Identity Management Volume 103 No

Total Page:16

File Type:pdf, Size:1020Kb

Identity Management Volume 103 No Contents Telektronikk Identity Management Volume 103 No. 3/4 – 2007 1 Guest Editorial; ISSN 0085-7130 Do Van Thanh Editor: 3 The Ambiguity of Identity; Per Hjalmar Lehne Do Van Thanh, Ivar Jørstad (+47) 916 94 909 [email protected] 11 Identity Management Demystified; Do Van Thuan Editorial assistant: Gunhild Luke 19 Identity Management Standards, Systems and Standardisation Bodies; (+47) 415 14 125 Nguyen Duy Hinh, Sjur Millidahl, Do Van Thuan, Ivar Jørstad [email protected] 31 Identity Management in General and with Attention to Mobile GSM- Editorial office: based Systems; Tor Hjalmar Johannessen Telenor R&I NO-1331 Fornebu 52 Next Generation of Digital Identity; Norway Fulup Ar Foll, Jason Baragry (+47) 810 77 000 57 Microsoft Windows CardSpace and the Identity Metasystem; [email protected] Ole Tom Seierstad www.telektronikk.com 66 Smart Cards and Digital Identity; Editorial board: Jean-Daniel Aussel Berit Svendsen, Head of Telenor Nordic Fixed Ole P. Håkonsen, Professor NTNU 79 Trusting an eID in Open and International Communication; Oddvar Hesjedal, VP Telenor Mobile Operations Sverre Bauck Bjørn Løken, Director Telenor Nordic 85 Building a Federated Identity for Education: Feide; Graphic design: Ingrid Melve, Andreas Åkre Solberg Design Consult AS (Odd Andersen), Oslo 103 Identity Federation in a Multi Circle-of-Trust Constellation; Layout and illustrations: Dao Van Tran, Pål Løkstad, Do Van Thanh Gunhild Luke and Åse Aardal, 119 Identity Management in Telecommunication Business; Telenor R&I Do Van Thanh, Ivar Jørstad, Do Van Thuan, Nicolay Bang Prepress and printing: Rolf Ottesen Grafisk Produksjon, Oslo 126 Strong Authentication for Internet Applications with the GSM SIM; Ivar Jørstad, Do Van Thuan, Tore Jønvik, Do Van Thanh Circulation: 4,000 136 Unifying CardSpace and Liberty Alliance with SIM Authentication; Ivar Jørstad, Do Van Thuan, Tore Jønvik, Do Van Thanh 143 The Mobile Phone as Authentication Token; Ivar Jørstad, Do Van Thanh 152 Identity Management in a Fixed-Mobile Convergent IMS Environment; Boning Feng, Do Van Thuan, Ivar Jørstad, Tore Jønvik, Do Van Thanh 161 Access Control and Privacy Enhancement through Role-based Identity Management; Mohammad M.R. Chowdhury, Josef Noll Networks on networks Connecting entities through networks – in technological, societal and personal terms – 171 Terms and Acronyms in Identity Management enables telecommunication. Networks occur on different levels, form parts of larger networks, and exist in numerous varieties. The artist Odd Kaleidoscope Andersen visualises the networks on networks 183 Technical Slogans as Seen in the Negroponte Switch; by drawing interconnected lines with different Rich Ling widths. Curved connections disturb the order and show that networks are not regular but are adapted to the communication needs. Per H. Lehne, Editor in Chief 194 Call for Papers – Special issue on “ICT Forecasting” Guest Editorial DO VAN THANH As human beings, we are quite concerned about our concise overview of identity management and its identity because it tells who we are and how we want usages. to be perceived by other people. We want to be proud of ourselves and therefore want to keep our identity. This Telektronikk issue starts with a light review Each person has a unique identity. Persons having a of the notion of identity, from identity of things via problem with their identity are really in big trouble. personal identity, citizen identity, to digital identity. Do Van Thanh is To have several identities is a malfunction of the Next, the concept of identity management (IdM) is Senior Research brain, in psychiatry called Dissociative Identity Dis- studied carefully. All the IdM components are listed Scientist in order (DID) that needs proper care. and explained. The standards, systems and standard- Telenor R&I ization bodies related to identity management are Unfortunately, most people in the modern society enumerated and described in one paper, allowing the are forced to have several identities. Indeed, in the reader to make further investigation if wanted. Iden- current digital age, our physical world is suddenly tity management is also explained thoroughly in a extended with a cyber world that keeps growing. paper with a focus on mobile GSM-based systems. From one identity in the real world, we now have a multitude of new identities for this new imaginary The two current major identity management systems, world. Some identities are given to us by entities like namely the Liberty Alliance specifications and the clubs, alumni groups, etc. Some identities reflect our Microsoft CardSpace are introduced through two true identity. Some reveal our aspirations, our papers written by experts in the respective organiza- dreams, our heroes, etc. On average, a person has five tions. The need for a trusted electronic ID is ex- different