TFS WorkstationControl White Paper

Size: px
Start display at page:

Download "TFS WorkstationControl White Paper"

Transcription

1 White Paper Intelligent Public Key Credential Distribution and Workstation Access Control TFS Technology

2 Table of Contents Overview 3 Introduction 3 Important Concepts 4 Logon Modes 4 Password Types 4 Credential Stores 5 Extended Smart Cards 7 Functionality 7 Benefits of Extended Smart Cards 8 PKI Management 9 User Credential Storage 9 BoKS CAs and Certificates 10 Third-Party CAs and Certificates 10 Automatic Trust Management 10 Certificates for Kerberos Authentication 11 Pre-Existing User Certificates 11 Configurable Expiration Message 11 Configurable and Convenient Security Features 11 Security Policies 11 Streamlined Logon Process 12 The Lock Function and Inactivity Protection 12 About TFS Technology 13 TFS WorkstationControl / 2

3 Overview Introduction TFS WorkstationControl The TFS Technology Vision: Lead the world in providing enhancements to existing infrastructure, simplifying usage and administration with profound security using products and services that add value for the customer. The TFS WorkstationControl solution provides comprehensive protection for workstations in a domain and gives administrators complete control over who accesses those workstations. The solution provides the ability to use different protection mechanisms such as passwords, SecurID tokens, Smart Cards and USB tokens to protect user credentials. Regardless of which protection mechanism is used, legitimate users are welcomed to their workstations with the same streamlined authentication process. Individual users can be assigned different protection mechanisms, which make it possible to tailor the protection level according to each user's needs. Protection mechanisms can be exchanged over time without losing user credentials. Another strength of the TFS WorkstationControl solution is that it provides a uniform way of distributing and managing user credentials such as symmetric keys, RSA keys, certificates, and user data. TFS WorkstationControl is built on the products TFS BoKS Manager and TFS Desktop, which combine into a single, powerful security solution. TFS BoKS Manager Domain server (Microsoft or Novell) Check certificate and download encryption keys Automatic authentication call by TFS Desktop TFS Desktop Figure 1. The TFS WorkstationControl Solution TFS BoKS Manager is the central security server that holds the user database containing policies, user accounts, and user credentials. One of the most important services provided by TFS BoKS Manager in this solution is the ability to create, distribute, and revoke user certificates from a central location. TFS BoKS Manager can be deployed on all major UNIX platforms. TFS Desktop resides on each client machine and provides strong user authentication and access to the user's credentials. TFS Desktop offers streamlined logon features, such as single-sign-on capability that allows users to log on only once to access TFS Desktop and the primary network provider. It also offers additional security functionality, such as the Auto Logon feature that allows users to "train" TFS Desktop to recognize and log users on to their Windows applications without their intervention. TFS Desktop makes it possible for users to roam between machines in the domain, while always maintaining access to the same credentials. It also supports machines that roam between the protected domain and the Internet, which makes the solution suitable for installations in which laptops are used in different environments. See "TFS Desktop Technical Data and Requirements" for platform information. TFS WorkstationControl / 3

4 Important Concepts Logon Modes The solution may be set up to replace the native logon machinery of the client operating system. This configuration is referred to as Integrated Logon mode. In this mode, the user logs on to his or her machine using TFS Desktop, which automatically and transparently handles the Windows (or Novell) domain logon. If passwords are used as the protection mechanism, it is possible to synchronize passwords between the BoKS domain and the Windows (Novell) domain. The login sequence is as follows: The user authenticates to TFS Desktop using one of the available protection mechanisms. The TFS Desktop communicates with TFS BoKS Manager, which authenticates the user. If the authentication succeeds, the user's credentials are downloaded, and the user is authenticated to his or her primary domain server. Alternatively, TFS Desktop may be used to protect specific credentials. This configuration is referred to as On Demand Logon mode. In this mode, the user logs on using the normal Windows logon functionality. The user willbe required to authenticate to the TFS WorkstationControl Solution only when access to credentials is required. For example, in cases in which certificates and keys for signing are among the credentials, user authentication will be forced as soon as the user signs an . Password Types Regular Passwords Passwords are used to cryptographically protect Cards. TFS Desktop has settings that can be used to enforce password policies. RSA SecurID Token Passcodes The password strength of a Card can be greatly improved by using an RSA SecurID token. This kind of token adds two-factor authentication by providing a random, time-based passcode. The user supplies both the passcode and a normal password when he or she authenticates. The information is sent to TFS BoKS Manager, which then uses an RSA ACE/ Server for passcode authentication. TFS WorkstationControl comes complete with support for RSA SecurID with no need for extra client-side software. A working RSA ACE/Server is required for SecurID authentication. PIN codes Passwords used to open Smart Cards are usually referred to as PIN codes. Besides opening Smart Cards with PIN codes, TFS Desktop can be used to enter PUK codes for unlocking blocked Smart Cards and for PIN code changes. PIN codes are the entry mechanism for Extended Smart Cards, since the Smart Card component has to be opened in order to unlock the Card. In the remainder of this document both PIN codes and regular passwords are referred to as passwords. Domain Passwords An inherent weakness of password-based encryption is that an attacker may try to guess the password by going through a long list of possible passwords. This approach is known as a dictionary attack. The TFS WorkstationControl Solution has a feature called Domain Passwords, which protects from dictionary attacks against Cards. Note that the term does not refer to a separate password type, but to a password protection feature. If the Domain Passwords feature is enabled, each Card is protected with a randomly generated password. The user password is not used to open the Card. Instead, when the user logs on, the user password is sent from TFS Desktop to TFS BoKS Manager for verification. If the user TFS WorkstationControl / 4

