Olli Jussila Adaptive R&D TeliaSonera

Size: px
Start display at page:

Download "Olli Jussila Adaptive R&D TeliaSonera"

Transcription

1 Olli Jussila Adaptive R&D TeliaSonera

2 Agenda TeliaSonera at a glance Project presentation Technical results Business model and actor benefits End user experience Dissemination activities Conclusion 23/02/07 Page 2

3 The Nordic and Baltic leader in telecommunications N O R W A Y F I N L A N D Net sales 2006 EUR 9790 million Strong positions in mobile in Eurasia, Russia and Turkey through subsidiaries and associated companies D E N M A R K 23.5 million customers E S T O N I A L A T V I A Mobile services launched in Spain at the end of 2006 S W E D E N L I T H U A N I A Number of employees: 28,000 Number of Customers as of December, 2006

4 Identity Management Nightmare! Multiple accounts, multiple credentials everywhere 23/02/07 Page 4

5 The Liberty solution Id-ff Sign on s with my IDP account Identifiers 1 Circle of trust Share My personal information Id-wsf IDP Identity Provider 3 W Attribute Provider Profiles Service Provider Service Provider Single Sign On 2 To other website Id-ff 23/02/07 Page 5

6 FIDELITY project assumptions Potential Identity Providers and Circles of Trust are numerous Users will navigate among these Circles of Trust One CoT should be able to establish trust relations with another CoT to allow Identity roaming 23/02/07 Page 6

7 FIDELITY project in a nutshell Set up 4 heterogeneous Circles of Trust Deploy strong authentication mechanisms Demonstrate the inter-operability of these Circles of Trust regarding: Liberty Alliance technical specifications Business model EU legal constraints User experience Provide standardisation and implementation contributions 23/02/07 Page 7

8 FIDELITY project members 4 telcos, setting up the CoTs : France Telecom, Amena, Telenor, TeliaSonera 3 industrial partners, providing ID platforms and software Ericsson, Gemalto, Italtel 3 SMEs, and 1 university, providing specific skills and software TB-Security, Linus, Moviquity, Oslo university college 23/02/07 Page 8

9 FIDELITY final results Technical results 23/02/07 Page 9

10 Implementation of principal COTs/interCOT infrastructure and services The four CoTs in France, Finland, Norway and Spain have been established. Each CoT has an Identity Provider some Service Providers with Web service consumers WSC and some Attribute Providers (Web service providers W) In each COT: ID-FF V1.2 (Identity Federation and SSO) has been fully tested ID-WSF V1.1(Identity Web Service Framework) has been tested Product from different vendors have been used in order to test interoperability of Liberty software implementation 23/02/07 Page 10

11 Architecture and Information flow (simplified view) Service Provider with WSC V-IdP V-CoT V-DS 1. A user access a service 2. re-directs user to V-IDP 3. V-IDP re-directs/proxies user to H- IDP 4. H-IDP maps the authentication context request of V-IDP and authenticates a user Auth. assertion including DS info is returned and to V-IDP and V H-CoT 7-8. (WSC) requests end point of H-W from H-DS. 4 H-IdP H-DS H- W (WSC) requests service from H-W 11. According privacy settings H-W initiates user-consent process via and Interaction service. W is also able to request stronger authentication via WSC/ 23/02/07 Page 11

12 The French CoT Book a Hotel Student exchange Where Restaurant Wallet Attribute registration registration IDP IDP Technical Identity Provider User/passord EAP/SIM + password Software PKI DS W Wallet Profile W Personal Profile W Geolocation Profile 23/02/07 Page 12

13 The Finnish CoT Where Restaurant Register with a mobile Privacy Manager User/passord OT sms (+ password) WPKI Book A Hotel EAP / SIM IDP / DS Identity Provider GPRS HLR W Wallet Profile W Personal Profile W Geoloc Profile W Calendar Profile W Student Profile 23/02/07 Page 13

