Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  

Slides:



Advertisements
Similar presentations
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Advertisements

McAfee One Time Password
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
ELAG Trondheim Distributed Access Control - BIBSYS and the FEIDE solution Sigbjørn Holmslet, BIBSYS, Norway Ingrid Melve, UNINET, Norway.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
TF Mobility Group 22nd September A comparison of each national solution was made against Del C – “requirements”, the following solutions were assessed.
Architecture & Integration: CP v x Platforms: Windows NT sp5(6a)/Solaris 2.8 iWS Client(s) Netscape/IE 4.0+ Java Servlet Engine (Java Servlet API)
10/20/2011Pomcor 1 Deployment and Usability of Cryptographic Credentials Francisco Corella Karen Lewison Pomcor.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
IDS configuration Yun Wang Martin Olsen Anna Paitian.
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
Remote Networking Architectures
Certificate and Key Storage Tokens and Software
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
Web Application Authentication with PKI & Other Functions Bill Weems & Mark B. Jones Academic Technology University of Texas Health Science Center at Houston.
SIM SERVER Central SIM storage & management Full integration with DTT products Easy user defined SIM management rules Ability to change Time & IMEI Simultaneously.
Implementing and Configuring Microsoft ® Windows Server ® 2008 Terminal Services Nicola Ferrini
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Mobile One-Time Password. Page 2 About Changingtec -Member of group -Focus on IT security software CompanyChanging Information Technology Inc Set upApril.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Leveraging UICC with Open Mobile API for Secure Applications and Services Ran Zhou.
Distributed Web Security for Science Gateways Jim Basney In collaboration with: Rion Dooley Jeff Gaynor
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
PKI interoperability and policy in the wireless world.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Gregorio Martínez Pérez University of Murcia PROVIDING SECURITY TO UNIVERSITY ENVIRONMENT COMMUNICATIONS.
PAPI Points of Access to Providers of Information.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Module 5: Designing a Terminal Services Infrastructure.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Identity on Force.com & Benefits of SSO Nick Simha.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
Leveraging UICC with Open Mobile API for Secure Applications and Services.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Single Sign-On
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Lieberman Software Random Password Manager & Two-Factor Authentication.
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
SSO Case Study Suchin Rengan Principal Technical Architect Salesforce.com.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Module 7: Configuring Terminal Services. Overview Describe how the components of Terminal Services work together Identify new Terminal Services core features.
1 Earth System Grid Center for Enabling Technologies ESG-CET Security January 7, 2016 Frank Siebenlist Rachana Ananthakrishnan Neill Miller ESG-CET All-Hands.
Adxstudio Portals Training
Avaya Communicator for Web Demo Installation
Esri UC 2014 | Demo Theater | Using ArcGIS Online App Logins in Node.js James Tedrick.
Module 1: Introduction to Administering Accounts and Resources.
TOPIC: AUTHENTICITY CREATED BY SWAPNIL SAHOO AuthenticityAuthorisation Access Control Basic Authentication Apache BASIC AUTHENTICATIONDIGEST ACCESS AUTHENTICATIONDHCP.
HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Implementing and Managing Azure Multi-factor Authentication
Identity and Access Management
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Federation made simple
HMA Identity Management Status
Data and Applications Security Developments and Directions
Module 1: Introduction to Administering Accounts and Resources
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
RKL Remote key loading.
File Operations Access Permissions.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Presentation transcript:

Alcatel Identity Server Alcatel SEL AG

Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  

Alcatel Identity Server — 3 All rights reserved © 2004, Alcatel How does it work? > HTTP redirection

Alcatel Identity Server — 4 All rights reserved © 2004, Alcatel Circle of Trust

Alcatel Identity Server — 5 All rights reserved © 2004, Alcatel System configuration ID server gateway IP SS7 HLR user; browser, credentials MAP/SS7 business processes Authentication Token SIM token server LDAP user/psw device ID access control... service provider Web Server

Alcatel Identity Server — 6 All rights reserved © 2004, Alcatel System configuration > Different levels of authentication: username/password mobile SIM one-time password token software certificate smart card > identity assertion contains method of authentication

Alcatel Identity Server — 7 All rights reserved © 2004, Alcatel Benefits > Web based, no installation required on user’s client > Identity Management using single-sign-on reduces administrative overhead and cost while increasing security and usability > reaches smart card level of security > large base of GSM terminals in use > Central administration of privileges, access rights,... > easy integration of new applications and services, Web Service architecture > Enabling technology for shops, transactions, single sign-on, access control, payment systems,...

Alcatel Identity Server — 8 All rights reserved © 2004, Alcatel