identities: one for their job’s IT system, one plained in the succeeding paper. Since digital identity for their home broadband connection, one for their is exposed for theft it should be stored securely in mobile subscription, one for their online bank and one smart cards which are portable tamper resistant cryp- for their hobby club. It is hence not surprising that we tographic devices. This is examined thoroughly in a have an identity management problem. Each identity paper on Smart cards and digital identity. The next consists of a user name and password that we have to two papers present implementation and usage of iden- remember by heart. To maintain the same level of tity management systems. One describes the building security, we are asked to change our passwords quite of a federated identity for education, the other iden- often. The simple passwords are not accepted and we tity federation in a multi Circle-of-Trust constellation. are asked to choose long and complicated passwords consisting of lower case and upper case letters and Without a well balanced and sound business model, numbers. To write down the password on a piece of the identity management can never be a reality. The paper is not a solution since it constitutes a security next paper addresses this issue by presenting the busi- breach. The worst thing is that the number of login ness scenarios that are both attractive and realistic to names and passwords keeps increasing and will be telecom operators. The next three papers focus on soon unmanageable. The demand for sound and user- one central function of identity management, namely friendly identity management systems is obvious. authentication. The first one describes the usage of the GSM SIM card in the sign-in to Internet applica- But, the notion of identity management is not clearly tions using the Liberty Alliance specifications. The defined, nor is it possible to go and buy a ready-for- second one extends the SIM authentication to use identity management system. It is confusing what CardSpace. The third one reviews all the authentica- an identity management system should comprise. tion schemes by mobile phone. This is not surprising if we contemplate the evolution of computer systems from stand-alone mainframes IP Multimedia Subsystem (IMS) is on the way to with their own identity management to computer net- becoming deployed for both mobile and fixed envi- work systems with external connections. The identity ronments. It is hence necessary to have a way of uni- management must evolve at the same pace and meet fying the different mobile and fixed identities that the all the new requirements of the more complex sys- user has. One paper is fully devoted to this issue. Last tem. The goals of this Telektronikk issue are to clarify but not least, the access control and privacy facili- the notion of identity and to shed light on the field of tated by a role-based identity management system is identity management. It could serve as a clear and presented in a paper. ISSN 0085-7130©Telenor ASA 2007 Telektronikk 3/4.2007 1 For the elaboration and realisation of this Telektron- great assistance. Finally, I wish all the readers a great ikk issue, tremendous efforts and sacrifices have been time with this Telektronikk issue on Identity Manage- made. I would take the opportunity to express my ment. gratitude for all the trust and support that I received from the contributing authors. It has been both a plea- Enjoy your reading! sure and an honour to work with you. I would like also to thank Telektronikk’s editor and staff for their Prof. Dr. Do Van Thanh obtained his MSc in Electronic and Computer Science from the Norwegian University of Science and Technology and his PhD in Informatics from the University of Oslo. In 1991 he joined Ericsson R&D department in Oslo after seven years of R&D in Norsk Data, a minicomputer manufacturer in Oslo. In 2000 he joined Telenor R&I and is now in charge of a Eureka project called Mobicome that focuses on IMS in a fixed mobile environment. He also holds a professorship at the Department of Telematics at the Norwegian University of Science and Technology in Trondheim. He is the author of over 100 publications at international conferences and journals. He is also the inventor of 19 patents and a dozen pending ones. email: [email protected] ISSN 0085-7130©Telenor ASA 2007 2 Telektronikk 3/4.2007 The Ambiguity of Identity DO VAN THANH, IVAR JØRSTAD “To be or not to be” – Shakespeare Although identity is a notion related to the existence of all objects on Earth, including human beings and the fundament for the understanding of nature it is rather diffuse and controversial. The goal of this paper is to give an easy but clear elucidation of the notion of identity. It starts with fundamental definitions of identity in logic. The philosophical paradoxes of identity are summarized to illustrate Do Van Thanh is the complexity of the notion of identity.