14 InterCoT Single Sign On Authentication Contexts Level Strong Moderate Basic Methods PC PKI Mobile WPKI PC egate EMV PC + Mobile OTP Mobile TP ISO OTP Mobile USB OTP PC EAP/SIM PC 3.48/SIM GPRS authentication Plain UserID/password SSL UserID/password Supported? YES YES YES YES 7. Mobile USB-OTP 4. PC EAP/SIM please? Level Strong Moderate Basic Methods PC PKI Mobile WPKI PC egate EMV PC + Mobile OTP Mobile TP ISO OTP Mobile USB OTP PC EAP/SIM PC 3.48/SIM GPRS authentication Plain UserID/password SSL UserID/password Supported? YES YES YES YES 5. Some other from the same level? 8.Authenticated ok, empty context Or V- V-IDP H-IDP Requested context PC EAP/SIM please? 1. User accesses service provider User Agent 6. Authentication with the user 23/02/07 Page 14

15 InterCoT attribute sharing (ID-WSF) InterCoT Discovery Service Direct Access. By using this method, the V-WSC requests directly the Discovery Service of the H-CoT (H-DS) DS-proxying. By using this method, the Discovery Service of the V-CoT (V-DS) acts as a DS-proxy between the V-WSC and the H-DS. DS-chaining. By using this method, the V-WSC requests first the V-DS which redirects it to the H-DS. Tested If direct access is used, then we recommend the deployment of a Trust model based on PKI 23/02/07 Page 15

16 ID-WSF trust model for attribute sharing IntraCoT vs. InterCoT In IntraCoT, every (H-) (H-)W pair has a direct business agreement implying direct trust relationship Technically, the trust between ID-WSF entities is established by exchanging metadatas on a bilateral basis In InterCoT, the business agreements are established only between IDPs but there is no direct business relationship between V- and H- W Technically, exchanging metadatas between every V- H-W pair would be far too exhaustive provisioning of metadatas would require too much effort Fidelity PKI trust model enables business model for InterCoT attribute sharing between V- and H-W Technically, this is implemented by using hierarchical certificate path validation (RFC3280) 23/02/07 Page 16

17 InterCoT Relationship Establishment CA certificate exchange Root CoT CA Root W IDP 1 CoT CA IDP 2 W IDPs exchange the CA certificate chains, and delivers them to their other IntraCoT entities (s and Ws) 23/02/07 Page 17

18 InterCoT Relationship Establishment Root CA cert Compliant with RFC3280 CoT CA cert is associated with trusts CoT CA cert W includes / WSC CoT CRL Home CoT Service request Visited CoT Certification revocation status check 23/02/07 Page 18

19 FIDELITY final results Business Scenarios, Actors benefits 23/02/07 Page 19

20 Business scenarios Closed Scenario: Single Company IDP and IDs IDP IDs Open Scenario: Telecom as IDP for external Inter-CoT Scenario: Telecom Operator alliances with internal and external s IDs IDP IDs Inter-CoT Scenario Multidomains Multi domain IDP alliances with internal and external s IDs IDP IDs 23/02/07 Page 20

21 Actors Benefits Identity Provider Large user base Attract new user Enforce their trust relation with the user Offer (sell) strong and complex authentication methods Service Providers Attract users Simplify local user management Use Strong authentication Rely on user identity attributes User Simple and secure authentication Ease of attribute management, control of data dissemination Respect of his privacy The virtuous circle : More users More services 23/02/07 Page 21

22 FIDELITY final results End User Experience 23/02/07 Page 22

23 Circle of Trust (CoT) and Circle of CoT (CoCoT) Concepts explanation and representation Explain to the user what is a CoT, what is CoCoT Represent concepts with pictures: CoCoT logo/brand Master Key = IDP credentials CoT logo/brand Key = credentials CoT Homepage Disclaimer SSO description Attribute sharing description List of the belonging to the CoT Map of the CoT and the CoT's partners (CoCoT) Registration area Personal area for registered users 23/02/07 Page 23

