id center definitely with biometrics strong authentication



Similar documents
IBM Security Access Manager for Enterprise Single Sign-On

IBM Tivoli Access Manager for Enterprise Single Sign-On

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Position Paper - Authentication. improve. the user experience. with a trusted authentication

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

The Benefits of an Industry Standard Platform for Enterprise Sign-On

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Enhancing Password Management by Adding Security, Flexibility, and Agility IBM Redbooks Solution Guide

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

DigitalPersona Pro Enterprise

secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Centralized Self-service Password Reset: From the Web and Windows Desktop

CoSign by ARX for PIV Cards

WHITE PAPER ENTERPRISE SINGLE SIGN ON

Netop Remote Control Security Server

The Convergence of IT Security and Physical Access Control

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Chapter 1, OneSign Authentication Methods Chapter 2, Two-Factor Authentication in OneSign Chapter 3, Emergency Access Privileges

RSA Authentication Manager 7.1 Basic Exercises

NCheck Finger Attendance

The Convergence of IT Security and Physical Access Control

Revit products will use multiple cores for many tasks, using up to 16 cores for nearphotorealistic

ID Director for Windows

Autodesk Revit 2016 Product Line System Requirements and Recommendations

Bode Collection Point Electronic DNA Sample Information Program Technical Specifications

General Hardware Requirements Workstation Requirements Application / Database Server Requirements Storage Requirements...

Leveraging SAML for Federated Single Sign-on:

Passlogix Sign-On Platform

NCheck Finger Attendance v1.0. User guide

Global Headquarters: 5 Speen Street Framingham, MA USA P F

etoken Single Sign-On 3.0

Flexible and secure. acceo tender retail. payment solution. tender-retail.acceo.com

NetIQ Advanced Authentication Framework

Kaseya IT Automation Framework

Contextual Authentication: A Multi-factor Approach

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1

NETWRIX IDENTITY MANAGEMENT SUITE

STRONGER AUTHENTICATION for CA SiteMinder

NTP Software File Auditor for Windows Edition

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

NetWrix USB Blocker. Version 3.6 Administrator Guide

etoken TMS (Token Management System) Frequently Asked Questions

AD Self-Service Suite for Active Directory

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

Identity and Access Management

Cloud Authentication. Getting Started Guide. Version

Novell ZENworks Asset Management 7.5

2 factor + 2. Authentication. way

NetWrix USB Blocker Version 3.6 Quick Start Guide

RSA SecurID Two-factor Authentication

RSA Authentication Manager 8.1 Help Desk Administrator s Guide

How can Identity and Access Management help me to improve compliance and drive business performance?

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

MBAM Self-Help Portals

Provide access control with innovative solutions from IBM.

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Extending Identity and Access Management

RSA Authentication Agent 7.1 for Microsoft Windows Installation and Administration Guide

PageScope Enterprise Suite: interlocking solutions to manage your printer and MFP fleet more productively.

SECUREAUTH IDP AND OFFICE 365

Enterprise Self Service Quick start Guide

SAP Business Objects Security

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

RSA AUTHENTICATION AGENTS FOR MICROSOFT WINDOWS

Administrator Guide. DigitalPersona Pro. for Active Directory. Version 4.0

DigitalPersona Pro Enterprise

Understanding and Configuring Password Manager for Maximum Benefits

Server-based Password Synchronization: Managing Multiple Passwords

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Rights Management Services

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date Page 1 Public

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

XyLoc Windows7 Client Release Notes

DPH TOKEN SELF SERVICE SITE INSTRUCTIONS:

Propalms TSE Deployment Guide

Deriving a Trusted Mobile Identity from an Existing Credential

Professional and Enterprise Edition. Hardware Requirements

INSTALLATION AND SET UP GUIDE

PROTECT YOUR WORLD. Identity Management Solutions and Services

Transcription:

id center definitely with biometrics strong authentication

ID Center Functions Convenient, secure, efficient - ID Center recognizes a person s identity within sec-onds via their fingerprint, palm vein or iris pattern. ID Center provides the reliable basis for determining who gets access to any number of software applications and data. ID Center also supports strong authentication by means of smart cards or one-time passwords (OTP). ID Center significantly reduces the volume of help desk calls and ensures compliance with governmental regulations (HIPAA, FDA, SOX, etc.) and data protection law. Unsafe or complex passwords are now a thing of the past! Identity Provider ID Center is a centralized authentication service (Identity Provider) which transforms the natural identity of a user into his/her actual user account within seconds and unambiguously. For this purpose, ID Center uses biometric characteristics or ID tokens (smart cards) or a combination thereof. Authentication by means of one-time passwords is also available. ID Center runs on a high-availability server. Many ID Center customers also use server virtualization. Offline support enables users to continue to use their biometric or smart card based logon while they are disconnected from the ID Center server. Biometric identification with fingerprint, palm vein or iris pattern Users are authenticated by their biometric characteristics only, without any additional information (1:n match). Fingerprint, palm vein or iris pattern recognition is available. For biometric recognition, the Fast Identify component guarantees response times between one and two seconds, even with several thousand users. Palm vein and iris pattern recognition are supported for fast identification as well. Biometric verification with smart cards or RFID tokens Biometric verification (1:1 match) requires the user to provide additional data (such as a user name, employee number or a smart card). ID Center can use low-cost smart cards in combination with biometrics and thus provide a secure 2 factor authentication. The smart cards can be used with a PIN as well, and RFID tokens can be used instead of smart cards. Stong Authentication with One-Time Password (OTP) Mobile devices like tablets or smart phones usually do not provide biometric or smart card based authentication. For this case, ID Center offers the one-time password method. ID Center supports HW token-based OTP (RFC4226 and RFC6238) and OTP delivery via SMS or email. Individual security guidelines You can configure individual security policies for any supported software application. You determine which combination of biometrics, smart card, password and OTP is required to access the application. You can even define the software s response when the smart card is inserted or removed. The ID Center security policies define the enterprise-wide user authentication criteria for each application. The administrator can also define alternative login procedures for individual users. 2 ID Center

