SlideShare une entreprise Scribd logo
1  sur  14
TA Review –  Authentication and Single Sign-On Utah Department of Technology Services March 2008
Introduction The Utah Master Directory (UMD) and related SiteMinder architecture was designed in 2001. There is a need to validate current practices against best practice industry solutions with an objective of wider adoption of the Single Sign-On (SSO) and related directory and access control infrastructure.
Types of Single Sign-on
Identity Access Mgmt Ecosystem
Current Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User Adoption ,[object Object],[object Object],[object Object]
Successful Features of UMD ,[object Object],[object Object],[object Object],[object Object],[object Object]
Obstacles that keep agencies from using UMD Services   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Help Desk Call Data for Password Resets and UMD Related Inquiries  Industry Average is abt 30% -  IT Security Journal 8.6% 8.7% 9.1% 8.8% 8.7% 7.6% % PW Resets 6,813 7,604 19,089 19,342 18,240 17,812 Total Tickets 588 662 1746 1708 1585 1354 Total 242 264 624 594 618 484 UMD  PW Reset 101 147 382 421 380 385 Mainframe PW Reset 245 251 740 693 587 485 Network/LAN PW Reset Feb ‘08 Jan ‘08 4 th  Q ‘07 3 rd  Q ‘07 2 nd  Q ‘07 1 st  Q ‘07
Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Industry Reports Forrester Gartner
Extending Enterprise ID Across the Web
Federal E-Authentication The E-Authentication Solution created the US E-Authentication Identity Federation which allows Federation members to recognize and trust log-in IDs that are issued by other trusted Federation members. The trusted members that issue these log-in IDs may be other government agencies, academic institutions, or commercial entities, such as banks or other financial services institutions. There is opportunity for Utah to participate in this initiative by establishing the UMD as a trusted entity.
Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

CMS BlueButton On FHIR - HIMSS17 Update
CMS BlueButton On FHIR - HIMSS17 UpdateCMS BlueButton On FHIR - HIMSS17 Update
CMS BlueButton On FHIR - HIMSS17 UpdateMark Scrimshire
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Napier University
 
[WSO2 Summit Americas 2020] Healthcare Interoperability Through FHIR® APIs.pdf
[WSO2 Summit Americas 2020] Healthcare Interoperability Through FHIR® APIs.pdf[WSO2 Summit Americas 2020] Healthcare Interoperability Through FHIR® APIs.pdf
[WSO2 Summit Americas 2020] Healthcare Interoperability Through FHIR® APIs.pdfWSO2
 
CloudHaven Pitch Deck
CloudHaven Pitch DeckCloudHaven Pitch Deck
CloudHaven Pitch DeckRichardVann4
 
ImtechSaasIDbroch7
ImtechSaasIDbroch7ImtechSaasIDbroch7
ImtechSaasIDbroch7Steve Tester
 
Integrating Native Mobile Apps into Institutional Ed-Tech Ecosystems
Integrating Native Mobile Apps into Institutional Ed-Tech EcosystemsIntegrating Native Mobile Apps into Institutional Ed-Tech Ecosystems
Integrating Native Mobile Apps into Institutional Ed-Tech EcosystemsChristian Glahn
 
Document Management System SharePoint
Document Management System SharePoint Document Management System SharePoint
Document Management System SharePoint i2econsulting
 
Access control policy
Access control policyAccess control policy
Access control policyBsmah Fahad
 
Information Technology and the Supply Chain
Information Technology and the Supply ChainInformation Technology and the Supply Chain
Information Technology and the Supply Chaingrimmj
 
Security operation-center
Security operation-centerSecurity operation-center
Security operation-centerbharti singhal
 
UNIWeb: assigning access to academic information
UNIWeb: assigning access to academic information UNIWeb: assigning access to academic information
UNIWeb: assigning access to academic information Proximify Public Relations
 

Tendances (15)

