Applying Identity to Secure Mobile Applications. Copyright 2012, Oracle and/or its affiliates. All rights reserved.
|
|
- Jasper Cox
- 5 years ago
- Views:
Transcription
1 Applying Identity to Secure Mobile Applications 1
2 This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates. 2
3 Custom Brittle P o i n t 2 P o i n t E x p e n s i v e Internal Users Only Maintenance Not Scaleable Legacy Proprietary C l i e n t S e r v e r Fragmentation Inflexible Slow VPN Based First Generation Integration Rigid Hard Coded Status Quo 3
4 MOBILE APPLICATION ACCESS TODAY Complex Development VPN Based Higher Power Consumption Multiple Authentications VPN DOES NOT SCALE 7
5 State-full Cross-network Lower Energy Usage Device Independent REST INTERFACES SIMPLIFIES MOBILE APPS 8
6 Corporate DMZ Corporate Network Mobile Browser Webgate OAM Protected Resource Oracle Access Manager API Gateway Native Application Mobile and Social Data Interfaces / Oracle Entitlements Server Directory Services 9
7 CONTEXT AWARE AUTHENTICATION Account Detail Device Aware! Location Aware!? Time Aware! Device Fingerprint 10
8 PATIENT RECORD xxx xx x PATIENT RECORD 11
9 Select Login Authorize 12
10 Name: REAL EXAMPLE CONNECTING COLLEGE TEST PREP STUDENTS College: Major: Minor: Graduation Date: or Login with Facebook Student Advisor: High School: Test Date: Submit 13
11 Blacklist Devices Better Experience Single Point of Revocation 14
12 MONITORING & REPORTING 15
13 Alerts Location Risk Access Trends Browser & OS statistics 16
14 REST OPTIMIZE COMMUNICATION SECURE LOGIN MONITOR ACCESS 17
15 Access Management Device Tracking Device Registration White\Black List Platform Security Services GPS & WIFI Location Mobile Interfaces KBA & OTP Directory Services User Registration White Pages 18
16 Facebook G a d g e t s u m b l r kedin Curation Mixi I nstagram Search Engine Optimization Advertisements Games Twitter Promotions G o o g l e + Pinterest U R L S h o r t e n e r s S o c i a l P u b l i s h i n g Social Marketing Renren 19
17 Facebook MySpace WordPress Yahoo! V e r i s i g n Pinterest Yahoo! Mixi I nstagram flikr G o o g l e M y O p e n I D AOL 20
18 Facebook G a d g e t s u m b l r kedin Curation Mixi I nstagram Search Engine Optimization Advertisements Games Twitter Promotions G o o g l e + Pinterest U R L S h o r t e n e r s S o c i a l P u b l i s h i n g Social Marketing Renren 21
19 Facebook Yahoo! MySpace Photobucket Twitter N e t f l i x Dropbox SmugMug Y a m m e r Evernote LinkedIn TripIt OpenSocial G o o g l e Vimeo 22
20 Mobile Identity SDK 23
21 OVERVIEW REST SSO Tokens IOS & ANDROID STANDARDS SUPPORT for faster application development to connect social, mobile & enterprise identity multiple services integrate 24
22 TWO OPTIONS BROWSER & NATIVE APP APP 2012, Oracle 25 and/or Copyright its affiliates. 2012, All rights Oracle reserved. and/or its affiliates. All rights reserved.
