Enterprise Single Sign On Identity management for web applications.

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Office 365 Identity June 2013 Microsoft Office365 4/2/2017
Technical Services & Operations WINDOWS 2008 R2 AD / DC UPGRADE PROJECT.
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
Web Booster HTTP Server Acceleration for Lotus Domino.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Chapter 7 HARDENING SERVERS.
Understanding Active Directory
Active Directory Lecture 3 – Domain Services Primer.
Brian Arkills Software Engineer, LDAP geek, AD bum, Senior Heckler, and Associate Troublemaking Officer State of Windows Services at the UW.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
TAM STE Series 2008 © 2008 IBM Corporation WebSEAL SSO, Session 108/2008 TAM STE Series WebSEAL SSO, Session 1 Presented by: Andrew Quap.
August 25, SSO with Microsoft Active Directory Presented by: Craig Larrabee.
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
Understanding Integrated Authentication in IIS Chris Adams IIS Supportability Lead Microsoft Corp.
Session 11: Security with ASP.NET
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
USCGrid A (Very Quick) Introduction To PubCookie
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Module 5: Designing a Terminal Services Infrastructure.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Identity on Force.com & Benefits of SSO Nick Simha.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
SQL Server Security By Mattias Lind For PASS Security VC.
Mastering Windows Network Forensics and Investigation Chapter 13: Logon and Account Logon Events.
Module 9: Fundamentals of Securing Network Communication.
© Logicalis Group Single signon possibilities for iSeries Mandy Shaw, Logicalis (with many thanks to Pat Botz of IBM Rochester)
Single Sign-On
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Module 11: Securing a Microsoft ASP.NET Web Application.
Operating System Security Fundamentals Dr. Gabriel.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 3: Configuring File Access and Printers on Windows 7 Clients
Qaforum Security Structure. What’s SSO Single sign-on (SSO) is mechanism whereby a single action of user authentication and authorization can permit a.
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
Single Sign-On in the Danish Educational Sector Per Thorboll Deputy director UNI-C.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Introduction to Microsoft Windows 2000 Security Microsoft Windows 2000 Security Services Overview Security subsystem components Local security authority.
Microsoft ® Internet Security and Acceleration Server 2006 Beta Technical Overview Steve Lamb Information Security Evangelist
Module 1: Introduction to Windows 2000 and Networking.
Single Sign-on with stoneware Presented by:. Access Stoneware Visit the district home page. In the main menu, hover over LCS Employees and choose Stoneware.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Universal Certificate Authentication to Key Applications at Argonne National Laboratory Presented at National Labs Information Summit 2008 May 13, 2008.
Using Your Own Authentication System with ArcGIS Online
Single sign-on Mike Ladd Nazia Raoof Bret Walker
Nassau Community College
Stop Those Prying Eyes Getting to Your Data
Securing the Network Perimeter with ISA 2004
Active Directory Administration
Enterprise Single Sign-On
Cloud Connect Seamlessly
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Getting Started.
Getting Started.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Azure AD Simon May Technical Evangelist.
The Problem Microsoft Active Directory (AD) is used by almost every big company Microsoft AD uses Kerberos Authentication Android are forcing customers.
Microsoft Virtual Academy
Presentation transcript:

Enterprise Single Sign On Identity management for web applications

Enterprise Single Sign On What is Single Sign On  Single sign-on (SSO) is a mechanism whereby a single action of user authentication and authorization can permit a user to access all computers and systems where he has access permission, without the need to enter multiple passwords

Enterprise Single Sign On SSO with Web Booster  Authenticates with Microsoft Windows, creates access tokens for other systems  Users logged in to their workstation can auto-login to web applications  Authenticates with Microsoft Windows, creates access tokens for other systems  Users logged in to their workstation can auto-login to web applications

Enterprise Single Sign On Benefits to Users  Only have one username and password to remember  No more post-it! notes on monitor with account details  Fast  Seamless  Works with BlackBerry handheld devices  Only have one username and password to remember  No more post-it! notes on monitor with account details  Fast  Seamless  Works with BlackBerry handheld devices

Enterprise Single Sign On Benefits to Operations Staff  Central user account management  Common way to manage accounts  Web Booster ESSO is quick to deploy  No changes to existing servers  No more post-it! notes ;-)  Central user account management  Common way to manage accounts  Web Booster ESSO is quick to deploy  No changes to existing servers  No more post-it! notes ;-)

Enterprise Single Sign On Security  Choose between NTLM or Kerberos authentication  All data is encrypted and verified against Windows Domain Controllers or KDC servers  Traffic to browser may be SSL encrypted  Choose between NTLM or Kerberos authentication  All data is encrypted and verified against Windows Domain Controllers or KDC servers  Traffic to browser may be SSL encrypted

Enterprise Single Sign On Built on Web Booster  Get all existing Booster features  Content compression  Clustering  Load sharing  Dynamic failover  …plus much more  Get all existing Booster features  Content compression  Clustering  Load sharing  Dynamic failover  …plus much more

Enterprise Single Sign On Considerations  Need to ensure workstations are not compromised or left unattended  Windows Domain structure may need to be rationalized for NTLM to work correctly  Need to identify weak spots in infrastructure to avoid single failure points, eg: LDAP  Need to ensure workstations are not compromised or left unattended  Windows Domain structure may need to be rationalized for NTLM to work correctly  Need to identify weak spots in infrastructure to avoid single failure points, eg: LDAP

Enterprise Single Sign On NTLM vs Kerberos  NTLM more widely supported in older versions of Windows (pre win2K)  NTLM is easier to configure initially  Kerberos is more secure  Kerberos is not tied to Windows  NTLM more widely supported in older versions of Windows (pre win2K)  NTLM is easier to configure initially  Kerberos is more secure  Kerberos is not tied to Windows

Enterprise Single Sign On Requirements  Windows workstations  Windows domain  Lotus Domino and/or IBM WebSphere servers (more coming soon)  Windows workstations  Windows domain  Lotus Domino and/or IBM WebSphere servers (more coming soon)

Enterprise Single Sign On Who uses Web Booster? Some of our customers include…

Enterprise Single Sign On Questions…   Web:  Contact one of our business partners   Web:  Contact one of our business partners