Architecture Assessment Case Study. Single Sign on Approach Document PROBLEM: Technology for a Changing World

Similar documents
Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

Centrify for Dropbox Deployment Guide

Configuration Guide - Single-Sign On for OneDesk

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Qualys SAML 2.0 Single Sign-On (SSO) Technical Brief

Office 365 and Azure Active Directory Identities In-depth

OneLogin Integration User Guide

TECHNICAL GUIDE SSO SAML. At 360Learning, we don t make promises about technical solutions, we make commitments.

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Introduction to application management

esignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5

Two Factor Authentication

SAML-Based SSO Solution

Copyright

SSO Integration Overview

SAML-Based SSO Solution

ServiceNow Deployment Guide

Single Sign-On Showdown

Welcome to Adobe. This document will help you with initial account setup and password reset.

Udemy for Business SSO. Single Sign-On (SSO) capability for the UFB portal

Step-by-Step Guide to Ansur Executive 3.0 Installation With or without Electronic Signatures

Copyright

Contents. Multi-Factor Authentication Overview. Available MFA Factors

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

iosphone & Android App First Time Login Guide

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Azure MFA Integration with NetScaler

TECHNICAL GUIDE SSO SAML Azure AD

DDS Identity Federation Service

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1

Partner Center: Secure application model

Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode.

Entrust GetAccess 7.0 Technical Integration Brief for IBM WebSphere Portal 5.0

NextMD Patient Portal Guide

ArcGIS Server and Portal for ArcGIS An Introduction to Security

Double up on security for Active Directory and cloud app authentication

Cloud UC. Program Downloads I WOULD LIKE TO... DOWNLOADING THE CLIENT SOFTWARE

Entrust PartnerLink Login Instructions

All about SAML End-to-end Tableau and OKTA integration

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

Implementing Single-Sign-On(SSO) for APM UI

AD FS v3. Deployment Guide

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

Integrating the YuJa Enterprise Video Platform with Dell Cloud Access Manager (SAML)

BIDMC Multi-Factor Authentication Enrollment Guide Table of Contents

Enabling and Managing Office 365

13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3.

Mozy. Administrator Guide

Copyright

ESS Security Enhancements

Enterprise Access Gateway Management for Exostar s IAM Platform June 2018

ENABLING AND MANAGING OFFICE 365

goremote.carolinas.org

D9.2.2 AD FS via SAML2

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

Qualys SAML & Microsoft Active Directory Federation Services Integration

Best Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April,

VIEVU Solution AD Sync and ADFS Guide

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

Cloud Secure Integration with ADFS. Deployment Guide

Connect to Wireless, certificate install and setup Citrix Receiver

VMware Identity Manager Administration

Azure Multi-Factor Authentication. Technical Note

Infoblox Authenticated DHCP

Salesforce1 Mobile Security White Paper. Revised: April 2014

Microsoft MB Microsoft Dynamics CRM 2016 Installation. Download Full version :

Access Management Handbook

CA Adapter. CA Adapter Installation Guide for Windows 8.0

2. HDF AAI Meeting -- Demo Slides

Question No : 1 You install Microsoft Dynamics CRM on-premises. The Microsoft Dynamics CRM environment must have a Uniform Resource Locator (URL) that

Exostar Identity Access Platform (SAM) User Guide July 2018

Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10

Integrating YuJa Active Learning into ADFS via SAML

Using Your Own Authentication System with ArcGIS Online. Cameron Kroeker and Gary Lee

Client Fact Sheet. Personalized Concur Open

CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

CLI users are not listed on the Cisco Prime Collaboration User Management page.

Trusted Login Connector (Hosted SSO)

Secure single sign-on for cloud applications

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

Unified Contact Center Enterprise (UCCE) Single Sign On (SSO) Certificates and Configuration

NETOP PORTAL ADFS & AZURE AD INTEGRATION

Microsoft Official Curriculum Enabling and Managing Office 365 (5 Days - English) Programme détaillé

Yubico with Centrify for Mac - Deployment Guide

E X O S T A R, LLC D A T E : M AY V E R S I O N : 4.0

CA SSO Cloud-Enabled with SSO/Rest

Single Sign-On for PCF. User's Guide

DATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz

User Directories. Overview, Pros and Cons

Integrating the YuJa Enterprise Video Platform with ADFS (SAML)

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Quick Connection Guide

CLI users are not listed on the Cisco Prime Collaboration User Management page.

