Cloud SSO and Federated Identity Management Solutions and Services



Similar documents
PROTECT YOUR WORLD. Identity Management Solutions and Services

The Primer: Nuts and Bolts of Federated Identity Management

The Primer: Nuts and Bolts of Federated Identity Management

white paper 5 Steps to Secure Internet SSO Overview

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

HP Software as a Service. Federated SSO Guide

USING FEDERATED AUTHENTICATION WITH M-FILES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Connecting Users with Identity as a Service

The Top 5 Federated Single Sign-On Scenarios

Federated Identity in the Enterprise

Enable Your Applications for CAC and PIV Smart Cards

OPENIAM ACCESS MANAGER. Web Access Management made Easy

SAML 101. Executive Overview WHITE PAPER

expanding web single sign-on to cloud and mobile environments agility made possible

PingFederate. SSO Integration Overview

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Web Access Management. RSA ClearTrust. Enhancing control. Widening access. Driving e-business growth. SSO. Identity Management.

Flexible Identity Federation

CA Federation Manager

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ensuring the Security of Your Company s Data & Identities. a best practices guide

Interoperate in Cloud with Federation

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

The increasing popularity of mobile devices is rapidly changing how and where we

How to Implement Enterprise SAML SSO

Single Sign-On: Reviewing the Field

The Essential Security Checklist. for Enterprise Endpoint Backup

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Pick Your Identity Bridge

Authentication: Password Madness

The Florida Department of Education s Single Sign-On Solution. July - August 2012

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

WebLogic Server 7.0 Single Sign-On: An Overview

Customer Identity and Access Management (CIAM) Buyer s Guide

An Overview of Samsung KNOX Active Directory and Group Policy Features

Extend and Enhance AD FS

The Role of Federation in Identity Management

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

CA SiteMinder SSO Agents for ERP Systems

SAML-Based SSO Solution

Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance

Canadian Access Federation: Trust Assertion Document (TAD)

Cloud Security: Is It Safe To Go In Yet?

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT

SAML SSO Configuration

White paper December Addressing single sign-on inside, outside, and between organizations

The Unique Alternative to the Big Four. Identity and Access Management

Centrify Mobile Authentication Services for Samsung KNOX

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Cybersecurity and Secure Authentication with SAP Single Sign-On

IBM Tivoli Federated Identity Manager

A Symantec Connect Document. A Total Cost of Ownership Viewpoint

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Identity. Provide. ...to Office 365 & Beyond

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

SAML-Based SSO Solution

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Managing Access for External Users with ARMS

EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report

managing SSO with shared credentials

NetworkingPS Federated Identity Solution Solutions Overview

OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com

Secure the Web: OpenSSO

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

SAP Single Sign-On 2.0 Overview Presentation

SAML:The Cross-Domain SSO Use Case

Biometric Single Sign-on using SAML Architecture & Design Strategies

NCSU SSO. Case Study

Glinda Cummings World Wide Tivoli Security Product Manager

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

SAML 101 WHITE PAPER

1 The intersection of IAM and the cloud

How To Use Saml 2.0 Single Sign On With Qualysguard

SOA and SaaS - new challenges

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Google Identity Services for work

A HIGH-LEVEL GUIDE TO EFFECTIVE IDENTITY MANAGEMENT IN THE CLOUD

Transcription:

Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection

Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity Management (FIM) CSC Identity Management Offerings CSC Experience and Capabilities

Cloud SSO What is it? Based on industry federated identity standards Runs on PingFederate software Supports the predominant federated identity standards: Security Assertion Markup Language (SAML) WS-Federation Provides centralized cloud access control Meets enterprise key use case requirements for: Outbound SSO for users to access software as a service (SaaS) and business process outsourcing (BPO) providers, and to connect with trading partners Inbound SSO for SaaS providers, such as BPOs and managed services, to access the enterprise s resources Internal SSO for the enterprise and its acquisitions, affiliates, subsidiaries and joint ventures SSO to a third party, hosted hub for users to share information among industry organizations

