Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac 01.10.2008



Similar documents
Red Hat Enterprise ipa

IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat

identity management in Linux and UNIX environments

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc

Red Hat Identity Management

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Integration with Active Directory. Jeremy Allison Samba Team

Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

Virtualization Case Study

CA SiteMinder SSO Agents for ERP Systems

Integrated Approach to User Account Management

Cross-Realm Trust Interoperability, MIT Kerberos and AD

Secure Login Issues & Solutions

PROTECT YOUR WORLD. Identity Management Solutions and Services

IBM Tivoli Directory Integrator

How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

ICANWK504A Design and implement an integrated server solution

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

OracleAS Identity Management Solving Real World Problems

How To Achieve Pca Compliance With Redhat Enterprise Linux

Centrify Server Suite, Standard Edition

Samba in the Enterprise : Samba 3.0 and beyond

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption

HOBCOM and HOBLink J-Term

CAC AND KERBEROS FROM VISION TO REALITY

Oracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (

Implementing Microsoft Azure Infrastructure Solutions

Integrating Linux systems with Active Directory

Likewise Security Benefits

CA SiteMinder. Implementation Guide. r12.0 SP2

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

RSA SecurID Two-factor Authentication

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Advancements in Linux Authentication and Authorisation using SSSD

LinuxCon North America

ICANWK401A Install and manage a server

Choosing an SSO Solution Ten Smart Questions

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

- Identity & Access Management

Configuration Audit & Control

Directory and File Transfer Services. Chapter 7

Introduction to Computer Security

Directory-as-a-Service Primer (DaaS)

Improving Interoperability and Reducing Cost in the Data Centre

Active Directory and DirectControl

Patch Assessment Content Update Release Notes for CCS Version: Update

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

Speeding Office 365 Implementation Using Identity-as-a-Service

Architecture Guidelines Application Security

Introduction to Computer Administration. System Administration

Sun and Oracle: Joining Forces in Identity Management

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

How To Get A Single Sign On (Sso)

Symantec IT Management Suite 7.5 powered by Altiris

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

SECURE ACCESS TO THE VIRTUAL DATA CENTER

How To Use A Pmsft On A Pc Or Mac Or Mac (For Mac) With A Pmf (For Pc) Or Mac Mac (Or Mac) On A Mac Or Pc (For Pmsf) On An Ipad

Juniper SSL VPN Notes Page 1

Centrify Server Suite Management Tools

How To Get The Most Out Of Redhat.Com

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

Securing your business

Symantec Mobile Management Suite

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

JBoss Enterprise Middleware. The foundation of your open source middleware reference architecture

System Security Services Daemon

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Integrated Authentication

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation

Access All Your Files on All Your Devices

Achieving HIPAA Compliance with Red Hat

Achieving HIPAA Compliance with Red Hat

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Security Survey 2009: Privileged User Management It s Time to Take Control Frequently Asked Questions and Background

Preemptive security solutions for healthcare

Microsoft Implementing Microsoft Azure Infrastructure Solutions

Transcription:

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments Dragos Manac 01.10.2008

Agenda The Need for Identity & Access Management Enterprise IPA Overview Pricing Questions to Consider Where to Go for More Information 2

Identity & Access Management: What Is It? User account creation User account attribute assignment Adding or removing access to specific systems (i.e. user provisioning) Resetting passwords for lost passwords Enforcement of secure passwords Enforcement of periodic password changes User account deletion 3

Identity & Access Management: Pain Points Compliance Several regulations now require comprehensive management and auditing of user accounts and rights Inefficiency Tedious, decentralized administration of user accounts and rights for multiple systems Cumbersome maintenance of multiple user names and passwords for end users Security Deficiencies Inability to enforce secure password standards Difficulty in controlling access to information and assets Inability to determine actual rights of individual users 4