5 password is correct and the user has not previously depleted his password attempts, the randomly generated password is sent to TFS Desktop where it is used to open the Card. Credential Stores Credentials that are associated with a user must be stored in a secure and protected way. TFS Technology offers several different storage solutions built on hardware and software protection methods and devices. Using TFS BoKS Manager, credential data is automatically synchronized. It is possible to select the degree of credential roaming allowed by allowing or disallowing client-side caching of credentials. The following diagram illustrates some of the variants: Figure 2. Credential Store Types and Usage TFS BoKS Manager Card 1 Card 2 Card 3 Card 4.. Card 1 Card 2 Card 3 Card 4 Synchronized with server Card 2 Card 4 Cashed on client Smart Card Smart Card Smart Card Online logon Online + Offline logon Online + Offline logon Online logon Online + Offline logon Smart Cards A physical device kept in the user's possession that contains a hardware chip that can store user credentials. In order to use a Smart Card, a reader has to be installed on the client machine. Smart Cards are very secure cryptographic containers because a PIN-code must be entered to gain access to the credentials and data. After a predefined number of failed PIN attempts, the Smart Card locks up. This feature makes Smart Cards immune to cryptographic attacks. USB Tokens USB tokens are a relatively new class of cryptographic devices. Technically, a USB token is a combination of a Smart Card and a Smart Card reader in a common USB device. The advantage is that no reader installation is needed in order to roam between computers. A USB token works just as any Smart Card in conjunction with TFS Desktop. Both Smart Cards and USB tokens are referred to as Smart Cards in the remainder of this document. TFS WorkstationControl / 5

6 Cards A Card is a symmetrically encrypted file that contains user credentials. As the name indicates, a Card duplicates the functionality of a Smart Card. This means that the Card contains separate storage areas for keys, certificates, and parameters. A Card can be used to store the same kind of information as a Smart Card, but does not have the memory constraints of the hardware-based Smart Card solution. Extended Smart Cards An Extended Smart Card is a combination of a Card and a Smart Card. PKI keys on the Smart Card are used to protect the Card. The resulting Credential Store combination inherits the best qualities from both storage methods. A later section describes the Extended Smart Card solution in greater detail. The following diagram illustrates the variants of Card protection. Please note that SecurID protection is not shown explicitly but is included in the first example ( Card 1): Figure 3. Protection Mechanisms for Cards TFS WorkstationControl / 6

7 Extended Smart Cards An Extended Smart Card is created when a key pair from the Smart Card is used instead of a password to encrypt the Card. As a result, the Card becomes a transparent extension of the Smart Card. The user experience remains the same as with a normal Smart Card, but the space and management problems are resolved. All data parameters and new certificates can be placed in the Extension Card (the Card that is combined with a Smart Card to form the Extended Smart Card) for automatic data backup and storage. Functionality Extended Smart Card Creation Creating an Extended Smart Card in TFS WorkstationControl is a simple process: Using TFS BoKS Manager, the administrator creates a password-protected Card and ties it to a user account. Next, the administrator protects the Card with a Smart Card by importing a certificate associated with a key pair on the Smart Card. The user can now use both the Smart Card and the password as protection mechanisms for his or her credentials. (The password protection can be removed at the discretion of the administrator.) Users can be allowed to create an Extended Smart Card directly from TFS Desktop. In this case, the administrator need only create a Card and give the password for the Card and a Smart Card to the user. The user initially logs in with the password and then adds the Smart Card protection mechanism. In this scenario, the password protection mechanism is automatically removed to prevent unwanted password backdoors to the Credential Store. Managing Lost Smart Cards and Key Recovery If a user loses the Smart Card portion of the Extended Smart Card, the administrator can remove the Smart Card protection mechanism and provide the user with a new password. The user can use the password to access the Card, where the user's credentials are stored, and can continue to use the credentials in this way until a replacement Smart Card is available. Extended Smart Cards Protect Traveling Users A user who loses his or her Smart Card while traveling may not be able to log on online to automatically download a new Card. Administrators can prepare for this event by leaving the Card password protection mechanism activated when creating the Extended Smart Card. The password is not provided to the user. If the user loses the Smart Card, he or she calls the administrator and obtains the password for the Card. This procedure allows the administrator to constrain the use of password authentication to emergency cases only. Extended Smart Cards Provide Stability and Flexibility Extended Smart Cards make it possible to use different authentication methods in a seamless way. Users can be provided with different authentication solutions over time, but their important credentials always stay the same. It is also possible to have users with full-featured non-extended Smart Cards in the same context as Extended Smart Card users. This makes it possible to migrate between Smart Card solutions at your convenience without massive hardware deployments. TFS WorkstationControl / 7

