SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
1 Authentication Management
Managing the User Lifecycle
Across On-Premises and
Cloud-Hosted Applications
The evolution of password management beyond password synchronization and reset.
2 In the beginning...
• Password management products mostly started out doing just two simple things:
– Password synchronization.
– Self-service password reset.
• Integrations were relatively simple:
– Windows NT / Novell NetWare / Sun LDAP.
– Maybe a database or two.
• The user interface was simple:
– Web browser.
– Easy as 1 ... 2 ... 3:
* Sign in with a login ID.
* Type your password or answer a few questions.
* Choose a new password.
• This is so simple, any summer student could write one.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 1
Slide Presentation
3 But then things got complicated
• Users forget their primary password
– Catch 22: can’t login, so can’t open a browser, so can’t SSPR, so can’t login.
• Companies deployed lots of applications.
– 100 SAP servers?
– 10 mainframes?
– 1000 Unix boxes?
– 1000 databases?
• Enterprises started using this stuff, globally.
• Password management grew to meet these requirements:
– GINA DLLs – SSPR for locked out users.
– Lots of connectors – synch and reset app passwords.
– Translation / localization was added.
• This is not a summer student project any more!
4 Complexity keeps growing
Mobile workforce • Users need access to SSPR from anywhere, even before they
establish a VPN connection.
Global network • There may be hundreds of AD DCs.
• Users can’t wait for changes made at one site to affect their
account at another.
Smart cards and tokens • Users forget their PINs and need to reset those too.
Smart phones • These have passwords too.
• Should be both supported and leveraged.
Full disk encryption • Every security-conscious organization is deploying it and feels
the pain of key-recovery.
Integrate with IDM • Provision a user – and don’t wait before he can do SSPR.
• Authenticate before launching a federated connection (SAML,
WS*, Shibboleth).
© 2015 Hitachi ID Systems, Inc. All rights reserved. 2
Slide Presentation
5 It’s not just passwords any more
Users need to manage more authentication factors today:
• Passwords – likely will never go away.
• Smart cards – unlocked with a PIN.
• Token PINs – unlocked with a PIN or password.
• Hard disk encryption – must type a password before the OS will boot.
• PKI certificates – unlocked by a password or PIN.
• Voice or other biometrics – need to be enrolled.
• Security questions – first enrolled and periodically refreshed.
• Cell phone number/provider – can act as another authentication factor.
6 Many valid use cases
Self-service and enrollment basically mean that a user signs in with one authentication factor before
updating another:
Use case: Login with: To do this:
Password synch • Current password. • Choose a new password.
Self-service • Security questions.
• Smart card or token.
• Cell phone (random PIN via
SMS).
• Biometric.
• Choose a new password.
• Reset token PIN.
• Reset smart card PIN. HDD
key recovery.
Enrollment • Current password.
• Smart card or token.
• Fill in security questions.
• Provide voice print.
• Register cell phone.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 3
Slide Presentation
7 Small, one-platform solutions
• Many vendors are creating "silo" solutions to streamline support for their own products.
• Examples:
– RSA: including self-service PIN reset with token system.
– McAfee: including self-service HDD key recovery with SafeBoot.
– Smart card vendors: getting into PIN reset too.
– Quest, Namescape, many IVR vendors and some help desk vendors and probably many others
make AD-only SSPR systems.
• The whole point of identity management systems is to eliminate "security in a silo" solutions!
• Enterprises don’t want users to enroll 3 or 4 different profiles of security questions, or to support
multiple infrastructures.
• What’s needed is a consolidated, enterprise-class system to manage all authentication
factors.
8 Enterprises should demand better
• A single system to manage all authentication factors.
• Integrations with all of their major systems and applications.
• Support for mobile users – SSPR, cached credentials, etc.
• Integration with user provisioning, for "instant-on" capability.
• Integration with federation/WebSSO, for "login here, access app there" capability.
• Support for smart card PIN reset (note: this can never be done via a telephone).
• Support for token PIN reset.
• Support for hard drive key recovery.
• Support for collecting old and distributing new PKI certificates.
• Many authentication options: passwords, security questions, tokens, smart cards, biometrics, cell
phones.
• Many enrollment options: security questions, biometrics, phones.
• This is much more than just SSPR!
• This is AUTHENTICATION MANAGEMENT.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 4
Slide Presentation
9 Authentication management technology
• SSPR:
– Web UI (of course).
– GINA DLL (for 40% of issues that are Windows lockouts).
– GINA Service (same as GINA DLL but without the risk).
– Windows 7 Credential Provider (new PCs need this).
– Telephone / IVR (for mobile users and orgs that prefer the phone).
– Secure Kiosk Account (to avoid client software deployment).
• Self-service, non-password:
– Smart card PIN reset (must be done using ActiveX in browser).
– Token card PIN reset (at least for RSA).
– PKI certificate management (at least for Lotus Notes).
– HDD key recovery (becoming urgent for many customers).
• Mobile users:
– UI should work in a small browser (phone).
– Manage Blackberry passwords.
– SSPR for mobile users over temporary VPN.
– Update cached passwords on Windows after a PW change.
10 User adoption
• Most of these processes depend on user cooperation:
– Enrollment: typically to populate answers to security questions.
– Self-service: rather than calling the help desk.
• Users will not volunteer to do either.
• To get user adoption, we need a combination of things:
– Frequent reminders.
– Accessible UI (e.g., available when needed).
– Hard to miss UI (e.g., access from login prompt, portal, etc.).
– User friendly UI (e.g., no training required).
– A carrot (e.g., synchronized passwords; dinner for 2).
– A stick (e.g., slow response if you call the help desk).
• It helps if some of these things are built right into the authentication management product.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 5
Slide Presentation
11 Hitachi ID Password Manager
HiPM is the only product on the market that meets all of the requirements of enterprise authentication
management.
• Authenticate with and manage any
factor:
– Passwords
– Token and smart card PINs
– Security questions
– Cell phone / SMS PIN
– Voice biometrics
• Smart card PIN resets is via ActiveX.
• HDD key recovery is via telephone.
• Managed user enrollment is built-in.
• Access from anywhere:
– Web browser (any)
– Smart phone (any).
– Locked out workstation (GINA
service, SKA).
– Mobile laptop (temporary VPN).
– Voice phone (IVR).
12 Services Engagements
• Some of these features are complicated to setup.
• Just as "authentication management" is more powerful than "password management," these projects
are going to be longer.
• Examples:
– SSPR for mobile users – need to integrate with and customize temporary VPN connection.
– Smart card PIN reset – need to integrate with one-off card management system and with
whatever card readers and cards have been deployed.
– HDD key recovery – needs IVR plus key recovery server integration.
• Expect 30+ day deployments, even if there are just 2-3 integrations.
www.Hitachi-ID.com
500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com
Date: May 22, 2015 File: PRCS:pres