Recommended publications
  • Security on the Mainframe Stay Connected to IBM Redbooks
    Front cover Security on the IBM Mainframe Operating system and application security IBM Security Blueprint and Framework IBM mainframe security concepts Karan Singh Lennie Dymoke-Bradshaw Thomas Castiglion Pekka Hanninen Vincente Ranieri Junior Patrick Kappeler ibm.com/redbooks International Technical Support Organization Security on the IBM Mainframe April 2010 SG24-7803-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (April 2010) This edition applies to the IBM System z10 Enterprise Class server, the IBM System z10 Business Class server, and Version 1, Release 11, Modification 0 of z/OS (product number 5694-A01). © Copyright International Business Machines Corporation 2010. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team who wrote this book . xi Now you can become a published author, too! . xii Comments welcome. xii Stay connected to IBM Redbooks . xiii Part 1. Introduction . 1 Chapter 1. Introduction. 3 1.1 IBM Security Framework. 4 1.1.1 People and identity . 5 1.1.2 Data and information. 5 1.1.3 Application and process . 5 1.1.4 Network, server, and endpoint . 5 1.1.5 Physical Infrastructure . 6 1.2 Framework and Blueprint . 7 1.3 IBM Security Blueprint. 7 Chapter 2. Security of the IBM Mainframe: yesterday and today . 13 2.1 Operating systems . 14 2.1.1 z/OS operating system family . 14 2.1.2 z/VM Hypervisor family .
    [Show full text]
  • IBM Security Access Manager Version 9.0.7 June 2019: Advanced Access Control Configuration Topics Contents
    IBM Security Access Manager Version 9.0.7 June 2019 Advanced Access Control Configuration topics IBM IBM Security Access Manager Version 9.0.7 June 2019 Advanced Access Control Configuration topics IBM ii IBM Security Access Manager Version 9.0.7 June 2019: Advanced Access Control Configuration topics Contents Figures .............. vii Configuring authentication ........ 39 Configuring an HOTP one-time password Tables ............... ix mechanism .............. 40 Configuring a TOTP one-time password mechanism 42 Configuring a MAC one-time password mechanism 45 Chapter 1. Upgrading configuration ... 1 Configuring an RSA one-time password mechanism 46 Upgrading external databases with the dbupdate tool Configuring one-time password delivery methods 50 (for appliance at version 9.0.0.0 and later) .... 2 Configuring username and password authentication 54 Upgrading a SolidDB external database (for Configuring an HTTP redirect authentication appliance versions earlier than 9.0.0.0) ...... 3 mechanism .............. 56 Upgrading a DB2 external runtime database (for Configuring consent to device registration .... 57 appliance versions earlier than 9.0.0.0) ...... 4 Configuring an End-User License Agreement Upgrading an Oracle external runtime database (for authentication mechanism ......... 59 appliance versions earlier than 9.0.0.0) ...... 5 Configuring an Email Message mechanism .... 60 Setting backward compatibility mode for one-time HTML format for OTP email messages .... 62 password ............... 6 Configuring the reCAPTCHA Verification Updating template files ........... 6 authentication mechanism ......... 62 Updating PreTokenGeneration to limit OAuth tokens 7 Configuring an Info Map authentication mechanism 64 Reviewing existing Web Reverse Proxy instance point Embedding reCAPTCHA verification in an Info of contact settings ............ 8 Map mechanism ............ 66 Upgrading the signing algorithms of existing policy Available parameters in Info Map .....