8 Benefits of Extended Smart Cards To appreciate the benefits of Extended Smart Cards, it is helpful to understand the strengths and weaknesses of Smart Cards and Cards. Pros Smart Cards Strong protection of data with automatic, non-revocable locking True data roaming Personal key protected by hardware Cards Easy, central management Automatic data backup and storage No memory limitations Cons Cumbersome key and certificate management that cannot be easily centralized Severe memory limitations for data and keys Risk of complete loss of data if the card is lost Development of complete Smart Card drivers is difficult and expensive Weaker (password-based) protection Symmetric key operations in software Extended Smart Cards combine desired properties from both Smart Cards and Cards: Smart Card storage limitation problems are solved. New data is stored in the Extension Card rather than on the Smart Card. Support for read-only Smart Cards. In cases in which users are prevented from making changes to the Smart Card, such as identity cards issued by authorities, it is impossible to store parameters and additional keys on the Smart Card. Instead, these credentials can be stored on the Extension Card. Support for devices without storage capacity. Even devices such as mobile telephones and certain USB tokens that cannot do much more than provide an RSA keypair and encryption capabilities can serve as protection devices for Extension Cards. Protection of Smart Card investment. The functionality of existing hardware can be extended over time without replacing all of the Smart Cards. Quick driver development. Because less is required of the Smart Card, development of new smart card drivers is simplified. Some existing PKCS #11 modules may even be used off the shelf. Support for multiple Smart Card devices with the same level of system functionality. Since the Smart Card functionality is extended, it is possible for an organization to mix different Smart Card types and manage them in a uniform way. Reduced administration. If the Smart Card is the sole way of accessing a system and the sole bearer of the user's credentials, it causes administrative overhead when the user loses the Smart Card. However, if the Smart Card is used only as a key to the Extension Card, it is possible to replace the Smart Card without losing any credential information. A new Smart Card can simply be assigned to the Extension Card, which allows the user to continue to access systems in the enterprise and user credentials stored in the Card. Improved Card encryption protection. An Extended Smart Card is much harder to attack cryptographically than a password-protected Card. TFS WorkstationControl / 8

9 PKI Management TFS WorkstationControl uses certificate-based authentication as the ultimate guarantor of a user's identity and provides tools to facilitate the creation and management of user certificates. The TFS WorkstationControl Solution provides various options for setting up the CA hierarchy, as well as straightforward GUIs and clear instructions for managing the CAs and the certificates they sign. User Credential Storage All users must have a place to store credentials. In TFS WorkstationControl, the storage point is called the Credential Store. All elements necessary for enabling users to log on to TFS Desktop and use its security features are kept in the Credential Store. Credential Stores hold both public and private security information, including: RSA key-pairs and x.509 v3 certificates The user's primary network operating system logon information (Windows or NetWare) The user's symmetric file encryption keys Secure storage space TFS WorkstationControl supports completely hardware-based Credential Stores, where all credentials reside on Smart Cards (or USB Tokens). The solution also supports completely software-based storage where all credentials reside in Cards. A third alternative is the combination of both Smart Cards and Cards (referred to as Extended Smart Cards). The type of Credential Store that is best suited varies between installations. If absolute security is required, a Smart Card-based solution may be needed. Cards, on the other hand, are more cost-effective since central management is simplified and no hardware is required. Extended Smart Cards offer a combination of the advantages of Smart Cards and Cards. TFS BoKS Manager All user accounts are created in TFS BoKS Manager. (This may be done by importing from an LDAP user directory, for example.) The next step is to associate the user account to a Credential Store. This may be a Card, a Smart Card or an Extended Smart Card. Cards are created by TFS BoKS Manager and tied to accounts simultaneously. Smart Cards are tied to user accounts by using data from a certificate that resides on the Smart Card or by using the certificate itself. Throughout the lifespan of the user account, TFS BoKS Manager can be used to manage Credential Store ties to users and other managerial tasks. Examples of this are Card password change, certificate replacement and user blocking. TFS BoKS Manager is installed on a UNIX server, but the management interface is Web based and can be run from any browser. TFS Desktop TFS Desktop contains a utility called the Credential Store Manager. This is an easy-to-use GUI-based utility that allows users to view information about their certificates, delete obsolete certificates, and select which certificates are to be used as the default signing and encryption certificates within the TFS WorkstationControl Solution. Two of the certificates in the Credential Store are of particular importance to TFS Desktop. The first is used to establish the user's identity and is referred to as the "signing certificate." The second is used for encryption operations such as key negotiations and is referred to as the "encryption certificate." A single certificate (a so-called multipurpose certificate) can be used for both purposes. TFS Desktop provides easy life cycle management of these certificates by providing automatic rule-based certificate selection. TFS WorkstationControl / 9