Contenu connexe

Tendances

Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
Hitachi ID Systems, Inc.
 
ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013
Aurangzeb Mufti
 

Tendances (18)

Biometric Products By WYSE Biometric System
Biometric Products By WYSE Biometric SystemBiometric Products By WYSE Biometric System
Biometric Products By WYSE Biometric System
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
 
VBOT
VBOTVBOT
VBOT
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
The changing computer for small biz
The changing computer for small bizThe changing computer for small biz
The changing computer for small biz
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solution
 
ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PE
 
Building Your Business Continuity Plan
Building Your Business Continuity PlanBuilding Your Business Continuity Plan
Building Your Business Continuity Plan
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013
 
Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"
 
Insights into your IT Service Management - Middle East
Insights into your IT Service Management - Middle EastInsights into your IT Service Management - Middle East
Insights into your IT Service Management - Middle East
 
ACTAtek 3 Introduction
ACTAtek 3 IntroductionACTAtek 3 Introduction
ACTAtek 3 Introduction
 

Similaire à Authentication Management

Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
Hitachi ID Systems, Inc.
 

Similaire à Authentication Management (20)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptx
 

Plus de Hitachi ID Systems, Inc.

Plus de Hitachi ID Systems, Inc. (15)

Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
 

Dernier

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Dernier (20)