Compliance Regulations in Depth Gramm-Leach-Bliley (15 U.S.C. 6801 6809) Applies to all financial institutions Mandates adoption of strict privacy measures to protect customer data HIPPA (Security Rule 164.308-164.316) Applies to all organizations that process personal health information (PHI) Mandates the development and enforcement of formal security policies and procedures for granting different levels of access to PHI. HSPD-12 Applies to all Federal agencies Mandates secure and reliable forms of identification for all Federal employees and contractors 5

Compliance Regulations in Depth PCI (Requirements 7 10) Applies to all companies that process credit card information Mandates the implementation of strict access controls Sarbanes-Oxley (Section 404) Applies to all public companies Mandates the implementation and maintenance of an adequate internal control structure and procedures for financial reporting 6

Identity & Access Management: Implications Significant fines Increased IT resources Decreased end user productivity Loss of personal information Legal liability Brand damage Decreased market capitalization Loss of confidential information Decreased competitive advantage Service outages and business disruptions 7

Red Hat Enterprise IPA Red Hat Enterprise IPA provides centralized and secure identity & access management for Linux and Unix environments Identity who you are Policy what you can do Audit what you did Version 1.0 released in June 2008 Based on open source freeipa project: www.freeipa.org Started and contributed to by Red Hat 8

Red Hat Enterprise IPA Delivers existing technologies in an integrated solution to address customer pain points: Red Hat Directory Server Light-weight Directory Access Protocol (LDAP) MIT Kerberos Layered product (requires Red Hat Enterprise Linux) 9

Enterprise IPA Features & Benefits Feature Centralized management of user identities Single sign-on (SSO) for users Kerberos authentication and NSS data encryption Web-based graphical Interface for deployment and management Open source, open protocols Delivered via simple yearly subscription Benefit Increased IT efficiency / reduced costs Increased end user productivity Secure access to and transmission of all user information Low total cost of ownership (TCO) No vendor lock-in Open, interoperable, and extensible for re-use by other applications No complex licensing schemes Product updates and world-class support included at no additional cost 10

Enterprise IPA Roadmap: Version 1.1 GA November 2008 Available at no additional cost to all IPA subscribers Feature Two-way synchronization of user identities and passwords with Microsoft Active Directory Single sign-on (SSO) for users across Windows and RHEL environments Benefit Increased IT efficiency / reduced costs Increased end user productivity 11

Enterprise IPA Roadmap: Version 2.0 GA 2009 Available at no additional cost to all IPA subscribers Feature Creation and management of secure identities for machines & services User and group host access policy management Mutual authentication and secure communication for services Central management of administrative access to machines and services Centralized audit of administrative actions Benefit Increased IT efficiency / reduced costs Increased IT efficiency / reduced costs Increased security Increased security Increased security 12

Enterprise IPA Roadmap: RH Linux Automation Several Red Hat Linux Automation efforts are dependent upon IPA: Virtualization management Next generation system management Linux Appliance RHEL Desktop MRG/AMQP JBoss ON 2.0 Users Applications IPA Data Servers 13

Enterprise IPA Services Planning Deployment Migration From NIS to IPA From LDAP to IPA Integration Synchronization with Active Directory 14

Enterprise IPA Pricing Enterprise IPA 1.0 $7,500 annual subscription per IPA server Enterprise IPA 2.0 $7,500 annual subscription per IPA server $100 annual subscription per managed server $25 annual subscription per managed desktop Notes: Requires RHEL subscription per IPA server SLA based on underlying RHEL Virtual machine counts as a machine 15

Questions to Consider Do you have 25 or more of any of the following Linux or Unix systems deployed? Red Hat Enterprise Linux (RHEL) 3, 4, or 5 HP-UX 11, 11i v.1, or 11i v2 Sun Solaris 8,9, or 10 AIX 5.3 Mac OS X Are you facing new compliance regulations that require comprehensive management and auditing of user accounts and rights? Are you spending significant time administering user accounts and rights for multiple systems? Are your end users maintaining multiple user names and passwords in order to do their jobs? Is your current identity management solution too expensive or difficult to maintain? 16

Additional Information: www.redhat.com/enterprise_ipa 17