CMS BlueButton On FHIR - HIMSS17 Update
CMS BlueButton On FHIR - HIMSS17 UpdateCMS BlueButton On FHIR - HIMSS17 Update
CMS BlueButton On FHIR - HIMSS17 Update
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care
 
[WSO2 Summit Americas 2020] Healthcare Interoperability Through FHIR® APIs.pdf
[WSO2 Summit Americas 2020] Healthcare Interoperability Through FHIR® APIs.pdf[WSO2 Summit Americas 2020] Healthcare Interoperability Through FHIR® APIs.pdf
[WSO2 Summit Americas 2020] Healthcare Interoperability Through FHIR® APIs.pdf
 
CloudHaven Pitch Deck
CloudHaven Pitch DeckCloudHaven Pitch Deck
CloudHaven Pitch Deck
 
ImtechSaasIDbroch7
ImtechSaasIDbroch7ImtechSaasIDbroch7
ImtechSaasIDbroch7
 
Integrating Native Mobile Apps into Institutional Ed-Tech Ecosystems
Integrating Native Mobile Apps into Institutional Ed-Tech EcosystemsIntegrating Native Mobile Apps into Institutional Ed-Tech Ecosystems
Integrating Native Mobile Apps into Institutional Ed-Tech Ecosystems
 
Document Management System SharePoint
Document Management System SharePoint Document Management System SharePoint
Document Management System SharePoint
 
Access control policy
Access control policyAccess control policy
Access control policy
 
Aligning it
Aligning itAligning it
Aligning it
 
One page
One page One page
One page
 
Ijcet 06 10_002
Ijcet 06 10_002Ijcet 06 10_002
Ijcet 06 10_002
 
Information Technology and the Supply Chain
Information Technology and the Supply ChainInformation Technology and the Supply Chain
Information Technology and the Supply Chain
 
Security operation-center
Security operation-centerSecurity operation-center
Security operation-center
 
What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
 
UNIWeb: assigning access to academic information
UNIWeb: assigning access to academic information UNIWeb: assigning access to academic information
UNIWeb: assigning access to academic information
 

En vedette

Utah dot Gov - Site Architecture
Utah dot Gov - Site ArchitectureUtah dot Gov - Site Architecture
Utah dot Gov - Site Architectureiasaglobal
 
Digital Government Transforming the Citizen Experience
Digital Government Transforming the Citizen ExperienceDigital Government Transforming the Citizen Experience
Digital Government Transforming the Citizen ExperienceMassimiliano Claps
 
Ca site minder r12 professional study guide
Ca site minder r12 professional study guideCa site minder r12 professional study guide
Ca site minder r12 professional study guideNitish Nagar
 
Ca siteminder
Ca siteminderCa siteminder
Ca siteminderRoger Xia
 
Identity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsIdentity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsForgeRock
 
Digital Pioneers for Dugnadssamfunnet 2.0
Digital Pioneers for Dugnadssamfunnet 2.0Digital Pioneers for Dugnadssamfunnet 2.0
Digital Pioneers for Dugnadssamfunnet 2.0Kennisland
 
what professional job is like
what professional job is likewhat professional job is like
what professional job is likejefferyshiau
 
Mobile + Social: Show us the Money
Mobile + Social: Show us the MoneyMobile + Social: Show us the Money
Mobile + Social: Show us the MoneyVolker Hirsch
 
Milano Teatroetenori.Ppsbar
Milano Teatroetenori.PpsbarMilano Teatroetenori.Ppsbar
Milano Teatroetenori.Ppsbardanilobadaro
 
From MySpace to MySociety to MyDemocracy
From MySpace to MySociety to MyDemocracyFrom MySpace to MySociety to MyDemocracy
From MySpace to MySociety to MyDemocracyKennisland
 
2. ke toan tai san ngan han ke toan tien gui ngan hang
2. ke toan tai san ngan han   ke toan tien gui ngan hang2. ke toan tai san ngan han   ke toan tien gui ngan hang
2. ke toan tai san ngan han ke toan tien gui ngan hangPham Ngoc Quang
 

En vedette (20)