How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 

Authentication Management

  • 1. 1 Authentication Management Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications The evolution of password management beyond password synchronization and reset. 2 In the beginning... • Password management products mostly started out doing just two simple things: – Password synchronization. – Self-service password reset. • Integrations were relatively simple: – Windows NT / Novell NetWare / Sun LDAP. – Maybe a database or two. • The user interface was simple: – Web browser. – Easy as 1 ... 2 ... 3: * Sign in with a login ID. * Type your password or answer a few questions. * Choose a new password. • This is so simple, any summer student could write one. © 2015 Hitachi ID Systems, Inc. All rights reserved. 1
  • 2. Slide Presentation 3 But then things got complicated • Users forget their primary password – Catch 22: can’t login, so can’t open a browser, so can’t SSPR, so can’t login. • Companies deployed lots of applications. – 100 SAP servers? – 10 mainframes? – 1000 Unix boxes? – 1000 databases? • Enterprises started using this stuff, globally. • Password management grew to meet these requirements: – GINA DLLs – SSPR for locked out users. – Lots of connectors – synch and reset app passwords. – Translation / localization was added. • This is not a summer student project any more! 4 Complexity keeps growing Mobile workforce • Users need access to SSPR from anywhere, even before they establish a VPN connection. Global network • There may be hundreds of AD DCs. • Users can’t wait for changes made at one site to affect their account at another. Smart cards and tokens • Users forget their PINs and need to reset those too. Smart phones • These have passwords too. • Should be both supported and leveraged. Full disk encryption • Every security-conscious organization is deploying it and feels the pain of key-recovery. Integrate with IDM • Provision a user – and don’t wait before he can do SSPR. • Authenticate before launching a federated connection (SAML, WS*, Shibboleth). © 2015 Hitachi ID Systems, Inc. All rights reserved. 2
  • 3. Slide Presentation 5 It’s not just passwords any more Users need to manage more authentication factors today: • Passwords – likely will never go away. • Smart cards – unlocked with a PIN. • Token PINs – unlocked with a PIN or password. • Hard disk encryption – must type a password before the OS will boot. • PKI certificates – unlocked by a password or PIN. • Voice or other biometrics – need to be enrolled. • Security questions – first enrolled and periodically refreshed. • Cell phone number/provider – can act as another authentication factor. 6 Many valid use cases Self-service and enrollment basically mean that a user signs in with one authentication factor before updating another: Use case: Login with: To do this: Password synch • Current password. • Choose a new password. Self-service • Security questions. • Smart card or token. • Cell phone (random PIN via SMS). • Biometric. • Choose a new password. • Reset token PIN. • Reset smart card PIN. HDD key recovery. Enrollment • Current password. • Smart card or token. • Fill in security questions. • Provide voice print. • Register cell phone. © 2015 Hitachi ID Systems, Inc. All rights reserved. 3
  • 4. Slide Presentation 7 Small, one-platform solutions • Many vendors are creating "silo" solutions to streamline support for their own products. • Examples: – RSA: including self-service PIN reset with token system. – McAfee: including self-service HDD key recovery with SafeBoot. – Smart card vendors: getting into PIN reset too. – Quest, Namescape, many IVR vendors and some help desk vendors and probably many others make AD-only SSPR systems. • The whole point of identity management systems is to eliminate "security in a silo" solutions! • Enterprises don’t want users to enroll 3 or 4 different profiles of security questions, or to support multiple infrastructures. • What’s needed is a consolidated, enterprise-class system to manage all authentication factors. 8 Enterprises should demand better • A single system to manage all authentication factors. • Integrations with all of their major systems and applications. • Support for mobile users – SSPR, cached credentials, etc. • Integration with user provisioning, for "instant-on" capability. • Integration with federation/WebSSO, for "login here, access app there" capability. • Support for smart card PIN reset (note: this can never be done via a telephone). • Support for token PIN reset. • Support for hard drive key recovery. • Support for collecting old and distributing new PKI certificates. • Many authentication options: passwords, security questions, tokens, smart cards, biometrics, cell phones. • Many enrollment options: security questions, biometrics, phones. • This is much more than just SSPR! • This is AUTHENTICATION MANAGEMENT. © 2015 Hitachi ID Systems, Inc. All rights reserved. 4
  • 5. Slide Presentation 9 Authentication management technology • SSPR: – Web UI (of course). – GINA DLL (for 40% of issues that are Windows lockouts). – GINA Service (same as GINA DLL but without the risk). – Windows 7 Credential Provider (new PCs need this). – Telephone / IVR (for mobile users and orgs that prefer the phone). – Secure Kiosk Account (to avoid client software deployment). • Self-service, non-password: – Smart card PIN reset (must be done using ActiveX in browser). – Token card PIN reset (at least for RSA). – PKI certificate management (at least for Lotus Notes). – HDD key recovery (becoming urgent for many customers). • Mobile users: – UI should work in a small browser (phone). – Manage Blackberry passwords. – SSPR for mobile users over temporary VPN. – Update cached passwords on Windows after a PW change. 10 User adoption • Most of these processes depend on user cooperation: – Enrollment: typically to populate answers to security questions. – Self-service: rather than calling the help desk. • Users will not volunteer to do either. • To get user adoption, we need a combination of things: – Frequent reminders. – Accessible UI (e.g., available when needed). – Hard to miss UI (e.g., access from login prompt, portal, etc.). – User friendly UI (e.g., no training required). – A carrot (e.g., synchronized passwords; dinner for 2). – A stick (e.g., slow response if you call the help desk). • It helps if some of these things are built right into the authentication management product. © 2015 Hitachi ID Systems, Inc. All rights reserved. 5
  • 6. Slide Presentation 11 Hitachi ID Password Manager HiPM is the only product on the market that meets all of the requirements of enterprise authentication management. • Authenticate with and manage any factor: – Passwords – Token and smart card PINs – Security questions – Cell phone / SMS PIN – Voice biometrics • Smart card PIN resets is via ActiveX. • HDD key recovery is via telephone. • Managed user enrollment is built-in. • Access from anywhere: – Web browser (any) – Smart phone (any). – Locked out workstation (GINA service, SKA). – Mobile laptop (temporary VPN). – Voice phone (IVR). 12 Services Engagements • Some of these features are complicated to setup. • Just as "authentication management" is more powerful than "password management," these projects are going to be longer. • Examples: – SSPR for mobile users – need to integrate with and customize temporary VPN connection. – Smart card PIN reset – need to integrate with one-off card management system and with whatever card readers and cards have been deployed. – HDD key recovery – needs IVR plus key recovery server integration. • Expect 30+ day deployments, even if there are just 2-3 integrations. www.Hitachi-ID.com 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com Date: May 22, 2015 File: PRCS:pres