Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection
Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity Management (FIM) CSC Identity Management Offerings CSC Experience and Capabilities
Cloud SSO What is it? Based on industry federated identity standards Runs on PingFederate software Supports the predominant federated identity standards: Security Assertion Markup Language (SAML) WS-Federation Provides centralized cloud access control Meets enterprise key use case requirements for: Outbound SSO for users to access software as a service (SaaS) and business process outsourcing (BPO) providers, and to connect with trading partners Inbound SSO for SaaS providers, such as BPOs and managed services, to access the enterprise s resources Internal SSO for the enterprise and its acquisitions, affiliates, subsidiaries and joint ventures SSO to a third party, hosted hub for users to share information among industry organizations
Cloud SSO How It Works
Federated Identity Management (FIM) What Is It? A group of two or more trusted partners Bound by business and technical agreements Allows a user from one federation partner to seamlessly access information resources from another federation partner Transaction done in a secure and trustworthy manner Organizational participants in a federation vet and maintain information on the users they manage Each federation partner retains control over the business rules for granting access to the sensitive information it owns Bottom line: provides cross-domain single sign-on (SSO) among federated partners
Federation How It Works Partner to Partner Federation Identity Provider Partner A Service Provider Partner B Identity Store Assertion Federation Service Protected Applications Federation Service Access Management System The Internet Enable organizations to fulfill requirements for federation with other partners and outside parties in a secure and cost-effective manner
Cloud SSO and FIM are Part of the Identity Management Architecture Security Policy Credentials Location Badges Passwords Tokens Certificates Smart Cards Biometrics RFID Enterprise Access Management Role and Business Relationship Management Federated Identity Management Enterprise Single Sign-on Partner A User Provisioning Password Management Authentication Service Access Enterprise Resources Partner B Meta Directory Service Directories Meta Directories Data Repositories Supply Chain Actions/Alarms Report Monitor Analytics Respond Governance, Risk, and Compliance (GRC) Management Breach Identification Policy Enforcement The emphasis is on creating trusted identities, safeguarding personal information, and controlling access to resources
Cloud SSO and Federation Benefits Saves organizations money Reduce cost associated with managing external user identities Business Enablement Gain competitive edge through improved information exchange between business partners, suppliers, and customers Efficiencies in business operations with cross domain single-sign-on Increases access to external information resources Extensibility: Once the architecture is built, it is reusable at other service providers within a circle of trust Improved security and compliance management Demonstrate secure systems access control Standardized approach to online identities between partners Improved compliance reporting Enhanced privacy by reducing the propagation of personally identifiable information (PII)
CSC Identity Management Global Offerings Identity Management Consulting Services Current state assessments Workshops Identity Management and Access Management User Provisioning Role Management Web and Enterprise Single Sign-on PKI/Certificate based two-factor authentication Federated Identity Management (FIM) Cross domain single sign-on based on trust relationships Ping Federate Cloud SSO Federation for CSC outsourced clients to access support applications Identity and Access Governance Access Certification Policy Management and Enforcement Identity Analytics and Role Management Compliance Reporting 24x7 Operational Support Services
CSC Identity Management Capabilities Full service Consulting Current state assessment Service design, development, and integration Operational support services Dedicated security professionals Trained and experienced in: Sun, Oracle, Ping Identity, Sailpoint, RSA, Microsoft (AD FS), VeriSign (Symantec), and Quest (former Voelcker ActiveEntry) solutions Smart card technologies Identity Management Lab, Newark, DE
Experience Federated identity management solution and services Developed, deployed, and support thirteen client-to-csc federations servicing more than 200,000 users Providing 24x7 operational support service to major UK consumer goods client including on-boarding additional applications Ongoing deployment at major U.S. health insurer to support up to 5.5 million users Ongoing deployment at U.S. Government Agency Identity and access management solutions and services Designed, deployed, and support global PKI authentication solution for Fortune 500 company Designed, deployed, and supported identity management and access management solution for federal healthcare agency (currently updating solution to new vendor product) Provided identity management operational support service for insurance services company Designed a comprehensive identity and access management solution to support more than 240,000 users for a Fortune 500 enterprise Designed, deployed, and support 10 global, strong authentication systems supporting more than 140,000 users Developed, deployed, and support global customized user-provisioning tool integrated with strong authentication system for major Fortune 500 client servicing more than 90,000 users Developed and support unique, certificate-based, strong authentication solution for SAP environment Designed and deployed biometric and smart card technology-based solutions for the Department of Defense and other federal agencies Designed and deployed Identity Management solution for the world s largest reinsurance company Managed Identity management design projects for major European Banks, Insurance companies, and Manufacturing companies
Questions? To learn more about CSC s Cloud SSO and Federation offerings and our full Identity Management portfolio visit www.csc.com/cybersecurity
Thank You