23 IDENTITY MOBILE Tokens Authentication CRUD Operations Custom Operations IDP Selector User Registration Session Creation Policy Lifecycle Web Access Identity Admin Directory Services External Authorization Adaptive Access 26
24 CAPABILITIES Access Manager token support native auth dialogs Mobile Social + Access Manager Mobile Social + Access Manager + OAAM Mobile & Social Only Mobile + Social + OAAM JWT Token Support Authn & AuthZ Device Fingerprinting Device Security checks during registration, access requests Advanced security checks including geo-location etc KBA + OTP Directory Server User Profile Support Relying 3 rd party supports IDPs(facebook, linkedin, twitter) 29
25 NATIVE 30
26 31
27 TRY IT YOURSELF 33
28 PACKAGE itunes Store: As part of ios Developer Program In-House Apps: Register for ios Developer Enterprise Program: Create an enterprise distribution provisioning profile that authorizes devices to use apps you ve signed. Build the app with the provisioning profile. Deploy the app to your users. for step by step guidance. 34
29 WE CAN HELP YOU GET STARTED SCHEDULE SCHEDULE A 35
30 Download Oracle IDM Mobile SDK Download and install OIC server from Download Oracle IDM Mobile SDK to a developer machine running MacOS 10.6.x or higher from Oracle IDM Mobile SDK for ios is available as static library libidmmobilesdk.a 37
31 Configuring Server Side Create a HelloWorld application profile using OIC Admin Console at Register HelloWorld App into the MobileServiceDomain Create a Test User in OAM repository using Weblogic Admin console at Watch demo viewlet : OIC configuration for HelloWorld Mobile App: 38
32 Writing the HelloWorld Application Download libidmmobilesdk.a and add it your Xcode Project Add linker flags -ObjC all_load to your project. Initialize Mobile SDK Start Authentication process with OIC Server Obtain SSO token from OIC Server Build, compile and link your project Watch Viewlet How to Build a HellOIC App in Xcode: 39
33 Initializing Oracle IDM Mobile SDK Initialize SDK with OIC server details, app name, and the delegate to which authentication details have to be passed: NSURL *url = [[NSURL alloc] initwithstring:@" NSString *appname = [[NSString alloc] initwithstring:@"dmvapp"]; NSString *domain = [[NSString alloc] initwithstring:@"sativenk-oam"]; OMMobileSecurityService *mss = [[OMMobileSecurityService alloc] initwithurl:url appname:appname domain:domain delegate:self]; 40
34 Starting the Authentication Process Presenting authentication view controller triggers the authentication process by prompting user to enter credentials If OIC server is configured to trigger Knowledge Based Authentication, SDK takes care of that as well. UINavigationController *nc = [self.mobileservices getauthenticationviewcontroller:nil error:&error]; //Present authentication view controller using presentmodalviewcontroller // method of your presenter view controller logincontroller.modalpresentationstyle = UIModalPresentationFormSheet; //This triggers the authentication process [presenterviewcontroller presentmodalviewcontroller:logincontroller animated:yes]; 41
35 Finishing Authentication with a SSO Token After the authentication process, your delegate s didfinishauthentication method is invoked Now you are all set to use your application s web service call using the token obtained from OIC server. (void) didfinishauthentication:(omauthenticationcontext *)context error:(nserror *) error { // This example gets authenticated user s attributes and presents it using User Profile Viewer OMUserRoleProfileService* ups = [mss userroleprofileservice]; OMUserManager *um = [ups getusermanager]; OMUser *user = [um searchuser:context.username attributes:nil shouldprefetch:no error:&error]; self.user = user; [detailpanecontroller showprofilebutton]; } 42
36 Download Sample Applications and Code Samples Visit 43
37 blogs.oracle.com/oracleidm 44
38 45
Mobile Device Management
Mobile Device Management David Roundtree, CISSP Identity & Security Public Sector State & Local Date: April 23, 2013 1 This document is for informational purposes. It is not a commitment to deliver any
More informationTHE NEW DIGITAL EXPERIENCE
steffo.weber@oracle.com maximilian.liesegang@esentri.com SECURING THE NEW DIGITAL EXPERIENCE Steffo Weber, Oracle & Max Liesegang, esentri Tuesday, 21-May-2013 Latest Entries Mobile & Social Apps Protecting
More information1z0-479 oracle. Number: 1z0-479 Passing Score: 800 Time Limit: 120 min.
1z0-479 oracle Number: 1z0-479 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 What is the role of a user data store in Oracle Identity Federation (OIF) 11g when it is configured as an Identity
More informationOracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive Upgrade
Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive Upgrade atul.goyal@oracle.com Principal Product Manager, Oracle Identity Governance This document is for informational
More informationOracle Identity and Access Management
Oracle Identity and Access Management AGENDA Overview Features Components Customizations APIs Oracle Identity Manager Connectors High Availability Concepts High Availability Architecture OVERVIEW Identity
More informationSAP Security in a Hybrid World. Kiran Kola
SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal
More informationOracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC
Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC Version 10.1.0.0 Documentation Part Number: E55027-01 June, 2014 Copyright 2009, 2014, Oracle and/or its affiliates.
More informationOracle Mobile and Social Access Management
An Oracle White Paper May 2013 Oracle Mobile and Social Access Management Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationFencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1
Fencing the Cloud with Identity Roger Casals Senior Director Product Management Shared vision for the Identity: Fencing the Cloud 1 Disclaimer Copyright 2014 Symantec Corporation. All rights reserved.
More informationCIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products
CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security
More informationIntroduction to Kony Fabric
Kony Fabric Introduction to Kony Fabric Release V8 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version stated on the Revision
More informationOctober Oracle Application Express Statement of Direction
October 2017 Oracle Application Express Statement of Direction Disclaimer This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle.
More informationUFED Cloud Analyzer. Traces and changes. February Version 6.0
UFED Cloud Analyzer Traces and changes February 2017 Version 6.0 Legal notices Copyright 2017 Cellebrite Mobile Synchronization Ltd. All rights reserved. This manual is delivered subject to the following
More informationAbout Configuring Oracle Access Manager
EnterpriseTrack OAM Configuration Guide 16 R1 June 2016 Contents About Configuring Oracle Access Manager... 5 Prerequisites... 5 Configuring Oracle HTTP Server WebGate... 5 Registering Agents for Oracle
More informationOracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge
Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge atul.goyal@oracle.com Principal Product Manager,
More informationServiceNow Deployment Guide
ServiceNow Deployment Guide (For Eureka release and forward) Okta Inc. 301 Brannan Street, 3 rd Floor San Francisco, CA, 94107 info@okta.com 1-888-722-7871 Contents Overview... 3 Active Directory Integration...
More informationOracle Adaptive Access Manager: Administration Student Guide
Oracle Adaptive Access Manager: Administration Student Guide D70569GC10 Edition 1.0 October 2008 D56328 Authors Steve Friedberg Shankar Raman Technical Contributors and Reviewers Philip Garm Steve Jackle
More informationSOFTWARE DEMONSTRATION
SOFTWARE DEMONSTRATION IDENTITY AND ACCESS MANAGEMENT SOFTWARE AND SERVICES RFP 644456 DEMONSTRATION AGENDA Executive Summary Technical Overview Break User Interfaces and Experience Multi-Campus and Inter-Campus
More informationAPI Signup Instructions
API Signup Instructions Pixabay The API Key for Pixabay is already included in the FotoPress plugin, so you don t need to do anything with it. Flickr 1. Flickr is also a part of Yahoo. If you already have
More informationHorizon Workspace Administrator's Guide
Horizon Workspace Administrator's Guide Horizon Workspace 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationOracle Responsys. Release 18B. New Feature Summary ORACLE
Oracle Responsys Release 18B New Feature Summary ORACLE TABLE OF CONTENTS Revision History 4 Overview 4 APIs 4 New Throttling Limits for Web Services APIs 4 New Asynchronous Web Services APIs 5 New REST
More informationRamnish Singh IT Advisor Microsoft Corporation Session Code:
Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing
More informationGuide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1
Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware
More informationAn Oracle White Paper December, 3 rd Oracle Metadata Management v New Features Overview
An Oracle White Paper December, 3 rd 2014 Oracle Metadata Management v12.1.3.0.1 Oracle Metadata Management version 12.1.3.0.1 - December, 3 rd 2014 Disclaimer This document is for informational purposes.
More informationKony MobileFabric Engagement Services QuickStart Guide
Kony MobileFabric (Building a Sample App - Android) Release 7.0 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version stated
More informationSet Up Rules Palette
Oracle Insurance Policy Administration Set Up Rules Palette Installation Instructions Step 3 Version 9.5.0.0 Documentation Part Number: E23638_01 June 2012 Copyright 2009, 2012 Oracle and/or its affiliates.