    [Show full text]
  • General Agreement on Tariffs and Trade Accord
    GENERAL AGREEMENT ON TARIFFS AND TRADE MIN(86)/INF/3 ACCORD GENERAL SUR LES TARIFS DOUANIERS ET LE COMMERCE 17 September 1986 ACUERDO GENERAL SOBRE ARANCELES ADUANEROS Y COMERCIO Limited Distribution CONTRACTING PARTIES PARTIES CONTRACTANTES PARTES CONTRATANTIS Session at Ministerial Session à l'échelon Periodo de sesiones a nivel Level ministériel ministerial 15-19 September 1986 15-19 septembre 1986 15-19 setiembre 1986 LIST OF REPRESENTATIVES LISTE DES REPRESENTANTS LISTA DE REPRESENTANTES Chairman: S.E. Sr. Enrique Iglesias Président; Ministro de Relaciones Exteriores Présidente; de la Republica Oriental del Uruguay ARGENTINA Représentantes Lie. Dante Caputo Ministro de Relaciones Exteriores y Culto » Dr. Juan V. Sourrouille Ministro de Economia Dr. Roberto Lavagna Secretario de Industria y Comercio Exterior Ing. Lucio Reca Secretario de Agricultura, Ganaderïa y Pesca Dr. Bernardo Grinspun Secretario de Planificaciôn Dr. Adolfo Canitrot Secretario de Coordinaciôn Econômica 86-1560 MIN(86)/INF/3 Page 2 ARGENTINA (cont) Représentantes (cont) S.E. Sr. Jorge Romero Embajador Subsecretario de Relaciones Internacionales Econômicas Lie. Guillermo Campbell Subsecretario de Intercambio Comercial Dr. Marcelo Kiguel Vicepresidente del Banco Central de la Republica Argentina S.E. Leopoldo Tettamanti Embaj ador Représentante Permanante ante la Oficina de las Naciones Unidas en Ginebra S.E. Carlos H. Perette Embajador Représentante Permanente de la Republica Argentina ante la Republica Oriental del Uruguay S.E. Ricardo Campero Embaj ador Représentante Permanente de la Republica Argentina ante la ALADI Sr. Pablo Quiroga Secretario Ejecutivo del Comité de Politicas de Exportaciones Dr. Jorge Cort Présidente de la Junta Nacional de Granos Sr. Emilio Ramôn Pardo Ministro Plenipotenciario Director de Relaciones Econômicas Multilatérales del Ministerio de Relaciones Exteriores y Culto Sr.
    [Show full text]
  • Pdf/Idm Tech Wp 11G R1.Pdf
    Oracle® Fusion Middleware Integration Overview for Oracle Identity Management Suite 11g Release 1 (11.1.1) E15477-03 August 2012 Oracle Fusion Middleware Integration Overview for Oracle Identity Management Suite, 11g Release 1 (11.1.1) E15477-03 Copyright © 2010, 2012, Oracle and/or its affiliates. All rights reserved. Primary Author: Vinaye Misra Contributors: Sidhartha Das, Ellen Desmond, Subbu Devulapalli, Sandy Lii, Kavya Muthanna, Sanjay Rallapalli, Vinay Shukla, Olaf Stullich, Lyju Vadassery, Mark Wilcox This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • La France Après Charlie : Quelques Questions Sensibles, Parmi D'autres, À Mettre En Débat
    La France après Charlie : quelques questions sensibles, parmi d’autres, à mettre en débat (Jean-Claude SOMMAIRE 23 03 2015) Une onde de choc de forte amplitude Les tueries de ce début d’année, à Charlie Hebdo et à l’Hyper Cacher de la Porte de Vincennes, ont produit une onde de choc de très forte amplitude sur l’opinion publique de notre pays. On a pu en mesurer l’effet, dès le week-end suivant, quand des marches républicaines, d’une ampleur inattendue, se sont déroulé un peu partout en France, à Paris comme en province. La force de ce séisme, sur nos compatriotes, peut s’expliquer par la conjonction d’un ensemble d’évènements exceptionnels : l’exécution à la kalachnikov, sur leur lieu de travail, d’une équipe de journalistes et de dessinateurs en raison de leur impertinence à l’égard de l’islam, la prise en otage et l’assassinat de clients d’un magasin cacher au seul motif qu’ils étaient juifs, l’achèvement, à terre, d’un policier blessé d’origine maghrébine, etc. Cependant, pour beaucoup d’entre nous, l’élément le plus déstabilisant de ces journées tragiques aura été que ces meurtriers fanatiques ne venaient pas d’une contrée lointaine, où la sauvagerie règne de façon habituelle. Les frères Kouachi et Amedy Coulibaly, nés et scolarisés en France, vivaient près de chez nous, ils étaient nos compatriotes et nos voisins. Comme on avait commencé à le pressentir avec Mohamed Merah, ce trio sanguinaire nous a démontré que l’école laïque, les dispositifs sociaux de l’Etat providence, et les valeurs de la République, ne faisaient pas obstacle au développement de la barbarie islamiste dans nos banlieues.