Multi-tenant capability for flexible operation Since ID Center provides the option to structure the biometrics database in a highly granular manner for separate tenants, you can adapt it perfectly to your corporate structure. Short response times are thus guaranteed, and data centers and outsourcing partners can offer their customers biometric authentication services (SaaS) on the basis of ID Center. Combining biometric data management for building access and network login As an ID Center extension, you can administer biometric building access data in ID Center and synchronize it over the network with the door scanners to keep the biometric data for building access and network login uniform. Integrating web applications and domain specific applications via ID Center Internet Extensions and Easy Login ID Center s authentication mechanisms can also be used for browser-based, domain specific and third party software-applications. This enables seamless biometric authentication for network access, intranet/internet and domain specific applications without programming effort. Easy integration with server-side web services and client-side SDK ID Center uses web service technology to provide its authentication service for integration purposes. That way, any software application within the enterprise can use ID Center as an authentication service and provide seamless strong authentication. On the client side, façade technology simplifies the integration process. Easy-to-use administrator tools, user-level activity statistics and fine-grained auditing features ID Center offers an easy-to-use administrative interface for adding and managing biometric reference data ( enrollment ), registering smart cards and HW tokens for the OTP (RFC6030 compliant). Administrative functions for migrating data from other databases (via an XML import interface or transfer from Microsoft Active Directory via LDAP) and for defining the security guidelines for the applications can be easily executed from a central console. Administrators can also run user-level statistics to identify inactive user accounts. Other options include compiling audit data for generating customized input for reports. ID Center 3

ID Center Solutions Secure ID Center Self-Service The secure ID Center Self-Service solution enables employees or even customers to perform simple administrative procedures easily, cost-effectively and without having to call the service desk. The following procedures can be performed via the secure ID Center Self-Service: Resetting or re-issuing forgotten passwords, resetting or unlocking smart cards and PINs, issuing temporary replacement IDs and access badges Employees and other persons can be identified easily and reliably; they can reset their password or PINs and even issue badges on their own without requiring additional personnel and having to make expensive help desk calls. The secure ID Center Self-Service application is implemented in a kiosk that is available to employees and/or customers at any time. Customer Identification In combination with the Customer Identification web application, ID Center helps you to streamline your workflows involving customers. Whenever you have to verify a customer s identity and integrate his data into one of your business applications, ID Center can perform this easily and reliably. Based on its palm vein recognition plus one additional piece of information such as the date of birth, the Customer Identification confirms the customer s identity and also supplies the data for your business applications. The solution can be employed for patient identification in hospitals as well as for identifying bank customers. Biometric Ticketing With the Ticketing Solution add-on, ID Center is able to easily assign simple tickets e.g. paperbased tickets to a person, for example to prevent season tickets from being passed on to other people. The ticket holder remains completely anonymous during this procedure. Group tickets are also supported. Whenever a reliable relationship between a ticket and a person needed, ID Center with the Ticketing add-on is the ideal solution. SAP Logon When combined with the ID Center SAP Logon, ID Center introduces strong authentication to SAP ERP systems. Windows Login The ID Center Domain Login application for Windows systems provides the complete set of authentication methods of ID Center for the Windows domain login. Besides the convenient biometrics-only method, strong 2-factor authentication is supported. The right solution for the enterprise with extraordinarily stringent compliance requirements. 4 ID Center

ID Center Applications ID Center is used by millions of people ``In pharmaceuticals manufacturing where electronic signatures are required ``In highly sensitive utility companies such as power plants and water works ``In combination with hospital applications (CIS, RIS and PACS) to protect sensitive patient data ``In banking environments for teller and administration and office applications ``Or simply in corporate IT applications such as Windows domain login, web applications and office applications. ID Center 5