More informationGuide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1
Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSalesforce External Identity Implementation Guide
Salesforce External Identity Implementation Guide Salesforce, Winter 18 @salesforcedocs Last updated: December 20, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationLogin with Amazon. Customer Experience Overview for Android/Fire apps
Login with Amazon Customer Experience Overview for Android/Fire apps Customer Experience Overview for Android/Fire apps Copyright 2017 Amazon Services, LLC or its affiliates. All rights reserved. Amazon
More informationEveryonePrint MDM Integration Guide. AirWatch. EveryonePrint MDM Integration Guide AirWatch Page 1 of 22
EveryonePrint MDM Integration Guide AirWatch EveryonePrint MDM Integration Guide AirWatch 2016.01.27 Page 1 of 22 1. Introduction... 3 1.1 Printing options enabled with AirWatch integration... 3 2. Solution
More informationOracle Access Management 12c Frequently Asked Questions (FAQ)
Oracle Access Management 12c Frequently Asked Questions (FAQ) Overview Oracle Access Management is a complete solution designed to securely enable business transformation with mobile and social networking
More informationReportPlus Embedded. ReportPlus Embedded - ios SDK Guide 1.0
ReportPlus Embedded ios SDK Guide ReportPlus Embedded - ios SDK Guide 1.0 Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY EXPRESS REPRESENTATIONS OF WARRANTIES. IN ADDITION,
More informationOAM 2FA Value-Added Module (VAM) Deployment Guide
OAM 2FA Value-Added Module (VAM) Deployment Guide Copyright Information 2018. SecureAuth is a copyright of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products and solutions,
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationGETTING STARTED GUIDE. Mobile Admin. Version 8.2
GETTING STARTED GUIDE Mobile Admin Version 8.2 Last Updated: April 24, 2018 GETTING STARTED GUIDE: MOBILE ADMIN 2018 SolarWinds Worldwide, LLC. All rights reserved. This document may not be reproduced
More information5 OAuth EssEntiAls for APi AccEss control layer7.com
5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the
More informationIntroduction to application management
Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to
More informationSAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue
More informationGuide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE
Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationMigration Best Practices for Oracle Access Manager 10gR3 deployments O R A C L E W H I T E P A P E R M A R C H 2015
Migration Best Practices for Oracle Access Manager 10gR3 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is
More informationCentrify for Dropbox Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of
More informationSalesforce External Identity Implementation Guide
Salesforce External Identity Implementation Guide Salesforce, Summer 17 @salesforcedocs Last updated: September 28, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationOracle Access Manager Integration Oracle FLEXCUBE Payments Release [Feb] [2018]
Oracle Access Manager Integration Oracle FLEXCUBE Payments Release 14.0.0.0.0 [Feb] [2018] Table of Contents Oracle Access Manager Integration 1. PREFACE... 1-1 1.1 INTRODUCTION... 1-1 1.2 AUDIENCE...
More informationCOMPONENTS/PRODUCTS IN OIM
info@tutionbooks.com COMPONENTS/PRODUCTS IN OIM 11.1.2.3 www.tutionbooks.com Products/Components in OIM 11.1.2.3 1. Database 12.1.0.2 and Listener 2. RCU 11.1.1.9 3. Weblogic 10.3.6 with JDK 1.7 Update
More informationAccess Management Handbook
Access Management Handbook Contents An Introduction 3 Glossary of Access Management Terms 4 Identity and Access Management (IAM) 4 Access Management 5 IDaaS 6 Identity Governance and Administration (IGA)
More information5 OAuth Essentials for API Access Control
5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows
More informationCONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE
GUIDE FEBRUARY 2019 PRINTED 26 FEBRUARY 2019 CONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE Table of Contents Overview Introduction Purpose Audience
More informationIntroduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...
Oracle Access Manager Configuration Guide for On-Premises Version 17 October 2017 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing
More informationApplication Container Cloud
APPLICATION CONTAINER CLOUD Application Container Cloud with Java SE and Node The Best Java SE and Node Cloud. Get the choice of either Oracle Java SE Advanced, including Flight Recorder for production
More informationDeveloping Cross Device Mobile Applications
Developing Cross Device Mobile Applications Dana Singleterry - http://blogs.oracle.com/dana Twitter - @dsingleterry Principal Product Manager, Oracle Development Tools 2 Copyright 2012, Oracle and/or its
More informationUsing Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide
Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure Deployment Guide v1.0 May 2018 Introduction This document describes how to set up Pulse Connect Secure for SP-initiated
More informationSSO Integration Overview
SSO Integration Overview 2006-2014 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 7.2 June, 2014 Ping Identity Corporation 1001 17th Street, Suite 100 Denver,
More informationEnhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation
Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of
More informationPrivacy Policy. Last updated: May 11, 2018
Last updated: May 11, 2018 Privacy Policy This Privacy Policy explains how FraudScore and its affiliates (" FraudScore ", "we", "us", or "our") collects, uses, discloses and transfers the personal information
More informationMozy. Administrator Guide
Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license
More informationKony MobileFabric. Release Notes. On-Premises. Release 6.5. Document Relevance and Accuracy
Kony MobileFabric Release Notes On-Premises Release 6.5 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version stated on
More informationOracle Access Manager 10g - Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 Oracle Access Manager 10g - Oracle Enterprise Gateway Integration Guide 1/26 Disclaimer The following is intended to outline our general product direction. It is intended
