Lieberman Software Random Password Manager & Two-Factor Authentication.

Slides:



Advertisements
Similar presentations
Heroix Longitude - multiplatform, automated application performance monitoring and management software.
Advertisements

McAfee One Time Password
Enable Bring Your Own Device with SCCM 2012 David Caddick Solutions Architect, Quest Software WCL315.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Privileged Identity Management Enterprise Password Vault
Random Password Manager Centralized scalable password management security and recovery Joe Vachon Sales Engineer.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
1 Johnson & Johnson: Use of Public Key Technology Rich Guida Director, Information Security Rajesh Shah Sr. Consultant, Information Security.
An Authorization Service using.NET Passport ™ as underlying Authentication Scheme Bar-Hen Ron Hochberger Daniel Winter 2002 Technion – Israel Institute.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
1 Chapter 1 Introduction to Windows Server Two main goals for Net Admin Make network resources available to users Files, folders, printers, etc.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Network Shares and Accounts Sharing Printers, Drives, Folders – Setup Windows 95/98 Windows NT (2000, XP) Linux – Users – Groups.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
RSA SecurID November 10, 2005.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
VMware vCenter Server Module 4.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Untangle and OpenVPN. ‏ What is OpenVPN? Allows secure remote connection Based on SSL Uses UDP 1194 Supports – Site to Site (hardware to hardware) – Site.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Task Scheduler Pro Managing scheduled tasks across the enterprise Joe Vachon Sales Engineer.
Lieberman Software Random Password Manager & Workflow Delegation.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.

Tim Vander Kooi Systems
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Lawrence Livermore National Laboratory A system for strong local account management. SLAM David Frye Lawrence Livermore National Laboratory, P. O. Box.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
LegendCorp What is System Center Virtual Machine Manager (SCVMM)? SCVMM at a glance Features and Benefits Components / Topology /
TwoFactor Authentication Service Jason Testart, Computer Science Computing Facility.
Web Access. Overview  Purpose  Prerequisites  Install Components  Enable Virtual Directories  IIS Configuration & Security  Troubleshooting.
Service Account Manager Centralized Management and Reporting of Windows Services.
User Manager Pro Suite continued… All-in-One Security, Management & Reporting.
Module 1: Introduction to Administering Accounts and Resources.
® IBM Software Group ©IBM Corporation IBM Information Server Architecture Overview.
Windows SharePoint Services Installation and Configuration.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Module 1: Introduction to Windows 2000 and Networking.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
Architecting Enterprise Workloads on AWS Mike Pfeiffer.
Module 1: Introduction to Administering Accounts and Resources
Novell Account Management Introduction and Overview
Adaptive Authentication
HW and SW Solution for Black-box attacks
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
RKL Remote key loading.
A Practice Solutions Practice Solutions.
NTC 328 Great Wisdom/tutorialrank.com. NTC 328 All Assignments For more course tutorials visit NTC 328 Assignment Week 1 Practice.
Module 1: Overview of Systems Management Server 2003
Presentation transcript:

Lieberman Software Random Password Manager & Two-Factor Authentication

Random Password Manager Periodically randomizes local administrator and root account passwords throughout the enterprise, including firecall accounts. Enables delegated remote recovery of current local passwords on demand. Multi-threaded, SQL server-based application that deploys without installing agents to clients. Supports Windows NT, 2000, XP, Server 2003, Vista, Server 2008, Linux, UNIX, SQL Server, Oracle, Juniper, Cisco IOS accounts.

Problem Credentials compromised via Shoulder surfing Key loggers Social engineering

Solution: RSA SecurID Integration RSA Secured partnership, providing RSA SecurID two-factor authentication technology. Prevents data from being accessed via key loggers, shoulder surfing, or social engineering. Only staff with physical possession of an RSA SecurID hardware authenticator and properly provisioned credentials can access current passwords.

Secure Identity Management Requires users to identify themselves with two unique factors: –A password or PIN, and –an RSA SecurID authenticator such as a hardware token After both factors are authenticated, users can access password store.

How it works-Accessing Stored Passwords Local access to Random Password Manager is checked against central database to confirm if user is permitted access and if RSA SecurID is required. If so, user enters RSA SecurID passcode – which changes every 60 seconds – and personal PIN into dialog box to achieve access.

Process Overview

Requirements RSA List Library Version 6.1 Random Password Manager 4.01 or later RSA SecureID Authentication Agent installed on the host machine of the Win32 app and the web server(s) hosting the website(s) Agent host record added to the RSA Authentication Manager database; hostname, ip address—agent type is Net OS RSA agent must be capable of successful authentication using the RSA Security Center

Demonstration Win32 app configuration

Demonstration Website configuration

Conclusion Questions? Visit our Forum at Phone: Joe Vachon Sales Engineer