® Brian Breton Gradient Technologies, Inc. NetCrusader P R O D U C T F A M I L Y Extending the Benefits of DCE TOG DCE Program Group

Slides:



Advertisements
Similar presentations
Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
Advertisements

Introduction to z/OS Security Lesson 4: There’s more to it than RACF
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Netscape Application Server Application Server for Business-Critical Applications Presented By : Khalid Ahmed DS Fall 98.
Active Directory: Final Solution to Enterprise System Integration
DEV392: Extending SharePoint Products And Technologies Through Web Parts And ASP.NET Clint Covington, Program Manager Data And Developer Services - Office.
PKI 2: Protezione del traffico Web tramite SSL Fabrizio Grossi.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
RSA SecurID November 10, 2005.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Microsoft Exchange Exchange is more than just Electronic Mail The server that embraces Internet standards and extends rich messaging and collaboration.
Public Key Infrastructure from the Most Trusted Name in e-Security.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
BMC Software confidential. BMC Performance Manager Will Brown.
Novera Software, Inc The Leader in Java Application Servers.
Architecture of the R/3 System Chapter 14 C & L Chapter 8 M & W.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
第十四章 J2EE 入门 Introduction What is J2EE ?
Best of Both Worlds: Information Management Solutions SmartCore Management Dashboards.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
® Gradient Technologies, Inc. Extending the Value of DCE Open Group Members Meeting Sand Diego, CA USA April 1998 Brian Breton.
Sudha Iyer Principal Product Manager Oracle Corporation.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Single Sign-On
Requirement for Enterprise Directory Services A Customer Influenced Perspective TOG DCE Program Group ® Brian Breton Gradient Technologies, Inc.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Databases JDBC (Java Database Connectivity) –Thin clients – servlet,JavaServer Pages (JSP) –Thick clients – RMI to remote databases –most recommended way.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
GemStone/J 3.0 Objects Across the Enterprise Paul Chambers Chief Technical Officer (Europe)
An Enterprise Computer Architecture ASIG – Sept 12, 2001.
IT 620 Enterprise Systems Integration January 31, 2002.
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
15 Copyright © 2004, Oracle. All rights reserved. Adding JAAS Security to the Client.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
David Saslav Principal Product Manager Database and Application Server Technologies Oracle Corporation.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Peter Idoine Managing Director Oracle New Zealand Limited.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Linux Virtual Desktop Infrastructure (VDI) Access Bringing Linux virtualization to the enterprise Presenter: James Lui Director of Technical Services,
Secure Connected Infrastructure
Netscape Application Server
Forefront Security ISA
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
Data Security for Microsoft Azure
Public Key Infrastructure from the Most Trusted Name in e-Security
Quality Assurance for Component-Based Software Development
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Remedy Integration Strategy Leverage the power of the industry’s leading service management solution via open APIs February 2018.
Presentation transcript:

® Brian Breton Gradient Technologies, Inc. NetCrusader P R O D U C T F A M I L Y Extending the Benefits of DCE TOG DCE Program Group Amsterdam, January 1998

© 1998 Gradient Technologies, Inc.Common Authorization Model NetCrusader Security ServerMultipleAuthenticationMethods Username/ Password Public-Key Certificate Two-Factor Authentication Customers Partners EmployeesMultipleUserPopulations Enterprise Security Infrastructure MultipleEncryptionMethods DES, SSL, RSA, CAST, others Legacy Heritage Web-based Multiple Application Types Distributed Security Management NetCrusader Commander

© 1998 Gradient Technologies, Inc. Infrastructure Requirement Leverage existing investmentsLeverage existing investments NetCrusader approach Support multiple application typesSupport multiple application types –Web-based –Heritage –Legacy

© 1998 Gradient Technologies, Inc. Infrastructure Requirement Leverage existing investmentsLeverage existing investments NetCrusader approach Support heterogeneous systemsSupport heterogeneous systems –Windows 3.1, 95, NT; Mac –Any browser-enabled client! –NT; UNIX (AIX, HP-UX, Solaris)

© 1998 Gradient Technologies, Inc. Infrastructure Requirement Availability and ScaleAvailability and Scale NetCrusader approach Leverage proven, replicable, distributed computing servicesLeverage proven, replicable, distributed computing services –Security services –Directory services –Time services –Others

© 1998 Gradient Technologies, Inc. Infrastructure Requirement Leverage existing investmentsLeverage existing investments NetCrusader approach Implement as value- added filters and extensions to commercial Web serversImplement as value- added filters and extensions to commercial Web servers –Netscape –Microsoft

© 1998 Gradient Technologies, Inc. NetCrusader Security Server Web browser NetCrusader + NetCrusaderClient Web browser only Leverage Existing Investments Microsoft/Netscape Web Server NetCrusaderCommander ISAPI/NSAPI Application Protocol Filter Entrust/HTTP; DCE/HTTP SSLMapper AuthZ Filter Signer NetCrusaderSecurityAdapter Username/Password or Public-Key Certificate NetCrusader Credentials Access Permissions Two-factor (optional) Two-factor (optional)

© 1998 Gradient Technologies, Inc. Securing the Large Enterprise The Integration of NetCrusader and Entrust

© 1998 Gradient Technologies, Inc. NetCrusader and Entrust NetCrusader Security Server Web browser NetCrusader + NetCrusaderClient + Entrust Client Microsoft/Netscape Web Server NetCrusaderCommander ISAPI/NSAPI Application CAST Protocol Filter Entrust Cast /HTTP Mapper AuthZ Filter Signer NetCrusaderSecurityAdapter Public-Key Certificate NetCrusader Credentials Access Permissions Entrust Session Entrust/Manager Security Server Entrust Session Token Card / SmartCard (optional)