24 FIDELITY final results Dissemination activities 23/02/07 Page 24

25 Fidelity: Dissemination Advisory Boards in each telco Liberty Meetings (plenary, TEG) 3GSM World Congress 2007 IST 2006 E challenge ISSE in Roma Internet Global Congress Barcelona Security and identity management event in Barcelone France Telecom R&D result event in Paris Telecom I+D, Madrid Celtic and Eureka events Website : Demo Kit : Public documents : Standardization activities (Wallet + calendar ID-WSF Serv. Interf. spec) 23/02/07 Page 25

26 Conclusion of the FIDELITY project From a technical, business, legal and ergonomic point of view, Liberty solves the IDM issue and can be extended to InterCoT. But read our public recommendations anyway The very good cooperation and acceptance between all partners was the basis for the success of the project. The consortium is satisfied with the results obtained and will now begin to exploit them. 23/02/07 Page 26

27 Thank you for your attention Any questions? 23/02/07 Page 27

Orange Liberty-enabled solution for 71 million subscribers. Aude Pichelin Orange Group Standardisation Manager

Orange Liberty-enabled solution for 71 million subscribers. Aude Pichelin Orange Group Standardisation Manager Orange Liberty-enabled solution for 71 million subscribers Aude Pichelin Orange Group Standardisation Manager Aude.pichelin@orangefrance.com Orange, Orange, 3GSM 3GSM Barcelona, Barcelona, February 15,

More information

The Business of Identity: Business Drivers and Use Cases of Identity Web Services

The Business of Identity: Business Drivers and Use Cases of Identity Web Services The Business of Identity: Business Drivers and Use Cases of Identity Web Services Roger Sullivan, Vice President, Liberty Alliance Vice President, Oracle Corporation Liberty s Architecture Liberty Identity

More information

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely

More information

Advanced Client Conor P. Cahill Systems Technology Lab Intel Corporation

Advanced Client Conor P. Cahill Systems Technology Lab Intel Corporation Advanced Client Conor P. Cahill Systems Technology Lab Intel Corporation Disclaimer This presentation discusses work-in-progress within the Liberty Alliance Technology Expert Group. The end result of the

More information

Services Specifications: Realizing New Business Capabilities

Services Specifications: Realizing New Business Capabilities Services Specifications: Realizing New Business Capabilities 1 Liberty Alliance Workshop Santa Clara, CA, March 10, 2008 (sampo@symlabs.com) 1. Introduction and agenda 2 (sampo@symlabs.com) - Speaking

More information

From UseCases to Specifications

From UseCases to Specifications From UseCases to Specifications Fulup Ar Foll Liberty Technical Expert Group Master Architect, Global Software Practice Sun Microsystems Why Identity Related Services? Identity-enabling: Exposes identity

More information

OATH : An Initiative for Open AuTHentication

OATH : An Initiative for Open AuTHentication OATH : An Initiative for Open AuTHentication Who Are You Really Doing Business With? 2 Oath Proprietary Confidential The New York Magazine, July 5, 1993, Peter Steiner, The Economic Promise of e-business

More information

Liberty Alliance concepts. Mon Service Public

Liberty Alliance concepts. Mon Service Public Liberty Alliance concepts applied to Mon Service Public Liberty Alliance Deployment Workshop December 7th, 2005 1 Agenda 1. What is Mon Service Public? Key features 2. Mon Service Public & Liberty Alliance

More information

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014 Identity management Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline 1. Single sign-on 2. SAML and Shibboleth 3. OpenId 4. OAuth 5. (Corporate IAM) 6. Strong identity 2

More information

Identity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011

Identity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011 Identity management Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Outline 1. Single sign-on 2. OpenId 3. SAML and Shibboleth 4. Corporate IAM 5. Strong identity 2

More information

Federated Web Services with Mobile Devices

Federated Web Services with Mobile Devices Federated Web Services with Mobile Devices Rajeev Angal Architect Sun Microsystems Pat Patterson Architect Sun Microsystems Session TS-6673 Copyright 2006, Sun Microsystems, Inc., All rights reserved.