Cloud SSO How It Works

Federated Identity Management (FIM) What Is It? A group of two or more trusted partners Bound by business and technical agreements Allows a user from one federation partner to seamlessly access information resources from another federation partner Transaction done in a secure and trustworthy manner Organizational participants in a federation vet and maintain information on the users they manage Each federation partner retains control over the business rules for granting access to the sensitive information it owns Bottom line: provides cross-domain single sign-on (SSO) among federated partners

Federation How It Works Partner to Partner Federation Identity Provider Partner A Service Provider Partner B Identity Store Assertion Federation Service Protected Applications Federation Service Access Management System The Internet Enable organizations to fulfill requirements for federation with other partners and outside parties in a secure and cost-effective manner

Cloud SSO and FIM are Part of the Identity Management Architecture Security Policy Credentials Location Badges Passwords Tokens Certificates Smart Cards Biometrics RFID Enterprise Access Management Role and Business Relationship Management Federated Identity Management Enterprise Single Sign-on Partner A User Provisioning Password Management Authentication Service Access Enterprise Resources Partner B Meta Directory Service Directories Meta Directories Data Repositories Supply Chain Actions/Alarms Report Monitor Analytics Respond Governance, Risk, and Compliance (GRC) Management Breach Identification Policy Enforcement The emphasis is on creating trusted identities, safeguarding personal information, and controlling access to resources

Cloud SSO and Federation Benefits Saves organizations money Reduce cost associated with managing external user identities Business Enablement Gain competitive edge through improved information exchange between business partners, suppliers, and customers Efficiencies in business operations with cross domain single-sign-on Increases access to external information resources Extensibility: Once the architecture is built, it is reusable at other service providers within a circle of trust Improved security and compliance management Demonstrate secure systems access control Standardized approach to online identities between partners Improved compliance reporting Enhanced privacy by reducing the propagation of personally identifiable information (PII)

CSC Identity Management Global Offerings Identity Management Consulting Services Current state assessments Workshops Identity Management and Access Management User Provisioning Role Management Web and Enterprise Single Sign-on PKI/Certificate based two-factor authentication Federated Identity Management (FIM) Cross domain single sign-on based on trust relationships Ping Federate Cloud SSO Federation for CSC outsourced clients to access support applications Identity and Access Governance Access Certification Policy Management and Enforcement Identity Analytics and Role Management Compliance Reporting 24x7 Operational Support Services

CSC Identity Management Capabilities Full service Consulting Current state assessment Service design, development, and integration Operational support services Dedicated security professionals Trained and experienced in: Sun, Oracle, Ping Identity, Sailpoint, RSA, Microsoft (AD FS), VeriSign (Symantec), and Quest (former Voelcker ActiveEntry) solutions Smart card technologies Identity Management Lab, Newark, DE

Experience Federated identity management solution and services Developed, deployed, and support thirteen client-to-csc federations servicing more than 200,000 users Providing 24x7 operational support service to major UK consumer goods client including on-boarding additional applications Ongoing deployment at major U.S. health insurer to support up to 5.5 million users Ongoing deployment at U.S. Government Agency Identity and access management solutions and services Designed, deployed, and support global PKI authentication solution for Fortune 500 company Designed, deployed, and supported identity management and access management solution for federal healthcare agency (currently updating solution to new vendor product) Provided identity management operational support service for insurance services company Designed a comprehensive identity and access management solution to support more than 240,000 users for a Fortune 500 enterprise Designed, deployed, and support 10 global, strong authentication systems supporting more than 140,000 users Developed, deployed, and support global customized user-provisioning tool integrated with strong authentication system for major Fortune 500 client servicing more than 90,000 users Developed and support unique, certificate-based, strong authentication solution for SAP environment Designed and deployed biometric and smart card technology-based solutions for the Department of Defense and other federal agencies Designed and deployed Identity Management solution for the world s largest reinsurance company Managed Identity management design projects for major European Banks, Insurance companies, and Manufacturing companies

Questions? To learn more about CSC s Cloud SSO and Federation offerings and our full Identity Management portfolio visit www.csc.com/cybersecurity

Thank You