10 BoKS CAs and Certificates With TFS WorkstationControl, you can generate an internal BoKS CA hierarchy, which is required to use TFS BoKS Manager as an authentication server for users logging in using TFS Desktop. Once you generate the BoKS CA hierarchy, you can use it to create Cards containing certificates signed by the BoKS CA to allow users secure system access. The following are key concepts of BoKS CA management: CAs can be classified to determine what the certificates they issue can be used for in the BoKS environment. CAs and certificates are most often digitally signed by another CA to prove their legitimacy. The exception to this are self-signed CAs, which are not signed by another CA. Root CAs, the top CA in the chain, or hierarchy, are self-signed. When a CA issues a certificate, it signs the certificate with its private key. In this way, anyone with the CA's public key can always determine whether or not a certificate attributed to it is valid. Certificates can be revoked. The revocation status of certificates issued by a CA is controlled using Certificate Revocation Lists (CRLs). These are lists of revoked certificates maintained by the CA. Only certificates issued by that CA appear on the CRL. If a certificate does not appear on the appropriate CRL, it is considered valid. For third-party CA certificates, TFS BoKS Manager can be configured to download CRLs. Certificates have a pre-determined lifespan. When a CA root certificate becomes invalid, all certificates below it in the certificate chain automatically become invalid as well. Third-Party CAs and Certificates If your organization requires certificates that are trusted outside of the BoKS system, TFS BoKS Manager provides the option to use third-party CAs and certificates issued by these CAs instead of the BoKS CAs. You can import third-party CAs into TFS BoKS Manager and perform a number of operations on the CA, including: Defining one or more LDAP URL(s) for the CA from which to download CRLs Downloading CRLs from the CA manually Blocking the third-party CA and certificates issued by that CA from use within the BoKS domain Issuance, revocation, and renewal of third-party certificates must be performed using the third-party CA software. Automatic Trust Management One of the challenges of a PKI deployment is to manage trust. It is simple enough to add or remove intermediate and root CA certificates on a server, but in order to take advantage of trust management it is important to be able to push the list of trusted CA certificates on to individual users. TFS WorkstationControl handles automatic and transparent downloading of CA trust lists from TFS BoKS Manager to each TFS Desktop. If a CA certificate is added to the list of trusted certificates on the server, the trust will automatically be pushed to all client machines. The individual TFS Desktops will then automatically publish the trust list through Microsoft's standard interface. This means that all applications that rely on PKI authentication can use the CA certificates. Examples of such applications are clients and various encryption applications. If a CA certificate is removed from the trust list on the server, it will automatically be removed from TFS Desktop machines. Certificates for Kerberos Authentication In addition to BoKS and third-party certificates, the Credential Store can store the certificates required to allow users to log on to Windows 2000/XP clients running in a Windows 2000 domain using Kerberos certificate-based authentication. TFS WorkstationControl / 10

11 Pre-Existing User Certificates If your organization already has user certificates in place, TFS WorkstationControl protects this investment by providing the TFS Desktop PKCS #12 import utility. The utility can be used to import certificates and key pairs into the Credential Store. Netscape and Microsoft applications use the PKCS #12 file format as their credential import/export file format. For security reasons, TFS Desktop requires that the PKCS #12 files are password encrypted. Configurable Expiration Message This TFS Desktop feature allows administrators to define a warning message that displays a specified number of days before the expiration of the certificate that is used to authenticate the user. The message window can also be configured to contain a link to an enrollment web page. With this feature, administrators and users need not track certificate expiration information manually, and administrators are spared the task of communicating certificate expiration information to users individually. Configurable and Convenient Security Features Security Policies TFS Desktop provides convenient, easy-to-use configuration modules in which administrators can customize the solution's security features to enforce and support the security policies of the organization. The configurable policies are Password, Logon, and Certificate. Using Password policy settings, the administrator can define: Minimum password length and minimum number of digits it must contain Whether users can reuse the same password when changing passwords Whether users can unlock their own Credential Stores Whether the current password is entered automatically in the Change Password dialog box A TFS Desktop password management policy for managing users' Windows, network, and TFS Desktop passwords Using Logon policy settings, the administrator can define: Which users can log on to TFS Desktop based on information in the user certificate How many logon attempts users are allowed in logging on to TFS Desktop Logon permissions for administrator-defined user categories Whether a user can shut down his or her PC without logging on to TFS Desktop Whether users are automatically logged on offline or online depending on TFS BoKS Manager availability Whether users can create their own Extended Smart Cards Whether a specific user category is allowed to log a previous user off Whether a screen saver is integrated with the lock function Using Certificate policy settings, the administrator can define: The order of the prioritization criteria for selection of a logon certificate When to warn users that a certificate is about to expire A link to a CA enrollment screen, from which users can obtain new user certificates The administrator performs the above customizations on just one installation of the solution, which is called the reference installation. Once the administrator is satisfied with the configuration, he or she deploys that installation to users by means of Microsoft SMS or Active Directory. It is also possible to allow users to install the configuration file themselves by placing user machines in Elevated Privileges mode (Windows 2000/XP only). If the security policies of the organization change, the administrator can easily reconfigure and redeploy the security policy settings. TFS WorkstationControl / 11