More information

Identity Management. Rolf Blom Ericsson Research

Identity Management. Rolf Blom Ericsson Research Identity Management Rolf Blom Ericsson Research Identity Management Agenda What is a Digital Identity Why Identity Management Identity Management Roles and technology User attitudes User Requirements Standardization

More information

Gestión dinámica de configuraciones en dispositivos móviles en un entorno Liberty/OMA-DM

Gestión dinámica de configuraciones en dispositivos móviles en un entorno Liberty/OMA-DM Gestión dinámica de configuraciones en dispositivos móviles en un entorno Liberty/OMA-DM 1 Device Independence Liberty and Identity in a Nutshell The Importance of Identity Principles Liberty Value Proposition

More information

IDENTITY MANAGEMENT AND FEDERATION BC.Net Conference April 25, 2006

IDENTITY MANAGEMENT AND FEDERATION BC.Net Conference April 25, 2006 IDENTITY MANAGEMENT AND FEDERATION BC.Net Conference April 25, 2006 Lauren Wood Senior Technical Program Manager Business Alliances, CTO Office Sun Microsystems Alex Acton Software Specialist Client Solutions

More information

Server-based Certificate Validation Protocol

Server-based Certificate Validation Protocol Server-based Certificate Validation Protocol Digital Certificate and PKI a public-key certificate is a digital certificate that binds a system entity's identity to a public key value, and possibly to additional

More information

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist Identität und Autorisierung als Grundlage für sichere Web-Services Dr. Hannes P. Lubich IT Security Strategist The Web Services Temptation For every $1 spent on software $3 to $5 is spent on integration

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

Public Key Infrastructure

Public Key Infrastructure Public Key Infrastructure Ed Crowley Summer 11 1 Topics Public Key Infrastructure Defined PKI Overview PKI Architecture Trust Models Components X.509 Certificates X.500 LDAP 2 Public Key Infrastructure

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

Liberty Alliance Project

Liberty Alliance Project Liberty Alliance Project Federated Identity solutions to real world issues 4 October 2006 Timo Skyttä, Nokia Corporation Director, Internet and Consumer Standardization What is the Liberty Alliance? The

More information

70-742: Identity in Windows Server Course Overview

70-742: Identity in Windows Server Course Overview 70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure

More information

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1 Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Warm Up to Identity Protocol Soup

Warm Up to Identity Protocol Soup Warm Up to Identity Protocol Soup David Waite Principal Technical Architect 1 Topics What is Digital Identity? What are the different technologies? How are they useful? Where is this space going? 2 Digital

More information

Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model.

Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model. TEG Progress Update Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model. Fulup Ar Foll Master Architect Sun Microsystems Fulup@sun.com 1 What is the

More information

OMA Web Services Network Identity Architecture

OMA Web Services Network Identity Architecture OMA Web Services Network Identity Architecture Candidate Version 1.0 20 Dec 2005 Open Mobile Alliance OMA-AD-OWSER_NI-V1_0-20051220-C OMA-AD-OWSER_NI-V1_0-20051220-C Page 2 (25) Use of this document is

More information

Digital (Virtual) Identities in Daidalos and beyond. Amardeo Sarma NEC Laboratories Europe

Digital (Virtual) Identities in Daidalos and beyond. Amardeo Sarma NEC Laboratories Europe Digital (Virtual) Identities in Daidalos and beyond Amardeo Sarma NEC Laboratories Europe Who wants to pay for more Bandwidth? More Access Bandwidth? No one pays extra for volume or time plain usage is

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

SSH Communications Tectia SSH

SSH Communications Tectia SSH Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: December 8, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product

More information

Gemalto: a leader in Digital security. L. Manteau, Gemalto Industrial relations

Gemalto: a leader in Digital security. L. Manteau, Gemalto Industrial relations Gemalto: a leader in Digital security L. Manteau, Gemalto Industrial relations ETSI workshop: Standards & Interoperability Sophia-Antipolis, Oct 23-24, 2006 Gemalto s presence worldwide Gemalto was launched

More information

Identity Federation: security for multiple services in a trusted environment.