More informationAdministering Jive Mobile Apps for ios and Android
Administering Jive Mobile Apps for ios and Android TOC 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios...3 Custom App Wrapping for ios...3 Authentication with Mobile
More informationUser Management. Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, September 25 th 2017
User Management Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, September 25 th 2017 Agenda Introduction User Management Federation Objectives 1 Introduction NextGEOSS High-Level Architecture DataHub harvest
More informationOracle 1Z Oracle Access Management Suite Plus 11g Essentials. Download Full version :
Oracle 1Z0-479 Oracle Access Management Suite Plus 11g Essentials Download Full version : http://killexams.com/pass4sure/exam-detail/1z0-479 Interface. Answer: A QUESTION: 61 Identify two protocols that
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More informationHow to use or not use the AWS API Gateway for Microservices
How to use or not use the AWS API Gateway for Microservices Presented by Dr. Martin Merck Wednesday 26 September 2018 What is an API Gateway Traits AWS API Gateway Features of API gateway OAuth2.0 Agenda
More informationDefending Against a Dangerous New World
Defending Against a Dangerous New World Jeff Scheidel Security Architect 1 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Reference Architecture 2 Copyright 2013, Oracle and/or its
More informationComodo Endpoint Manager Software Version 6.25
Comodo Endpoint Manager Software Version 6.25 End User Guide Guide Version 6.25.121918 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Endpoint Manager...3
More informationCA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5
CA SiteMinder Federation Manager Guide: Legacy Federation r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationEric Sachs Director of Product Management Identity, Google. Pam Dingle Senior Technical Architect Office of the CTO, Ping Identity
SESSION ID: IDY-R05R Identity Standards at Work in Google's Mobile-Focused Future Eric Sachs Director of Product Management Identity, Google Pam Dingle Senior Technical Architect Office of the CTO, Ping
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Developing Mobile Applications for ios and Android the Oracle Way Frédéric Desbiens Principal Product Manager Application Development
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationCertification Exam Guide SALESFORCE CERTIFIED IDENTITY AND ACCESS MANAGEMENT DESIGNER. Winter Salesforce.com, inc. All rights reserved.
Certification Exam Guide SALESFORCE CERTIFIED IDENTITY AND ACCESS MANAGEMENT DESIGNER Winter 18 2017 Salesforce.com, inc. All rights reserved. S ALESFORCE CERTIFIED IDENTITY AND ACCESS MANAGEMENT DESIGNER
More informationProf. Christos Xenakis
From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering
More informationMOBILE CLOUD SERVICE. Build Your Mobile Strategy Not Just Your Mobile Apps
MOBILE CLOUD SERVICE Build Your Mobile Strategy Not Just Your Mobile What is It? Oracle Mobile Cloud Service provides everything you need to build out your enterprise mobile strategy using innovative,
More informationProf. Christos Xenakis
From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis SAINT Workshop
More informationOffice 365 and Azure Active Directory Identities In-depth
Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication
More informationLiferay Security Features Overview. How Liferay Approaches Security
Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................
More informationAPI Manager Version May User Guide
API Manager Version 7.5.3 8 May 2018 User Guide Copyright 2018 Axway All rights reserved. This documentation describes the following Axway software: Axway API Manager 7.5.3 No part of this publication
More informationOracle Utilities Customer Self Service
Oracle Utilities Customer Self Service Whitepaper: Creating and Deploying the Sample Mobile Client Application Release 2.1.0 Service Pack 2 E38172-07 October 2015 Oracle Utilities Customer Self Service
More informationOracle Utilities Customer Self Service
Oracle Utilities Customer Self Service Whitepaper: Creating and Deploying the Sample Mobile Client Application Release 2.1.0 Service Pack 1 E38172-05 June 2014 Oracle Utilities Customer Self Service Whitepaper:
More informationSalesforce External Identity Implementation Guide
Salesforce External Identity Implementation Guide Salesforce, Spring 17 @salesforcedocs Last updated: March 11, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationApril Understanding Federated Single Sign-On (SSO) Process
April 2013 Understanding Federated Single Sign-On (SSO) Process Understanding Federated Single Sign-On Process (SSO) Disclaimer The following is intended to outline our general product direction. It is
More informationRSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013
Ping Identity RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 13, 2013 Product Information Partner Name Ping Identity Web Site www.pingidentity.com Product Name PingFederate
More informationSupported 3rd Party Authentication Providers for Odyssys
Supported 3rd Party Authentication Providers for Odyssys 1. Introduction... 3 1.1 Authentication Provider Menu... 3 1.2 Gateway Configuration... 4 2. Google+/Google Apps... 4 2.1 Prerequisites... 4 2.2
More informationIntegrating YuJa Active Learning into Google Apps via SAML
Integrating YuJa Active Learning into Google Apps via SAML 1. Overview This document is intended to guide users on how to integrate YuJa as a Service Provider (SP) using Google as the Identity Provider
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAAM2291BE Securing Access and Protecting Information in Office 365 with Workspace ONE Camilo Lotero Senior Technical Marketing Manager Adarsh Kesari Senior Systems Engineer #VMworld #SAAM2291BE Disclaimer
More informationBenefits of an Exclusive Multimaster Deployment of Oracle Directory Server Enterprise Edition
An Oracle White Paper February 2012 Benefits of an Exclusive Multimaster Deployment of Oracle Directory Server Enterprise Edition Disclaimer The following is intended to outline our general product direction.