Multi-factor Authentication Instructions

Accessing Test Web Portal of the CTBTO

Connect to Wireless, certificate install and setup Citrix Receiver

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Exostar Identity Access Platform (SAM) User Guide September 2018

Transcription:

Technology for a Changing World Architecture Assessment Case Study Single Sign on Approach Document PROBLEM: Existing portal has Sign on Capabilities based on the SQL Server database and it s not having essential features to support both Internal and External user s authentication. Internal users are to be part of the client Active Directory and External Users needs a custom database. Apart from this, current mechanism has the following issues: Remembering multiple passwords for deferent applications. Administration overheads in terms of maintaining the large number of users (e.g., Provisioning, Deprovisioning, etc,). Too many set of applications of with deferent usernames and passwords.

TYPICAL PICTORIAL REPRESENTATION OF TO BE SOLUTION: SOLUTION: The objective of SSO is to allow users access to all applications with a single account. It provides a unified mechanism to manage the authentication of users and determine user access to applications and data. The principal functionalities of an SSO system are as follows: A limit of 1 account per user to control access to several applications or websites. User logs in once and gains access to all applications / websites without being prompted to log in again at each of them. Single Sign-off: a single action of signing out terminates access to multiple applications / websites. By default, each application will verify that the session managed by the SSO system is active before giving the user access to the requested pages. FUNCTIONAL ASPECTS OF THE SYSTEM: The main functionalities and technical components provided by SSO system are as follows: The objective of SSO is to allow users access to all applications with a single account. It provides a unified mechanism to manage the authentication of users and determine user access to applications and data. 1. A front-end that allows users to. 2. Identify themselves and to memorize all or a part of their credentials via a login window or web portal. 3. For Web SSO, the front-end will automatically redirect users that navigate between federated sites the user will immediately arrive at each new site having been correctly authenticated and secured, transparently and automatically. 4. A back-end that will manage the authentication and the user session. The system provides a centralized authentication server that all applications and websites use for authentication purposes. The user first authenticates to a trusted authentication authority - the SSO system - and is then granted access to all the applications trusting that authority. The SSO system preserves the state of the user for a period of time, so the user may repeatedly access the applications/ websites without needing to authenticate each time. PILOT INFRASTRUCTURE USED: Software: Windows Server 2008 Enterprise Sp2 Internet Information Services (IIS) 7.0 Microsoft.NET Framework 4.0

FLOW DIAGRAM Employee External Users Deployment Server Windows 2008 Single Sign On RMS Portal Management App x Utility App x Analytics App x TYPICAL SCENARIO: STEPS INVOLVED Identity Provider Relying Party (RP) 4. Verify token and allow access Security Service (STS) Account Store Account Store 2. Returns token 3. Passes token to application 1. Browser request token Browser / Client

Identity Provider Federated Provider Step 3 Step 4 Step 5 Step 6 Step 2 FP-STS Relying party Application Browser / Client Step 7 Step 1 Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: Step 7: User accesses the Relying Party Application. As user is not authenticated, Relying Party application forwards the user to its trusted Identity provider (here Federated Provider to get authenticated). Now the federated provider, itself is not an Identity Provider It relies on several other Identity Providers. So it gives a list of Identity Providers to the user to get authenticated. Now the user gets a list trusted Identity Provider and it selects an Identity provider (where it has an account) and authenticates itself. Once authenticated, a is issued for the user by the selected Identity provider and passed to the Federated Provider. Now as Federation provider trusts the Identity provider, it can understand the token. It first verifies the token and decrypts it if required. It verifies and reads the incoming token and issues a new token and transforms the Claims from Identity provider token using Claim rules (if any) to new token. The new (issued by FP) is passed to Application (Relying Party). And this token is forwarded to Relying Party. As relying party trusts the federated provider, it can understand the token and verifies it and once verification gets successful, it allows access to the application.

THE CLIENT: Our client, a health care major serves more than 50% of American hospitals, 20% of physicians and 100% of health plans, and as the largest pharmaceutical distributor in North America. INDUSTRY: Health care. BUSINESS NEED: Remove the complexity in main training and remembering username/password for deferent applications. Reduce the administrative over heads in maintaining more number of users. Ability to support internal and external user s authentication. SCINTEL SOLUTION: Delivered Single sign-on system (SSO) with a centralized server to handle authentication for all the applications and websites. BENEFITS: Growth and scalability. Increased Revenue. Simplified Administration.