Identity Federation: security for multiple services in a trusted environment. Italian Chapter of Identity Federation: security for multiple services in a trusted environment. enabling a community of interest Elio Molteni President of AIPSI info@aipsi.org Agenda Introduction to AIPSI

More information

Introduction to Identity Management Systems

Introduction to Identity Management Systems Introduction to Identity Management Systems Ajay Daryanani Middleware Engineer, RedIRIS / Red.es Kopaonik, 13th March 2007 1 1 Outline 1. Reasons for IdM 2. IdM Roadmap 3. Definitions 4. Components and

More information

Federated access service authorization

Federated access service authorization Federated access service authorization MIKKO NIIRANEN and PREETIDA VINAYAKRAY-JANI Nokia Reseach Center Itämerenkatu 11-13 00180 Helsinki FINLAND Abstract: - The increasing variety of access technologies

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

Federated Identity Management and Network Virtualization

Federated Identity Management and Network Virtualization Federated Identity Management and Network Virtualization Yang Cui and Kostas Pentikousis 3rd ETSI Future Networks Workshop 10 April 2013 Sophia Antipolis, France The opinions expressed in this presentation

More information

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model

More information

Federated Identification Architecture

Federated Identification Architecture Federated Identification Architecture Arezoo Haghshenas Department of Computer Tehran South Branch, Islamic Azad University Tehran, Iran Mir Ali Seyyedi Department of Computer Tehran South Branch, Islamic

More information

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1 VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June

More information

CA CloudMinder. SSO Partnership Federation Guide 1.51

CA CloudMinder. SSO Partnership Federation Guide 1.51 CA CloudMinder SSO Partnership Federation Guide 1.51 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

eid Interoperability for PEGS WS-Federation

eid Interoperability for PEGS WS-Federation eid Interoperability for PEGS WS-Federation Workshop Brussels 10 May 2007 Agenda 1 Scope 2 Category 3 Approach and description 4 Relevance for eid Interoperability 5 Pro s and Con s 6 Relationship with

More information

AeroMACS Public Key Infrastructure (PKI) Users Overview

AeroMACS Public Key Infrastructure (PKI) Users Overview AeroMACS Public Key Infrastructure (PKI) Users Overview WiMAX Forum Proprietary Copyright 2019 WiMAX Forum. All Rights Reserved. WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

Extending Services with Federated Identity Management

Extending Services with Federated Identity Management Extending Services with Federated Identity Management Wes Hubert Information Technology Analyst Overview General Concepts Higher Education Federations eduroam InCommon Federation Infrastructure Trust Agreements

More information

Security Strategy for Mobile ID GSMA Mobile Connect Summit

Security Strategy for Mobile ID GSMA Mobile Connect Summit Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless

More information

Przejmij kontrolę nad użytkownikiem, czyli unifikacja dostępu do aplikacji w zróżnicowanym środowisku

Przejmij kontrolę nad użytkownikiem, czyli unifikacja dostępu do aplikacji w zróżnicowanym środowisku Przejmij kontrolę nad użytkownikiem, czyli unifikacja dostępu do aplikacji w zróżnicowanym środowisku Łukasz Knysak Senior System Inżynier w Veracomp SA Back in 1963 JFK ordered that all nuclear warheads

More information

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith ArcGIS Enterprise Security: An Introduction Gregory Ponto & Jeff Smith Agenda ArcGIS Enterprise Security Model Portal for ArcGIS Authentication Authorization Building the Enterprise Encryption Collaboration

More information

OCSP Client Tool V2.2 User Guide

OCSP Client Tool V2.2 User Guide Ascertia Limited 40 Occam Road Surrey Research Park Guildford Surrey GU2 7YG Tel: +44 1483 685500 Fax: +44 1483 573704 www.ascertia.com OCSP Client Tool V2.2 User Guide Document Version: 2.2.0.2 Document

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name:_Unversity of Regina Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09 Assuring Identity The Identity Assurance Framework CTST Conference, New Orleans, May-09 Brett McDowell, Executive Director, Liberty Alliance email@brettmcdowell +1-413-652-1248 1 150+ Liberty Alliance

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Workflow, page 5 Reconfigure OpenAM SSO to SAML SSO After an Upgrade, page 9 Prerequisites NTP Setup In SAML SSO, Network Time Protocol (NTP) enables clock