SiteMinder
SiteMinderSiteMinder
SiteMinder
 
Utah dot Gov - Site Architecture
Utah dot Gov - Site ArchitectureUtah dot Gov - Site Architecture
Utah dot Gov - Site Architecture
 
Digital Government Transforming the Citizen Experience
Digital Government Transforming the Citizen ExperienceDigital Government Transforming the Citizen Experience
Digital Government Transforming the Citizen Experience
 
Ca site minder r12 professional study guide
Ca site minder r12 professional study guideCa site minder r12 professional study guide
Ca site minder r12 professional study guide
 
Ca siteminder
Ca siteminderCa siteminder
Ca siteminder
 
Identity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsIdentity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management Systems
 
iPlanet presentation
iPlanet presentationiPlanet presentation
iPlanet presentation
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
 
Ing
IngIng
Ing
 
Digital Pioneers for Dugnadssamfunnet 2.0
Digital Pioneers for Dugnadssamfunnet 2.0Digital Pioneers for Dugnadssamfunnet 2.0
Digital Pioneers for Dugnadssamfunnet 2.0
 
what professional job is like
what professional job is likewhat professional job is like
what professional job is like
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Mobile + Social: Show us the Money
Mobile + Social: Show us the MoneyMobile + Social: Show us the Money
Mobile + Social: Show us the Money
 
Graphite for business users
Graphite for business usersGraphite for business users
Graphite for business users
 
He tieu hoa p6 (anh)
He tieu hoa p6 (anh)He tieu hoa p6 (anh)
He tieu hoa p6 (anh)
 
Tanet Thue Nha Thau 1 0
Tanet Thue Nha Thau 1 0Tanet Thue Nha Thau 1 0
Tanet Thue Nha Thau 1 0
 
Milano Teatroetenori.Ppsbar
Milano Teatroetenori.PpsbarMilano Teatroetenori.Ppsbar
Milano Teatroetenori.Ppsbar
 
Ets presentation 2012
Ets presentation 2012Ets presentation 2012
Ets presentation 2012
 
From MySpace to MySociety to MyDemocracy
From MySpace to MySociety to MyDemocracyFrom MySpace to MySociety to MyDemocracy
From MySpace to MySociety to MyDemocracy
 
2. ke toan tai san ngan han ke toan tien gui ngan hang
2. ke toan tai san ngan han   ke toan tien gui ngan hang2. ke toan tai san ngan han   ke toan tien gui ngan hang
2. ke toan tai san ngan han ke toan tien gui ngan hang
 

Similaire à Utah Architecture Review Single Sign-On

LOB Application: From Dream to production
LOB Application: From Dream to productionLOB Application: From Dream to production
LOB Application: From Dream to productionЮрий Чудинов
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
The 4th Generation Kingland platform
The 4th Generation Kingland platformThe 4th Generation Kingland platform
The 4th Generation Kingland platformKingland
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportResearchFox
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET Journal
 
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...BlueFish
 
Pradeepnsingh praveenkyadav-131008015758-phpapp02
Pradeepnsingh praveenkyadav-131008015758-phpapp02Pradeepnsingh praveenkyadav-131008015758-phpapp02
Pradeepnsingh praveenkyadav-131008015758-phpapp02PMI_IREP_TP
 
Pradeep n singh_praveenkyadav
Pradeep n singh_praveenkyadavPradeep n singh_praveenkyadav
Pradeep n singh_praveenkyadavPMI2011
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphVaticle
 
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...EC-Council
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET Journal
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...natjordan6
 
Investigation into Adoption Rates and Security Breaches in Cloud Computing In...
Investigation into Adoption Rates and Security Breaches in Cloud Computing In...Investigation into Adoption Rates and Security Breaches in Cloud Computing In...
Investigation into Adoption Rates and Security Breaches in Cloud Computing In...IRJET Journal
 