More informationCloud Secure Integration with ADFS. Deployment Guide
Cloud Secure Integration with ADFS Deployment Guide Product Release 8.3R3 Document Revisions 1.0 Published Date October 2017 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose CA 95134 http://www.pulsesecure.net
More informationCA SiteMinder Federation
CA SiteMinder Federation Legacy Federation Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationAdministering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Custom App Wrapping for ios... 4 Native App Caching: Android...4 Native App
More informationAuthentication in the Cloud. Stefan Seelmann
Authentication in the Cloud Stefan Seelmann Agenda Use Cases View Points Existing Solutions Upcoming Solutions Use Cases End user needs login to a site or service End user wants to share access to resources
More informationComodo Endpoint Manager Software Version 6.25
Comodo Endpoint Manager Software Version 6.25 End User Guide Guide Version 6.25.012219 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Endpoint Manager...3
More informationComodo Endpoint Manager Software Version 6.26
Comodo Endpoint Manager Software Version 6.26 End User Guide Guide Version 6.26.021819 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Endpoint Manager...3
More informationIntegrating AirWatch and VMware Identity Manager
Integrating AirWatch and VMware Identity Manager VMware AirWatch 9.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationForeScout Extended Module for MaaS360
Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationInside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1
Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to
More informationGrandstream Networks, Inc. Captive Portal Authentication via Twitter
Grandstream Networks, Inc. Table of Content SUPPORTED DEVICES... 4 INTRODUCTION... 5 CAPTIVE PORTAL SETTINGS... 6 Policy Configuration Page... 6 Landing Page Redirection... 8 Pre-Authentication Rules...
More informationReportPlus Embedded Web SDK Guide
ReportPlus Embedded Web SDK Guide ReportPlus Web Embedding Guide 1.4 Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY EXPRESS REPRESENTATIONS OF WARRANTIES. IN ADDITION,
More informationFX RFID READER SERIES Embedded SDK Sample Application
FX RFID READER SERIES Embedded SDK Sample Application User Guide MN000539A01 FX RFID READER SERIES EMBEDDED SDK SAMPLE APPLICATIONS USER GUIDE MN000539A01 Revision A December 2017 Copyright 2017 ZIH Corp.
More informationThis document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release,
More informationIBM Datacap Mobile SDK Developer s Guide
IBM Datacap Mobile SDK Developer s Guide Contents Versions... 2 Overview... 2 ios... 3 Package overview... 3 SDK details... 3 Prerequisites... 3 Getting started with the SDK... 4 FAQ... 5 Android... 6
More informationOVERVIEW... 3 WHAT'S NEW... 3 COMPATIBILITY WITH MDM PRODUCTS... 5 CONFIGURE AN MDM MANAGED VPN PROFILE FOR CITRIX SSO... 5
Citrix SSO Contents OVERVIEW... 3 WHAT'S NEW... 3 COMPATIBILITY WITH MDM PRODUCTS... 5 CONFIGURE AN MDM MANAGED VPN PROFILE FOR CITRIX SSO... 5 Device level VPN Profiles... 5 Per-App VPN Profiles... 7
More informationOracle Banking Enterprise Collections Release Notes Release
Oracle Banking Enterprise Collections Release Notes Release 2.6.2.0.0 E95191-01 May 2018 Oracle Banking Enterprise Collections Release Notes, Release 2.6.2.0.0 E95191-01 Copyright 2017, 2018, Oracle and/or
More information