12 Streamlined Logon Process TFS Desktop offers two intelligently designed features that streamline the logon process: Integrated Logon mode and Auto Logon. Integrated Logon mode When configured in Integrated Logon mode, TFS Desktop provides single sign-on to the user's TFS Desktop and primary network provider. The logon information is securely encrypted in the user's Credential Store. The first time the user logs on, the software detects that the primary logon information is not present inside the Credential Store. TFS Desktop prompts the user for this information and logs the user on to the network. The logon information is then stored securely inside the Credential Store and used for future logons by that user. If the user supplies inaccurate network authentication information, he or she is re-prompted for the correct information. Auto Logon In addition to storing network logon information, users can also store logon information for their various Windows applications using TFS Desktop's Auto Logon feature. Using the simple Learn Wizard utility, the user "teaches" Auto Logon the information it needs to log the user on to Windows applications without his or her intervention. As with the network logon information, Windows application logon data is stored securely in the Credential Store. When the software detects a user opening a Windows application, it fills in the logon dialog box with the appropriate information. The user does nothing except wait for the short interval it takes for the application to open. In addition to capturing logon information, Auto Logon allows users to view, edit, or delete the stored logon information. The Lock Function and Inactivity Protection A TFS Desktop-protected workstation is easily locked when a user steps away from his or her desk. Card users double-click the TFS Desktop icon in the Windows system tray. Smart Card and Extended Smart Card users simply remove the Smart Card from the reader. Once the system is locked, users must re-authenticate to gain access to the system. Although TFS Desktop does not include automatic inactivity protection, it can be configured to integrate a screen saver with the lock function. When the screen saver is activated, the user must re-authenticate to continue using the workstation. TFS WorkstationControl / 12

13 One System, Many Solutions TFS Technology achieves synergy between its different solutions because they are all part of the same standards-based system that protects critical applications while complying with enterprise-wide security policies. Its central component, TFS BoKS Manager, provides not only central administration, but also a central point of security information for other applications. A number of solutions are available in the system including UNIX administration, file encryption, secure messaging, directory synchronization, and many more. TFS currently offers subsets of these services as individual licenses. About TFS Technology TFS Technology is an international award-winning provider of solutions that simplify usage and administration of existing infrastructure while providing profound security for today's successful businesses. With solutions adopted in more than 1,000 organizations spanning 30 countries, TFS Technology leads the world in providing value-added products and services to the customer. The history of the company goes back to 1992 when the development work of the TFS product family was initiated within the TenFour organization. In 2001, TFS Technology was established as a separate entity focusing strictly on product development of security and connectivity solutions. In 2002, TFS acquired key management and file encryption products from RSA Security Inc., strategically positioning TFS as a comprehensive provider of e-security solutions. Today, TFS Technology's management team consists of the original inventors and developers of both successful product families, and is dedicated to continuing their strong product reputation of developing easy-to-use solutions. TFS Technology US Inc. info@tfstech.com TFS Technology Sweden AB info@tfstech.com TFS Technology UK Ltd. info@tfstech.com Copyright 2004 TFS Technology. All rights reserved. WCWP 03/04

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Lesson 3: Identifying Key Characteristics of Workgroups and Domains 1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users

More information

MU2b Authentication, Authorization and Accounting Questions Set 2

MU2b Authentication, Authorization and Accounting Questions Set 2 MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2

More information

SecuRemote for Windows 32-bit/64-bit

SecuRemote for Windows 32-bit/64-bit SecuRemote for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2 Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...