Machine Learning as a Service (MLaaS) Market PPT 2023: Size, Growth, Demand a...
Machine Learning as a Service (MLaaS) Market PPT 2023: Size, Growth, Demand a...Machine Learning as a Service (MLaaS) Market PPT 2023: Size, Growth, Demand a...
Machine Learning as a Service (MLaaS) Market PPT 2023: Size, Growth, Demand a...IMARC Group
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
IT Compliance Automation: Streamlining IT Compliance with Automation for Bett...
IT Compliance Automation: Streamlining IT Compliance with Automation for Bett...IT Compliance Automation: Streamlining IT Compliance with Automation for Bett...
IT Compliance Automation: Streamlining IT Compliance with Automation for Bett...AutomationEdge Technologies
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques IJECEIAES
 
Microservices Architecture Market by Product Type, Distribution Channel, End ...
Microservices Architecture Market by Product Type, Distribution Channel, End ...Microservices Architecture Market by Product Type, Distribution Channel, End ...
Microservices Architecture Market by Product Type, Distribution Channel, End ...IMARC Group
 

Similaire à Utah Architecture Review Single Sign-On (20)

LOB Application: From Dream to production
LOB Application: From Dream to productionLOB Application: From Dream to production
LOB Application: From Dream to production
 
Lob app-12012018
Lob app-12012018Lob app-12012018
Lob app-12012018
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
The 4th Generation Kingland platform
The 4th Generation Kingland platformThe 4th Generation Kingland platform
The 4th Generation Kingland platform
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
 
Pradeepnsingh praveenkyadav-131008015758-phpapp02
Pradeepnsingh praveenkyadav-131008015758-phpapp02Pradeepnsingh praveenkyadav-131008015758-phpapp02
Pradeepnsingh praveenkyadav-131008015758-phpapp02
 
Pradeep n singh_praveenkyadav
Pradeep n singh_praveenkyadavPradeep n singh_praveenkyadav
Pradeep n singh_praveenkyadav
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge Graph
 
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
 
Investigation into Adoption Rates and Security Breaches in Cloud Computing In...
Investigation into Adoption Rates and Security Breaches in Cloud Computing In...Investigation into Adoption Rates and Security Breaches in Cloud Computing In...
Investigation into Adoption Rates and Security Breaches in Cloud Computing In...
 
Machine Learning as a Service (MLaaS) Market PPT 2023: Size, Growth, Demand a...
Machine Learning as a Service (MLaaS) Market PPT 2023: Size, Growth, Demand a...Machine Learning as a Service (MLaaS) Market PPT 2023: Size, Growth, Demand a...
Machine Learning as a Service (MLaaS) Market PPT 2023: Size, Growth, Demand a...
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
IT Compliance Automation: Streamlining IT Compliance with Automation for Bett...
IT Compliance Automation: Streamlining IT Compliance with Automation for Bett...IT Compliance Automation: Streamlining IT Compliance with Automation for Bett...
IT Compliance Automation: Streamlining IT Compliance with Automation for Bett...
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 
Microservices Architecture Market by Product Type, Distribution Channel, End ...
Microservices Architecture Market by Product Type, Distribution Channel, End ...Microservices Architecture Market by Product Type, Distribution Channel, End ...
Microservices Architecture Market by Product Type, Distribution Channel, End ...
 

Plus de David Fletcher

Business continuity for information systems
Business continuity for information systemsBusiness continuity for information systems
Business continuity for information systemsDavid Fletcher
 
Business continuity for Information Systems
Business continuity for Information SystemsBusiness continuity for Information Systems
Business continuity for Information SystemsDavid Fletcher
 
Going Mobile In Government
Going Mobile In GovernmentGoing Mobile In Government
Going Mobile In GovernmentDavid Fletcher
 
Cloud Computing in Government
Cloud Computing in GovernmentCloud Computing in Government
Cloud Computing in GovernmentDavid Fletcher
 
Building A Better Website Governing 2008
Building A Better Website Governing 2008Building A Better Website Governing 2008
Building A Better Website Governing 2008David Fletcher
 
