Identity on Force.com & Benefits of SSO Nick Simha.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

FI-WARE Testbed Access Control temporary solution.
EAuthentication Before accessing the Delphi eInvoicing System, you must be an authenticated user. This authentication process is called eAuthentication.
Overview of User Set-up & Security. Administrator Functions Before adding new Users, we first need to define some User Security Settings To do this navigate.
SAP checks if USER ID & Password combination is valid. No identification. User requests Log-on, enters USER ID & Password, (not necessarily their own)!
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Salesforce.com Connect for Microsoft Outlook & “ to Saesforce” Setup.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Identity and Access Management
Enterprise Single Sign On Identity management for web applications.
Updating User Information Password – use this field to change your own password Confirm Password – retype the new password for verification purposes To.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Session 11: Security with ASP.NET
Identity Management in Education. Welcome Scott Johnson, NetProf, Inc. Creator of OmnID Identity Management for Education
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Using AS 10g with EBS What are the Benefits of Integrating AS 10g with Oracle Applications?
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Authentication Key HMAC(MK, “auth”) Server Encryption Key HMAC(MK, “server_enc”) User Password Master Key (MK) Client Encryption Key HMAC(MK, “client_enc”)
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
New Hire Registration for ADP Self Service
Single Sign-On
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Erie 1 BOCES / WNYRIC eBOCES applications Visit us at:
Module 11: Securing a Microsoft ASP.NET Web Application.
The EBSCO eBooks App Authenticating the App Tutorial support.ebsco.com.
At the Log in page enter your college provided username and password then click submit to login to Owl Link.
Securing Sensitive Information Data Security Dashboards often contain the most important data in the company Securing that information makes business.
Qaforum Security Structure. What’s SSO Single sign-on (SSO) is mechanism whereby a single action of user authentication and authorization can permit a.
SSO Case Study Suchin Rengan Principal Technical Architect Salesforce.com.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Online Parking System.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Problems With Centralized Passwords Dartmouth College PKI Lab.
Access resources in a federation partner organization.
ECHAM Pre-Session Training. Username: –first initial, last name. Example: rmoore. –If you have two last names, use the first last name only Example: I.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
1 State and Session Management HTTP is a stateless protocol – it has no memory of prior connections and cannot distinguish one request from another. The.
Secure Mobile Development with NetIQ Access Manager
F5 APM & Security Assertion Markup Language ‘sam-el’
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
 Step 2 Deployment Overview  What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Understanding.
 What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Demo.
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Using Your Own Authentication System with ArcGIS Online
Setting Up User Name/Password (If you do not have a work )
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Authentication Interact Cloud.
AIM/education directory (Ed dir)
Data and Applications Security Developments and Directions
Prime Service Catalog 12.0 SAML 2.0 Single Sign-On Support
First Time Login Process
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
NFX Q-Port on-boarding guide
Cloud Connect Seamlessly
First-time Login to Business Banking:
Multifactor Authentication & First Time Login
Powerschool for Parents
Single Sign On Glen Dorton 1/18/2019.
Management Application for all segments
Presentation transcript:

Identity on Force.com & Benefits of SSO Nick Simha

Where is identity needed with Salesforce.com? Desktop Apps Browser User ID and password can be entered via browser. Salesforce.com provides mechanism to programmatically pass a token though the password field. User ID and password are user entered on device. No way to programmatically pass a token. No way to intercept the login request. User ID and password are user entered in plug-in. No way to programmatically pass a token. Some provide mechanism to re-direct login request. Devices

How does standard Salesforce.com authentication work?  Your Salesforce.com administrator creates a user – is sent to new user with their User ID and a one time use password. –User must create a password when they first login. –Your administrator sets the password policy. (Complexity, reuse, etc.)  User Logs into Salesforce.com with a User ID and Password –User ID must be globally unique. –User ID is typically in the form of an address. –Password is stored in Salesforce.com as a MD5 Hash. (one way encryption)  What happens when I forget my password? –Your administrator can reset the password. New one time use password is sent via –Salesforce.com support can reset the password. Just like your administrator.

Single Sign-On (SSO) enables a more seamless user experience

Benefits of Single Sign-On  Reduced Administrative Costs –All user authentication information resides in a central directory, which reduces the need to maintain, monitor and potentially synchronized multiple stores. –Reduces password-related user support requests.  Increased ease of use / adoption –Each user only has a single username and password which grants them seamless access to all corporate resources and Salesforce. –Single Sign-On also saves users time, since each individual sign-on process can take 5 to 20 seconds to complete.  Enhanced Security –Password policies established for your corporate network will also be in effect for Salesforce.com. –Automatic provisioning and deprovisioning of users prevents unwarranted access. –Sending an authentication credential that is only valid for a single use can increase security for users who have access to sensitive data.