More information

MANAGING LOCAL AUTHENTICATION IN WINDOWS

MANAGING LOCAL AUTHENTICATION IN WINDOWS MANAGING LOCAL AUTHENTICATION IN WINDOWS Credentials Manager Windows OS has a set of tools that help remedy some of the authentication challenges. For example, the Credential Manager in Windows 7 and newer

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT ESCB-PKI REGISTRATION AUTHORITY APPLICATION MOST COMMON ERRORS VERSION 1.2 ECB-PUBLIC 15-November-2012 ESCB-PKI - Common errors v.1.2.docx Page 2 of 20

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Intel Security Drive Encryption 7.1.3

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Intel Security Drive Encryption 7.1.3 RSA SECURID ACCESS Authenticator Implementation Guide Intel Security Daniel R. Pintal, RSA Partner Engineering Last Modified: December 12, 2016 Solution Summary Intel Security/McAfee

More information

1 Hitachi ID Password Manager

1 Hitachi ID Password Manager 1 Hitachi ID Password Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Integrated credential management: Passwords, security questions, certificates, tokens, smart cards

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Intel Security/McAfee Endpoint Encryption

Intel Security/McAfee Endpoint Encryption RSA Ready Implementation Guide for RSA SecurID Last Modified: March 13, 2015 Partner Information Product Information Partner Name Intel Security formerly McAfee Web Site www.mcafee.com Product Name for

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

YubiKey Smart Card Deployment Guide

YubiKey Smart Card Deployment Guide YubiKey Smart Card Deployment Guide Best Practices and Basic Setup YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n Copyright 2017 Yubico Inc. All rights reserved. Trademarks

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

SSH Communications Tectia SSH

SSH Communications Tectia SSH Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: December 8, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product

More information

Single Secure Credential to Access Facilities and IT Resources

Single Secure Credential to Access Facilities and IT Resources Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access

More information

Table of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide

Table of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide 2 Wave Systems Corp. Client User Guide Table of Contents Overview... 3 What is the Trusted Drive Manager?... 3 Key Features of Trusted Drive Manager... 3 Getting Started... 4 Required Components... 4 Configure

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Version 8.0 Rev A User s Guide Copyright 2010 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

Secure single sign-on for cloud applications

Secure single sign-on for cloud applications Secure single sign-on for cloud applications Secure single sign-on for cloud applications Traditional on-premises tools used to rule the IT environments of most organizations, but now cloud applications

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION

Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION 1 TABLE OF CONTENTS VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS...1

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) YATANARPON TELEPORT COMPANY LTD., YATANARPON CERTIFICATION AUTHORITY USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) Yatanarpon Teleport Company Ltd., Hlaing Universities Campus, Hlaing Township,

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

white paper SMS Authentication: 10 Things to Know Before You Buy

white paper SMS Authentication: 10 Things to Know Before You Buy white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling

More information

Team Project Management

Team Project Management TEAM PROJECT MANAGEMENT 149 Team Project Management Tasks of the Project Administrator When working in teams, one person should be the designated administrator. Sets up the Project The project administrator

More information

Check Point GO R75. User Guide. 14 November Classification: [Public]

Check Point GO R75. User Guide. 14 November Classification: [Public] Check Point GO R75 User Guide 14 November 2011 Classification: [Public] 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

VMware Horizon Workspace Security Features WHITE PAPER

VMware Horizon Workspace Security Features WHITE PAPER VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon

More information

<Partner Name> RSA SECURID ACCESS Standard Agent Implementation Guide. WALLIX WAB Suite 5.0. <Partner Product>

<Partner Name> RSA SECURID ACCESS Standard Agent Implementation Guide. WALLIX WAB Suite 5.0. <Partner Product> RSA SECURID ACCESS Standard Agent Implementation Guide WALLIX Daniel R. Pintal, RSA Partner Engineering Last Modified: September 21, 2016 Solution Summary Acting as a single

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

Step-by-step installation guide for monitoring untrusted servers using Operations Manager Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside

More information

Pass4sure CASECURID01.70 Questions

Pass4sure CASECURID01.70 Questions Pass4sure.050-80-CASECURID01.70 Questions Number: 050-80-CASECURID01 Passing Score: 800 Time Limit: 120 min File Version: 4.8 http://www.gratisexam.com/ 050-80-CASECURID01 RSA SecurID Certified Administrator

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

CERN Certification Authority

CERN Certification Authority CERN Certification Authority Emmanuel Ormancey (IT/IS) What are Certificates? What are Certificates? Digital certificates are electronic credentials that are used to certify the identities of individuals,

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

keyon / PKCS#11 to MS-CAPI Bridge User Guide V2.4

keyon / PKCS#11 to MS-CAPI Bridge User Guide V2.4 / PKCS#11 to MS-CAPI Bridge V2.4 April 2017 Table of Contents Copyright 2017 by AG All rights reserved. No part of the contents of this manual may be reproduced or transmitted in any form or by any means

More information

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without

More information

Xceedium Xsuite. Secured by RSA Implementation Guide for 3rd Party PKI Applications. Partner Information. Last Modified: February 10 th, 2014