More information

CA SiteMinder Federation

CA SiteMinder Federation CA SiteMinder Federation Legacy Federation Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Enhanced Privacy ID (EPID), 156

Enhanced Privacy ID (EPID), 156 Index A Accountability, 148 ActiveDirectory, 153 Amazon AWS EC2, 168 Anonymity, 148 Asset tagging, 96 Attestation definition, 65 dynamic remote attestation techniques, 66 IMA, 67 Intel Trust Attestation

More information

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

Phase 2 - Identity Services Marketing Requirements Document

Phase 2 - Identity Services Marketing Requirements Document Phase 2 - Identity Services Marketing Document Version: 1.0 1 NOTE: This document is published for historical interest. Market Documents were originally not designed for publication outside of the Liberty

More information

Identity Management Systems An Overview. IST Event 2004 /

Identity Management Systems An Overview. IST Event 2004 / IST Event 2004 / 15.11.2004 Marit Hansen / Henry Krasemann Unabhängiges Landeszentrum für Datenschutz // Independent Centre for Privacy Protection Schleswig-Holstein, Germany Overview Identity Management

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme ADV1591BU Delivering Virtual Desktops and Apps via the Digital Workspace with Workspace ONE and VMware Horizon VMworld 2017 Content: Not for publication Peter Bjork @thepeb & Matt Coppinger @mcopping #VMworld

More information

Partner Center: Secure application model

Partner Center: Secure application model Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including

More information

CA SiteMinder Federation

CA SiteMinder Federation CA SiteMinder Federation Partnership Federation Guide 12.52 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE Integrating VMware Workspace ONE with Okta VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

Managing Trust in e-health with Federated Identity Management

Managing Trust in e-health with Federated Identity Management ehealth Workshop Konolfingen (CH) Dec 4--5, 2007 Managing Trust in e-health with Federated Identity Management Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Global Government Strategy, Sun

More information

Configuring Single Sign-on from the VMware Identity Manager Service to Marketo

Configuring Single Sign-on from the VMware Identity Manager Service to Marketo Configuring Single Sign-on from the VMware Identity Manager Service to Marketo VMware Identity Manager JANUARY 2016 V1 Configuring Single Sign-On from VMware Identity Manager to Marketo Table of Contents

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Ramnish Singh IT Advisor Microsoft Corporation Session Code: Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing

More information

Future Expansion for emrtd PKI Mark Joynes, Entrust

Future Expansion for emrtd PKI Mark Joynes, Entrust Future Expansion for emrtd PKI Mark Joynes, Entrust 2013 MRTD Symposium 1 What are we trying to achieve Prevent: Production of credible false documents Tampering with legitimate documents Breach of sovereignty

More information

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5 CA SiteMinder Federation Manager Guide: Legacy Federation r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

1. Federation Participant Information DRAFT

1. Federation Participant Information DRAFT INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES [NOTE: This document should be considered a as MIT is still in the process of spinning up its participation in InCommon.] Participation in InCommon

More information

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSL/TLS & 3D Secure CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSLv2 Brief History of SSL/TLS Released in 1995 with Netscape 1.1 Key generation algorithm

More information

Mobile telephones/international roaming frequently asked questions (see also IP/05/161)

Mobile telephones/international roaming frequently asked questions (see also IP/05/161) MEMO/05/44 Brussels, 10 th February 2005 Mobile telephones/international roaming frequently asked questions (see also IP/05/161) What is international roaming? International roaming provides subscribers

More information

SEVENMENTOR TRAINING PVT.LTD

SEVENMENTOR TRAINING PVT.LTD Configuring Advanced Windows Server 2012 Services Module 1: Implementing Advanced Network Services In this module students will be able to configure advanced features for Dynamic Host Configuration Protocol

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

Identity Management In Red Hat Enterprise Linux. Dave Sirrine Solutions Architect

Identity Management In Red Hat Enterprise Linux. Dave Sirrine Solutions Architect Identity Management In Red Hat Enterprise Linux Dave Sirrine Solutions Architect Agenda Goals of the Presentation 2 Identity Management problem space What Red Hat Identity Management solution is about?