Technical Requirements Hardware ID Center Server ``Intel-based PC, CPU Pentium class (64 bit) 3 GHz ``Memory requirements: RAM: minimum 2 GB Harddisk: minimum 1 GB ID Center Client ``Intel-based PC, CPU Pentium class (32/64 bit) 2 GHz ``Memory requirements: RAM: according to OS requrirements ``Harddisk: minimum 600 MB (exklusive.net Framework 4) elux Thin Client ``eluxrp: Reference system FSC Futro S500 Biometric devices Fingerprint Supported under Windows 7 32/64bit, Windows 8 32/64, Windows Server 2008 32/64bit, Windows Server 2012 64bit ``ID Mouse pro3 ``Dermalog ZF-1 ``UPEK Eikon Touch 700, 300 Supported under Windows 7 32/64bit ``ST Microelectronics Touchchip TCRS1 ``UPEK Eikon Reader TCRE3C ``UPEK Eikon II ``Cherrry FingerTip ID Board (G83-14400, G83-14500) ``Devices with Authentec Sensors AES2550, AES2810, AES2660 ``Fujitsu Q550 with AES 2610 ``Cherry FingerTip ID Board (G83-14600) ``Crossmatch - Verifier 300, Verifier 300 LC2 ``Validity - VFS451 Supported under Windows 7 32bit ``Testech Bio-I Netaccess und Nexess Others on request Palm Vein ``Fujitsu PalmSecure für Windows 7 32/64bit, Windows 8 32/64bit und Windows Server 2008 32/64bit, Windows Server 2012 64bit Smart Cards ``Gemplus GemClub Memo (simple and affordable Memory Card) ``ID Center generally supports smart cards that have a PKCS #11-compatible interface Iris ``ICAM 4000R and icam7000 from IrisID supported under Windows 7 und Windows 8 32/64bit OTP Token ``RFC 4226 (HOTP) compliant ``RFC 6238 (TOTP) compliant ``Enrollment RFC 6030 compliant User Interface English German Others on request Server Reference platforms ID Center Server / Clustering ``Windows Server 2008 R2 SP1, Standard or Enterprise, 64bit ``Windows Server 2012, Standard 64bit Client Reference platforms ID Center Client ``Windows 7, Professional and Enterprise, 32/64 bit ``Windows 8 Pro and Enterprise 32/64bit ``Windows Server 2008 R2, 64bit ``Windows Server 2012, Standard 64bit Terminal Server Windows Terminal Clients: ``Citrix XenApp 6.5 under Windows Server 2008 R2 64bit ``Windows Terminal Services under Windows Server 2008 R2 64bit ``Windows Terminal Services under Wondows Server 2012, Standard 64bit ``elux Terminal Clients: ``Citrix XenApp 6.5 under Windows Server 2008 R2 64bit Supported Browser for ID Center Windows 7,: ``Internet Explorer 8.0 and 9.0 and 10 Windows 8: ``Internet Explorer 10 Documentation ``Release Notes (Html): English, German ``OS Settings (Html): English, German ``Installation Guide (Html): Englisch, German ``Administration Guide (Manual): English, German ``Programmer s Guide (Manual): English ``ID Center Knowledgebase (Html): English ``User Guide Virtual maschine support VMWare ESX Server 5.0, hosting: ``Windows Server 2012, Standard 64bit ID Center DB Server ``Windows Server 2012, Standard 64bit ``Windows Server 2008 Enterprise 64bit DB access to ``MS SQL Server 2008, 64 bit ``MS SQL Server 2012 64 bit ``MS SQL Server Express 2008, 32/64 bit ``MS SQL Server Express 2012 64 bit 6 ID Center

The promising alternative to passwords Why use a product like ID Center? Currently, in almost every case, just one authentication method is used username + password. Almost every application manages its credentials (i.e. passwords) on its own. The outcome is a constantly growing password problem. An Identity Provider like ID Center offers the following options in order to successfully cope with this problem: ``The authentication method can be adapted to the application needs ``Different options adaptable to the individual user needs are provided ``The user can select the method suitable to the user s momentary context ``The user does not need to use or know his/her password even if the application still works with passwords. ID Center provides after a positive authentication the credentials for the application ``The administration of credentials turns out to be easier due to the support of ID Center during the password change process ``Very secure passwords can be chosen as the user no longer needs to know them ``A gradual change to password less systems is supported without causing a huge initial investment ``ID Center adapts to the changing requirements in your enterprise. You only pay for what you use. ID Center 7

About Worldline Worldline, an Atos subsidiary, is the European leader and a global player in the payments and transactional services industry. Worldline delivers new generation services, enabling its customers to offer smooth and innovative solutions to the end consumer. Key actor for B2B2C industries, with 40 years of experience, Worldline is ideally positioned to support and contribute to the success of all businesses and administrative services in a perpetually evolving market. Worldline offers a unique and flexible business model built around a global and growing portfolio, thus enabling end-to-end support. Worldline activities are organized around three axes: Merchant Services & Terminals, Mobility & e-transactional Services, Financial Processing & Software Licensing. In 2012, Worldline s activities within the Atos Group generated (pro forma) revenues of 1.1 billion euros. The company employs more than 7,100 people worldwide. For more information please contact: fpsolutions.at@atos.net worldline.com Worldline is a registered trademark of Atos Worldline SAS. June 2013 2013 Atos Worldline.