Xceedium Xsuite. Secured by RSA Implementation Guide for 3rd Party PKI Applications. Partner Information. Last Modified: February 10 th, 2014 Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: February 10 th, 2014 Partner Information Product Information Partner Name Xceedium Web Site www.xceedium.com Product Name

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Endpoint Protection with DigitalPersona Pro

Endpoint Protection with DigitalPersona Pro DigitalPersona Product Brief Endpoint Protection with DigitalPersona Pro An introductory technical overview to DigitalPersona s suite for Access Management, Data Protection and Secure Communication. April

More information

A Foxit Software Company White Paper

A Foxit Software Company White Paper A Foxit Software Company White Paper www.foxitsoftware.com Foxit Software Company, LLC. June 2009 TABLE OF CONTENTS Abstract... 3 Introduction... 4 The Need for Data Security Policies... 4 PDF in the Enterprise...

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2016 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

Authentication is not limited to the workstation logon but it supports also Remote Desktop, Shares, Hyper-V Sessions, etc.

Authentication is not limited to the workstation logon but it supports also Remote Desktop, Shares, Hyper-V Sessions, etc. Aloaha Smartlogin Aloaha Smartlogin allows you to logon to your windows machine with a Smart Card, PKCS #11 Token, USB Memory Stick or just a plain Memory Card such as I2c or Mifare. Authentication is

More information

Meeting the requirements of PCI DSS 3.2 standard to user authentication

Meeting the requirements of PCI DSS 3.2 standard to user authentication Meeting the requirements of PCI DSS 3.2 standard to user authentication Using the Indeed Identity products for authentication In April 2016, the new PCI DSS 3.2 version was adopted. Some of this version

More information

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2012 Equitrac Corporation Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List November 1, 2012

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

SC-3 USB Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved

SC-3 USB Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved SC-3 USB Token QUICK Reference Copyright 2007 CRYPTOCard Corporation All Rights Reserved 091807 http://www.cryptocard.com Table of Contents OVERVIEW... 1 OPERATING MODES & OPTIONS... 2 USING THE SC-3 USB

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services Smart Card Configuration Guide August 2018 (release 18.8) Centrify Corporation Legal Notice This document and the software described in this document are furnished under

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...

More information

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003 Credential Management in the Grid Security Infrastructure GlobusWorld Security Workshop January 16, 2003 Jim Basney jbasney@ncsa.uiuc.edu http://www.ncsa.uiuc.edu/~jbasney/ Credential Management Enrollment:

More information

RSA Exam 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam Version: 6.0 [ Total Questions: 140 ]

RSA Exam 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam Version: 6.0 [ Total Questions: 140 ] s@lm@n RSA Exam 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam Version: 6.0 [ Total Questions: 140 ] Question No : 1 An RSA SecurID tokencode is unique for each successful authentication

More information

MobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents

MobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents MobilePASS SOFTWARE AUTHENTICATION SOLUTIONS Security Features Contents Introduction... 2 Technical Features... 2 Security Features... 3 PIN Protection... 3 Seed Protection... 3 Security Mechanisms per

More information

McAfee File and Removable Media Protection Product Guide

McAfee File and Removable Media Protection Product Guide McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Managing and Maintaining Windows 8

Managing and Maintaining Windows 8 Managing and Maintaining Windows 8 Number: 070-688 Passing Score: 700 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ All questions are taken from demo PDF files at: - Test4Actual - PassFine

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Salesforce1 Mobile Security White Paper. Revised: April 2014

Salesforce1 Mobile Security White Paper. Revised: April 2014 Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing

More information

QUESTION: 1 An RSA SecurID tokencode is unique for each successful authentication because

QUESTION: 1 An RSA SecurID tokencode is unique for each successful authentication because 1 RSA - 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam QUESTION: 1 An RSA SecurID tokencode is unique for each successful authentication because A. a token periodically calculates a new

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

RSA Authentication Manager 7.1 Administrator s Guide

RSA Authentication Manager 7.1 Administrator s Guide RSA Authentication Manager 7.1 Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA

More information

Protected EAP (PEAP) Application Note

Protected EAP (PEAP) Application Note to users of Microsoft Windows 7: Cisco plug-in software modules such as EAP-FAST and PEAP are compatible with Windows 7. You do not need to upgrade these modules when you upgrade to Windows 7. This document

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

Two-factor Authentication: A Tokenless Approach

Two-factor Authentication: A Tokenless Approach Two-factor Authentication: A Tokenless Approach Multi-factor Authentication Layer v.3.2-010 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail:

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security RSA SECURID ACCESS Authenticator Implementation Guide Check Point SmartEndpoint Security Daniel R. Pintal, RSA Partner Engineering Last Modified: January 27, 2017 Solution

More information

Hitachi ID Password Manager Telephony Integration

Hitachi ID Password Manager Telephony Integration Hitachi ID Password Manager Telephony Integration 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................