More information

Building on existing security

Building on existing security Building on existing security infrastructures Chris Mitchell Royal Holloway, University of London http://www.isg.rhul.ac.uk/~cjm 1 Acknowledgements This is joint work with Chunhua Chen and Shaohua Tang

More information

Cloud Access Manager Overview

Cloud Access Manager Overview Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

CEN TC 224 WG15. European Citizen Card. Brussels May 10th CEN/TC 224 WG15 European Citizen Card

CEN TC 224 WG15. European Citizen Card. Brussels May 10th CEN/TC 224 WG15 European Citizen Card CEN TC 224 WG15 European Citizen Card Brussels May 10th 2007 1CEN/TC 224 WG15 European Citizen Card European Citizen Card Scope Smart-Card based model for e-id management User-centric: Card under control

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Tableau Server All information herein is either public information or is the property of

More information

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow) Integration Guide PingFederate SAML Integration Guide (SP-Initiated Workflow) Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances,

More information

Configuring Advanced Windows Server 2012 Services

Configuring Advanced Windows Server 2012 Services Configuring Advanced Windows Server 2012 Services Course 20412D - Five days - Instructor-led - Hands-on Introduction Get hands-on instruction and practice configuring advanced Windows Server 2012, including

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of

More information

PingFederate 5.0. Release Notes

PingFederate 5.0. Release Notes PingFederate 5.0 Release Notes 2008 Ping Identity Corporation. All rights reserved. January, 2008 Ping Identity Corporation 1099 18th Street, Suite 2950 Denver, CO 80202 U.S.A. Phone: 877.898.2905 (+1

More information

Facing the Challenges of M2M Security and Privacy Phil Hawkes Principal Engineer at Qualcomm Inc. onem2m

Facing the Challenges of M2M Security and Privacy Phil Hawkes Principal Engineer at Qualcomm Inc. onem2m Facing the Challenges of M2M Security and Privacy Phil Hawkes Principal Engineer at Qualcomm Inc. phawkes@qti.qualcomm.com onem2m www.onem2m.org 1 Overview onem2m Architecture: a quick review Challenges

More information

Introduction of the Identity Assurance Framework. Defining the framework and its goals

Introduction of the Identity Assurance Framework. Defining the framework and its goals Introduction of the Identity Assurance Framework Defining the framework and its goals 1 IAEG Charter Formed in August of 07 to develop a global standard framework and necessary support programs for validating

More information

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3

More information

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) 1. Canadian Access Federation Participant Information 1.1.1. Organization name: DOUGLAS COLLEGE 1.1.2. Information below is accurate as of this date: November 16, 2017 1.2 Identity Management and/or Privacy

More information

InCommon Federation: Participant Operational Practices

InCommon Federation: Participant Operational Practices InCommon Federation: Participant Operational Practices Participation in the InCommon Federation ( Federation ) enables a federation participating organization ( Participant ) to use Shibboleth identity

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Using existing security infrastructures

Using existing security infrastructures Using existing security infrastructures Chris Mitchell Royal Holloway, University of London http://www.isg.rhul.ac.uk/~cjm 1 Acknowledgements This is joint work with Chunhua Chen and Shaohua Tang (South

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 708 data breaches 82 million personal records stolen $3.5 million average cost per breach 4 We have a PASSWORD

More information

Course Outline 20742B

Course Outline 20742B Course Outline 20742B Module 1: Installing and configuring domain controllers This module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations

More information

Endpoint Protection with DigitalPersona Pro

Endpoint Protection with DigitalPersona Pro DigitalPersona Product Brief Endpoint Protection with DigitalPersona Pro An introductory technical overview to DigitalPersona s suite for Access Management, Data Protection and Secure Communication. April

More information

Interagency Advisory Board Meeting Agenda, August 25, 2009

Interagency Advisory Board Meeting Agenda, August 25, 2009 Interagency Advisory Board Meeting Agenda, August 25, 2009 1. Opening Remarks 2. Policy, process, regulations, technology, and infrastructure to employ HSPD-12 in USDA (Owen Unangst, USDA) 3. Policy and

More information