    [Show full text]
  • Understanding SOA Security Design and Implementation
    Front cover Understanding SOA Security Design and Implementation Introducing an SOA security reference architecture Implementing scenarios based on the IBM SOA Foundation Deploying SOA using IBM Tivoli security solutions Axel Buecker Paul Ashley Martin Borrett Ming Lu Sridhar Muppidi Neil Readshaw ibm.com/redbooks International Technical Support Organization Understanding SOA Security Design and Implementation November 2007 SG24-7310-01 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Second Edition (November 2007) This edition applies to Version 6.0 of IBM Tivoli Access Manager for e-business, Version 6.1.1 of IBM Tivoli Federated Identity Manager, and Version 6.0 of IBM Tivoli Directory Server. We are also discussing several other IBM software products in the context of hands-on scenarios. © Copyright International Business Machines Corporation 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .xi Trademarks . xii Preface . xiii The team that wrote this IBM Redbook . xiii Become a published author . xvi Comments welcome. xvi Summary of changes . xvii November 2007, Second Edition . xvii Part 1. Business context and foundation . 1 Chapter 1. Business context . 3 1.1 Business scenarios . 4 1.1.1 Service creation at an insurance company . 4 1.1.2 Service connectivity at a government department . 5 1.1.3 Interaction and collaboration at a telecommunications company . 5 1.2 Service orientation in SOA . 6 1.2.1 More than componentization. 7 1.2.2 A focus on reuse .
    [Show full text]
  • IBM Tivoli Security Solutions for Microsoft Software Environments
    Front cover IBM Tivoli Security Solutions for Microsoft Software Environments Explaining common architecture and standards Deploying on Microsoft operating systems Securing Microsoft software environments Axel Buecker Neil Readshaw ibm.com/redbooks Redpaper International Technical Support Organization IBM Tivoli Security Solutions for Microsoft Software Environments September 2008 REDP-4430-00 Note: Before using this information and the product it supports, read the information in “Notices” on page v. First Edition (September 2008) This document created or updated on September 18, 2008. © Copyright International Business Machines Corporation 2008. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .v Trademarks . vi Preface . vii The team that wrote this paper . vii Become a published author . viii Comments welcome. viii Chapter 1. Architecture and standards . 1 1.1 IBM Security Framework. 2 1.2 IBM Service Management strategy . 3 1.2.1 Visibility . 3 1.2.2 Controls. 3 1.2.3 Automation . 3 1.3 Security standards . 4 1.3.1 LDAP. 4 1.3.2 Kerberos . 4 1.3.3 SPNEGO. 4 1.3.4 SSL and TLS. 5 1.3.5 Service-oriented architecture and Web Services Security . 5 1.4 Conclusion . 9 Chapter 2. IBM Tivoli Security Solutions using Microsoft operating systems and middleware . 11 2.1 Microsoft products that we discuss in this chapter . 12 2.1.1 Operating systems . 12 2.1.2 Middleware . 12 2.2 Support summary by IBM Tivoli Security product . 13 2.2.1 IBM Tivoli Directory Server .
    [Show full text]
  • Cloud Access Manager Overview Updated - November 2018 Version - 8.1.4 Contents
    Cloud Access Manager 8.1.4 Overview Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of One Identity LLC . The information in this document is provided in connection with One Identity products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of One Identity LLC products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, ONE IDENTITY ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON- INFRINGEMENT. IN NO EVENT SHALL ONE IDENTITY BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF ONE IDENTITY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. One Identity makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice.