More information

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016 ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Lotus Domino Security NSL, Web SSO, Notes ID vault. Collin Murray Program Director, Lotus Domino Product Management

Lotus Domino Security NSL, Web SSO, Notes ID vault. Collin Murray Program Director, Lotus Domino Product Management Lotus Domino Security NSL, Web SSO, Notes ID vault Collin Murray Program Director, Lotus Domino Product Management Challenge: Reduce Cost of Ownership IBM Lotus Notes and Domino have been providing a secure

More information

VMware Workspace ONE UEM Integration with Apple School Manager

VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation

More information

Sumy State University Department of Computer Science

Sumy State University Department of Computer Science Sumy State University Department of Computer Science Lecture 1 (part 2). Access control. What is access control? A cornerstone in the foundation of information security is controlling how resources are

More information

YubiKey Smart Card Deployment Guide

YubiKey Smart Card Deployment Guide YubiKey Smart Card Deployment Guide Best Practices and Basic Setup YubiKey 4 Series (YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano) YubiKey NEO Series (YubiKey NEO, YubiKey NEO-n) Last Updated:

More information

Designing and Managing a Windows Public Key Infrastructure

Designing and Managing a Windows Public Key Infrastructure Designing and Managing a Windows Public Key Infrastructure Key Data Course #: 2821A Number of Days: 4 Format: Instructor-Led Certification Track: Exam 70-214: Implementing and Managing Security in a Windows

More information

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0 NetIQ Advanced Authentication Framework - Client User's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 4 About This Document 4 NetIQ Advanced Authentication Framework Overview

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes Workspace ONE UEM v9.6 Have documentation feedback? Submit

More information

McAfee Endpoint Encryption

McAfee Endpoint Encryption Secured by RSA Implementation Guide for SecurID Authenticators Last Modified: December 4, 2013 Partner Information Product Information Partner Name McAfee Web Site www.mcafee.com Product Name (EEPC) Version

More information

Security Enterprise Identity Mapping

Security Enterprise Identity Mapping System i Security Enterprise Identity Mapping Version 6 Release 1 System i Security Enterprise Identity Mapping Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout

More information

Integrating Password Management with Enterprise Single Sign-On

Integrating Password Management with Enterprise Single Sign-On Integrating Password Management with Enterprise Single Sign-On 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Background: one problem, two solutions 2 2.1 The Problem.............................................

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control

More information

AUTHORIZED DOCUMENTATION

AUTHORIZED DOCUMENTATION Administration Guide AUTHORIZED DOCUMENTATION Novell SecureLogin 6.1 SP1 June, 2009 www.novell.com Novell SecureLogin 6.1 SP1 Administration Guide Legal Notices Novell, Inc. makes no representations or

More information

Independent DeltaV Domain Controller

Independent DeltaV Domain Controller Independent DeltaV Domain Controller The domain controller functionality can be de-coupled from the ProfessionalPLUS / Application stations in DeltaV systems version 14.3 and higher. Table of Contents

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the

More information

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n YubiKey Smart Card Minidriver User Guide Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n Copyright 2017 Yubico Inc. All rights reserved. Trademarks

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

User Authentication. Modified By: Dr. Ramzi Saifan

User Authentication. Modified By: Dr. Ramzi Saifan User Authentication Modified By: Dr. Ramzi Saifan Authentication Verifying the identity of another entity Computer authenticating to another computer Person authenticating to a local/remote computer Important

More information

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication White Paper The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication Table of contents Introduction... 2 Password protection alone is no longer enough...

More information

Integration Guide. SafeNet Authentication Client. Using SAC CBA for VMware Horizon 6 Client

Integration Guide. SafeNet Authentication Client. Using SAC CBA for VMware Horizon 6 Client SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document

More information

Aloaha Smartlogin allows you to logon to your windows machine with a Smart Card, PKCS #11 Token or USB Memory Stick.

Aloaha Smartlogin allows you to logon to your windows machine with a Smart Card, PKCS #11 Token or USB Memory Stick. Aloaha Smartlogin Aloaha Smartlogin allows you to logon to your windows machine with a Smart Card, PKCS #11 Token or USB Memory Stick. Aloaha even supports plain and simple cards such as MIFARE, I2C or

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu X.509 CPSC 457/557 10/17/13 Jeffrey Zhu 2 3 X.509 Outline X.509 Overview Certificate Lifecycle Alternative Certification Models 4 What is X.509? The most commonly used Public Key Infrastructure (PKI) on

More information

ms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm

ms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm Page 1 of 8 Active Directory Step-by-Step Guide to Mapping Certificates to User Accounts Introduction The Windows 2000 operating system provides a rich administrative model for managing user accounts.

More information