Ta Review Application Servers
Ta Review Application ServersTa Review Application Servers
Ta Review Application ServersDavid Fletcher
 
Ta Review: Application Servers
Ta Review: Application ServersTa Review: Application Servers
Ta Review: Application ServersDavid Fletcher
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange ModelDavid Fletcher
 
Tackling the Talent Challenge
Tackling the Talent ChallengeTackling the Talent Challenge
Tackling the Talent ChallengeDavid Fletcher
 

Plus de David Fletcher (14)

Business continuity for information systems
Business continuity for information systemsBusiness continuity for information systems
Business continuity for information systems
 
Business continuity for Information Systems
Business continuity for Information SystemsBusiness continuity for Information Systems
Business continuity for Information Systems
 
Going Mobile In Government
Going Mobile In GovernmentGoing Mobile In Government
Going Mobile In Government
 
Cloud Computing in Government
Cloud Computing in GovernmentCloud Computing in Government
Cloud Computing in Government
 
Going Mobile
Going MobileGoing Mobile
Going Mobile
 
Gobierno Digital
Gobierno DigitalGobierno Digital
Gobierno Digital
 
Building A Better Website Governing 2008
Building A Better Website Governing 2008Building A Better Website Governing 2008
Building A Better Website Governing 2008
 
Web 2.0 in Government
Web 2.0 in GovernmentWeb 2.0 in Government
Web 2.0 in Government
 
Ta Review Logging
Ta Review LoggingTa Review Logging
Ta Review Logging
 
Ta Review Application Servers
Ta Review Application ServersTa Review Application Servers
Ta Review Application Servers
 
Ta Review: Application Servers
Ta Review: Application ServersTa Review: Application Servers
Ta Review: Application Servers
 
Ta Review OES
Ta Review OESTa Review OES
Ta Review OES
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
 
Tackling the Talent Challenge
Tackling the Talent ChallengeTackling the Talent Challenge
Tackling the Talent Challenge
 

Dernier

原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyTyöeläkeyhtiö Elo
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfHenry Tapper
 
Ch 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingCh 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingAbdi118682
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfMichael Silva
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...Amil baba
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Sapana Sha
 

Dernier (20)

原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
 
Ch 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial AccountingCh 4 investment Intermediate financial Accounting
Ch 4 investment Intermediate financial Accounting
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
Stock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdfStock Market Brief Deck for "this does not happen often".pdf
Stock Market Brief Deck for "this does not happen often".pdf
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
 

Utah Architecture Review Single Sign-On

  • 1. TA Review – Authentication and Single Sign-On Utah Department of Technology Services March 2008
  • 2. Introduction The Utah Master Directory (UMD) and related SiteMinder architecture was designed in 2001. There is a need to validate current practices against best practice industry solutions with an objective of wider adoption of the Single Sign-On (SSO) and related directory and access control infrastructure.
  • 3. Types of Single Sign-on
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Help Desk Call Data for Password Resets and UMD Related Inquiries Industry Average is abt 30% - IT Security Journal 8.6% 8.7% 9.1% 8.8% 8.7% 7.6% % PW Resets 6,813 7,604 19,089 19,342 18,240 17,812 Total Tickets 588 662 1746 1708 1585 1354 Total 242 264 624 594 618 484 UMD PW Reset 101 147 382 421 380 385 Mainframe PW Reset 245 251 740 693 587 485 Network/LAN PW Reset Feb ‘08 Jan ‘08 4 th Q ‘07 3 rd Q ‘07 2 nd Q ‘07 1 st Q ‘07
  • 10.
  • 12. Extending Enterprise ID Across the Web
  • 13. Federal E-Authentication The E-Authentication Solution created the US E-Authentication Identity Federation which allows Federation members to recognize and trust log-in IDs that are issued by other trusted Federation members. The trusted members that issue these log-in IDs may be other government agencies, academic institutions, or commercial entities, such as banks or other financial services institutions. There is opportunity for Utah to participate in this initiative by establishing the UMD as a trusted entity.
  • 14.