    [Show full text]
  • Vendor: Microsoft Exam Code: 70-534 Exam Name: Architecting
    Vendor: Microsoft Exam Code: 70-534 Exam Name: Architecting Microsoft Azure Solutions Version: DEMO ★ Instant Download ★ PDF And VCE ★ 100% Passing Guarantee ★ 100% Money Back Guarantee Case Study 1 - VanArsdel, Ltd (Question 1 - Question 8) Case Study 2 - Trey Research (Question 53 - Question 57) Case Study 3 - Contoso, Ltd (Question 58 - Question 62) Case Study 4 - Lucerne Publishing (Question 63 - Question 68) Case Study 5 - Northwind traders (Question 69 - Question 77) Case Study 6 - Fourth Coffee (Question 180 - Question 187) Case Study 7 - Trey Research (Question 188 - Question 195) Case Study 8 - Woodgrove Bank (Question 196 - Question 203) QUESTION 1 You need to recommend a solution that allows partners to authenticate. Which solution should you recommend? A. Configure the federation provider to trust social identity providers. B. Configure the federation provider to use the Azure Access Control service. C. Create a new directory in Azure Active Directory and create a user account for the partner. D. Create an account on the VanArsdel domain for the partner and send an email message that contains the password to the partner. Answer: B Explanation: * Scenario: The partners all use Hotmail.com email addresses. * In Microsoft Azure Active Directory Access Control (also known as Access Control Service or ACS), an identity provider is a service that authenticates user or client identities and issues security tokens that ACS consumes. The ACS Management Portal provides built-in support for configuring Windows Live ID as an ACS Identity Provider. Incorrect: Not C, not D: Scenario: VanArsdel management does NOT want to create and manage user accounts for partners.
    [Show full text]
  • Identity Authentication Service SAP Cloud Platform
    Identity Authentication Service SAP Cloud Platform Marko Sommer, SAP July 26th, 2017 PUBLIC Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission of SAP. This presentation is not subject to your license agreement or any other service or subscription agreement with SAP. SAP has no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation and SAP's strategy and possible future developments, products and or platforms directions and functionality are all subject to change and may be changed by SAP at any time for any reason without notice. The information in this document is not a commitment, promise or legal obligation to deliver any material, code or functionality. This document is provided without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. This document is for informational purposes and may not be incorporated into a contract. SAP assumes no responsibility for errors or omissions in this document, except if such damages were caused by SAP´s willful misconduct or gross negligence. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions.
    [Show full text]
  • Program & Participants List
    Bringing people together to accelerate growth and well-being in emerging markets Program and Participants List INAUGURAL MEETING OF AFRICA EMERGING MARKETS FORUM SEPTEMBER 30 - OCTOBER 1, 2007 GERZENSEE, SWITZERLAND Growth and Development in Emerging Market Countries THEEMERGINGMARKETSFORUM INAUGURAL MEETING AFRICA EMERGING MARKETS FORUM GERZENSEE, SWITZERLAND SEPTEMBER 30 - OCTOBER 1, 2007 CONTENTS WELCOME ................................................................................... 3 PROGRAM ................................................................................... 4 BACKGROUND PAPER ................................................................ 5 PROPOSED STEERING COMMITTEE FOR AFRICA ................ 11 LIST OF PARTICIPANTS ........................................................... 12 PARTICIPANTS’ PROFILE ......................................................... 14 HELPFUL INFORMATION ......................................................... 43 THEEMERGINGMARKETSFORUM 2 AFRICA EMERGING MARKETS FORUM THEEMERGINGMARKETSFORUM WELCOME September, 20, 2007 All of us at the Emerging Markets Forum are delighted that you are joining us in Gerzensee at the Inaugural Meeting of the Emerging Markets Forum for Africa. I thank you in advance for your participation and valuable contribution. After our Global Meetings in Oxford in 2005 and in Jakarta 2006, this new initiative on Africa will allow us to look deeper into the economic and social challenges facing the African continent, and also reinforce the Forum’s role as a bridge
    [Show full text]
  • Cloud Access Manager Security and Best Practices Guide Updated - November 2018 Version - 8.1.4 Contents
    Cloud Access Manager 8.1.4 Security and Best Practices Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of One Identity LLC . The information in this document is provided in connection with One Identity products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of One Identity LLC products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, ONE IDENTITY ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON- INFRINGEMENT. IN NO EVENT SHALL ONE IDENTITY BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF ONE IDENTITY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. One Identity makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice.
    [Show full text]