SIMI: ISO Perspective Al ISO CSU Northridge

Slides:



Advertisements
Similar presentations
ECS and LDAP Karen Krivaa Product Marketing Manager.
Advertisements

FSU Directory Project The Issue of Identity Management Jeff Bauer Florida State University
New Staff Orientation Kay Carlisi Instructional Computing Coordinator.
Architecture & Integration: CP v x Platforms: Windows NT sp5(6a)/Solaris 2.8 iWS Client(s) Netscape/IE 4.0+ Java Servlet Engine (Java Servlet API)
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Information Technology Registry Services Security LDAP-based Attributes and Authentication.
Intranets, Extranets, and Enterprise Collaboration.
Information Technology Information Systems Architecture What’s new. What’s happening.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Technology Update TSAG Meeting 6/13/02. Announcements: DNS Naming and Cleanup (coming!)  imap: , mail, mail1, mailsrv1  telnet, csun1: csun2, hp9k2,
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
June 1, 2001 Enterprise Directory Service at College Park David Henry Office of Information Technology University of Maryland College Park
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Peter Deutsch Director, I&IT Systems July 12, 2005
Cyber Security – Our Approach James Clement Network Specialist ETS: Communications & Network Services
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
College Collaboration System User Office Desktop USC Mail Server College Mail Server User Home Desktop Net USC College.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Chapter 10: Authentication Guide to Computer Network Security.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Unified Student-Centric Authentication and Authorization Nathan Wilder Special Assistant - Technology Office of the CIO.
Session 11: Security with ASP.NET
System Architecture.  Windows Phone 7  Mobile Phone Application  User – End Perspective  Google App Engine  Administration Console  Handles authentication,
1 Simon: What, How and Why Jon Finke Communication and Middleware Technology.
The University of Wisconsin University Directory Service UDS A repository of people information Has been in production for about a year. Serves White pages,
Hands-On Microsoft Windows Server 2008
Corporate Information Systems Delivery of Infrastructure IT Services.
70-411: Administering Windows Server 2012
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Using Web Services to Create Events Web Services Explained And a Production Ready Example.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Module 11: Remote Access Fundamentals
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
Building Secure, Flexible and Scalable Environments using LDAP - SANS Orlando Sacha Faust PricewaterhouseCoopers
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
John Douglass, Developer Ron Hutchins, Dir. Engineering Herbert Baines, Dir. InfoSec.
Networking Components 10/2/07. Parts of a Network Clients –Computers that request or order information from a server –Usually desktop computers with their.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Module 7: Implementing Security Using Group Policy.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
8 88 CHAPTER The Internet, the Web, and Electronic Commerce.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Unified Address Book Security Implications. Unified Address Book Overview –What are we talking about –What is the Risk –What are we doing to minimize.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Virtual Directory Services and Directory Synchronization May 13 th, 2008 Bill Claycomb Computer Systems Analyst Infrastructure Computing Systems Department.
October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY 01 OVERVIEW.
Getting Connected to NGS while on the Road…
Secure Connected Infrastructure
Working at a Small-to-Medium Business or ISP – Chapter 8
Module Overview Installing and Configuring a Network Policy Server
Implementing TMG Server Publishing
Goals Introduce the Windows Server 2003 family of operating systems
Identity & Access Management
Getting Connected to NGS while on the Road…
Networking and Security
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

SIMI: ISO Perspective Al ISO CSU Northridge

The Challenge Provide service for searching and browsing of information that is “fast” Secure access Authentication/authorization Secure the database Audit and compliance

Secure Access OpenLDAP offers several mechanisms to protect the security of the data it stores access control lists connection encryption password hashing

Secure Access Authentication Two categories of users of the directory infrastructure Authentication required Public Secure connection (SSL) Encryption Authorization Restrict access to certain attributes Limit applications access to what is required Public Access control lists (ACL)

Authentication required Mail Peoplesoft Portal Peoplefinder Self Service Tools Samba - File Sharing Wireless Webct

Portal Services Modem, VPN Wireless Servers & Desktops Instant Messaging Calendaring File Services uDrive (etc.) vDrive Course Scheduling Specialized Web Services VOIP List Serve Databases PeopleFinder Degree Planning IdM Web Utilities P O R T A L CSUN’s IdM Policy Business Processes Directory ID Reconciliation Web Services

Public Provides unauthenticated access to a subset of attributes in the directory User/application can retrieve a max of 20 records Accessible on campus - behind firewall Used by Mail clients

Public Provides unauthenticated access to a subset of attributes in the directory User/application can retrieve a max of 20 records Accessible on campus - behind firewall Used by LDAP directory search in mail Peoplefinder