topics An overview of the USPS USPS SSO efforts Lessons we learned along the way Technical Organizational Implementation

Secrets to a successful SSO project? First rule Get someone else to do it! Things to remember if you fail at rule #1 There is no silver bullet for a complex enterprise You ll need more than one tool in your SSO tool chest Pay attention to organizational issues They can kill the project Tune your solutions and processes to fit your organizational culture

USPS An overview Business Annual revenue $69 billion Career employees 700,000 Mail volume 206 billion pieces per year Delivery points 142 million per day growing by 1.8 million per year Retail outlets Serve 7 million customers a day via 37,000 outlets Vehicle fleet over 208,000

USPS retail and administrative systems People 150,000 admin and 70,000 retail Devices 140,000 admin wkst and 43,000 retail terminals Mainframe 96,000 user accounts Infrastructure based on Active Directory (AD) and Windows Business apps 600 plus Client software Web, Win32, terminal emulators, client side Java, etc. Server platforms Windows, Solaris, mainframe, etc. Applications COTS, Oracle, Websphere, ColdFusion, etc. Authorization management eaccess (Home grown)

USPS internal environment (cont.) eaccess Requesting access to our systems A home grown Identity Management System to manage user system access requests and approval workflow User identity Hundreds of applications that maintain their own specific User IDs with no common user naming standard No easy way to align all of the accounts that belong to a given individual

SSO business drivers Administration for 150,000 users averaging 10 IDs and passwords Over 100,000 password reset calls per year No way to disable all of a users accounts User were unhappy with the situation Problem was getting worse, not better Security issues with passwords on paper

Our original charter and limits Original Charter Single Sign On (SSO) Build transparent logons based on the Windows credentials Improve the end user experience make their lives better Reduce administrative and help desk costs Focus on authentication not authorization Maintain eaccess to request and grant system access privileges No internal portal No single point of failure Applications were building e-mail enabled interfaces to their applications that required direct application access

Early research identified six application methods Solutions we use Logon ID and password management (Application changes not needed) Native integration with MS protocols LDAP based Single Log On (SLO) (User challenged for their AD ID and password ) AD integration via MIT Kerberos Solutions we don t use CA/PKI based integration Key management, cost and workstation integration problems Application integration middleware No internal portal, no desire to delegate administration, and application integration problems

Bad news we learned early on We had a very complicated legacy application environment Industry provides very limited interoperability and standards Product vendors don t help much Strong bias for proprietary APIs and hooks Staff not trained in the standards based features of their products Weak IT consulting support for standards based integration solutions Staff is trained in one or two proprietary solutions Joint Marketing Agreements with product vendors We as customers haven t demanded interoperability

Our SSO charter today Evolved charter SSO & Single Log On (SLO) All application user authentication, both transparent and interactive, must be tied to the users Active Directory ID and password Improve the end user experience make their lives better Improve security by improving our ability to disable a user access to our systems Reduce administrative and help desk costs Its ok to challenge the user for their AD ID and password (SLO) Good enough is good enough

USPS progress so far Over 75,000 users use v-go to manage their IDs and passwords into hundreds and hundreds of applications We ve converted over 50 applications to full AD integration via SSO or SLO Developed templates that can be used for developing new SSO apps Virtually all of our application access requests are managed via eaccess We ve automated the process of account creation and management in AD and our high profile applications We ve pushed many of our password reset calls off of the help desk to an automated password reset system

Technology problems with SSO Most non-microsoft applications can t use native MS credentials SPNEGO (Simple and Protected GSS-API Negotiation) tools can do the job The valves are there but the plumbing is missing Many applications advertise a Kerberos interface Few tools to read credentials from the desktop and pass them through the browser to the website and application Moving credentials to the web site isn t enough Credentials must be passed to the application server

User and application owner objections End user resistance Many users don t think Single Sign On is secure They also don t trust programs that remember and submit their IDs and passwords But I m special Many application sponsors don t understand or trust SSO Some applications may be to sensitive for SSO SLO solutions are often a good compromise for applications with a high level of business or personal sensitivity

Users don t do what we think they do Users often loan application IDs and passwords as a way of sharing or delegating work High profile users are often involved in this behavior SSO or SLO means they can t share just one password anymore Applications may need to be modified to allow delegated authority from within the application

People who are paid to stay on there feet Our design was on the users Windows/AD logon The design works for people who stay in a chair The logon/logoff process is to slow for people who work on their feet (KIOSK) This problem is very real in the medical community The Health Insurance Portability and Accountability Act (HIPPA) helped to forced the issue Look at a vendors HIPPA compliant tools for solutions

Matching directory accounts to application accounts A user s ID often varies from system to system These IDs must be matched to the users directory identity as the application is converted to SSO Applications must have a conversion routine that asks users to supply both their old application ID and password and their directory based ID and password Once validated, the application can convert its old ID or maintain a crosswalk table

Building an SSO project team SSO infrastructure engineering team Builds shared SSO components Develops and publishes SSO integration templates for specific application environments Provides technical support to application development teams Line of business sponsor Funds the conversion work Commissions the application development team to do the conversion work Application development team(s) Take the lead role in building a solution for their application(s)

Building an SSO project team (cont.) Senior management Promotes the goal of a SSO enabled enterprise Reviews and rewards progress Internal marketing team Promotes the idea of SSO to line of business managers and development organizations Help line of business managers promote and explain SSO to the end user community

Other implementation issues Don t promise until you can deliver Develop the SSO infrastructure before you approach line of business managers It may take longer than you think Pick the right systems to convert first Driven by the technology solutions you have ready High profile systems with lots of users build buzz A few big successes are better than a lot of little successes or failures Keep your users informed and trained

Audience Response Questions