© 1998 Gradient Technologies, Inc. Integrated Product Benefits Simplified key managementSimplified key management Easy-of-use for administrators, users, developersEasy-of-use for administrators, users, developers Full encryption capabilitiesFull encryption capabilities A single, standardized access control managementA single, standardized access control management Easy integration into existing environmentsEasy integration into existing environments

© 1998 Gradient Technologies, Inc. Developing Secure Web-based Java Applications The Integration of NetCrusader and NetDynamics

© 1998 Gradient Technologies, Inc. Copyright ©1997 Gradient Technologies, Inc. NetDynamics Components NetDynamics StudioNetDynamics Studio –A visual tool that allows developers to create database applications easily, using data and code objects –Supports wizards, Java classes, generation of server-side Java code NetDynamics Application ServerNetDynamics Application Server –High-performance, scalable Java-based server that controls applications and database connections

© 1998 Gradient Technologies, Inc. NetCrusader Security Server Web browser NetCrusader V3 and Netdynamics Microsoft/Netscape Web Server NetCrusaderCommander NetDynamics Security Adapter Protocol Filter SSL, Entrust/HTTP, DCE/HTTP Mapper AuthZ Filter Signer Username/Password or Public-Key Certificate NetCrusader Credentials Access Permissions Two-factor (optional) DBMS NetDynamics Application Server(s)

© 1998 Gradient Technologies, Inc. Developing Secure Web-based Applications The Integration of NetCrusader and Bluestone Sapphire/Web

© 1998 Gradient Technologies, Inc. Sapphire/Web Components Sapphire/Web IDESapphire/Web IDE –A visual tool that allows developers to create database applications easily, using data and code objects –Supports Java, C, C++ & numerous middleware choices including: IIOP, RMI, DCE, SSL and more... Sapphire/Web Application ServerSapphire/Web Application Server –High-performance, replicable, fault tolerant server that controls applications and database connections Sapphire/Web State ServerSapphire/Web State Server –Enables dynamic swapping of users between app servers

© 1998 Gradient Technologies, Inc. NetCrusader Security Server Web browser NetCrusader V3 and Sapphire/Web Microsoft/Netscape Web Server NetCrusaderCommander Sapphire/Web Security Adapter Protocol Filter SSL, Entrust/HTTP, DCE/HTTP Mapper AuthZ Filter Signer Username/Password or Public-Key Certificate NetCrusader Credentials Access Permissions Two-factor (optional) DBMS Sa[[hire/Web Application Server(s) Java, C++, C SapphireWeb State Server

© 1998 Gradient Technologies, Inc. Application Development & Deployment Time Web-based Applications Cuts Time-to-Market Traditional Client/Server Tools First-Generation Web Tools (CGI, C++) Second-Generation Web Tools Application Development Time Application Deployment Time Key NetDynamics/BluestoneAdvantage

© 1998 Gradient Technologies, Inc. Integrated Product Benefits More administrator control over application access control policiesMore administrator control over application access control policies –Exports data bindings to NetCrusader for enforcement and administration Easier management of security infrastructureEasier management of security infrastructure Single standardized facility for access control managementSingle standardized facility for access control management Consistent security model across all tiers in the distributed environmentConsistent security model across all tiers in the distributed environment Easier application development through more flexible access control mechanismsEasier application development through more flexible access control mechanisms

© 1998 Gradient Technologies, Inc. Extending Enterprise Security with Two-factor Authentication The Integration of NetCrusader & PC-DCE and Security Dynamics SecurID Token Cards

© 1998 Gradient Technologies, Inc. NetCrusader and SecurID Token Cards NetCrusader Security Server Web browser NetCrusader + NetCrusaderClient + SecurID Microsoft/Netscape Web Server ISAPI/NSAPI Application Protocol Filter DCE/HTTP Mapper AuthZ Filter Signer NetCrusaderSecurityAdapter Username/Password or Public-Key Certificate NetCrusader Credentials Access Permissions NetCrusaderCommander SDI Client SDI ACE Server

© 1998 Gradient Technologies, Inc. Integrated Product Benefits Two-factor authentication adds extra level of securityTwo-factor authentication adds extra level of security Eliminates use and risk of passwordsEliminates use and risk of passwords Removes user password managementRemoves user password management

© 1998 Gradient Technologies, Inc. Portable Public-Key Authentication The Integration of NetCrusader and Litronic SmartCards and Readers

© 1998 Gradient Technologies, Inc. NetCrusader and Litronic SmartCards and Readers NetCrusader Security Server Web browser & optional NetCrusader Client Microsoft/Netscape Web Server NetCrusaderCommander ISAPI/NSAPI Application Protocol Filter SSL, Entrust/HTTP, DCE/HTTP Mapper AuthZ Filter Signer NetCrusaderSecurityAdapter Username/Password or Public-Key Certificate NetCrusader Credentials Access Permissions Litronic SmartCard and Reader

© 1998 Gradient Technologies, Inc. Integrated Product Benefits Public Key authentication and mapping to a NetCrusader Universal IdentityPublic Key authentication and mapping to a NetCrusader Universal Identity Single sign-on (SSO) to NetCrusader enabled applications including internally developed and 3rd party like SAP & PeoplesoftSingle sign-on (SSO) to NetCrusader enabled applications including internally developed and 3rd party like SAP & Peoplesoft

© 1998 Gradient Technologies, Inc. PeopleSoft looks to industrial strength security The Integration of NetCrusader and PeopleSoft

© 1998 Gradient Technologies, Inc. Integrated Product Benefits Public Key authentication and mapping to a NetCrusader Universal IdentityPublic Key authentication and mapping to a NetCrusader Universal Identity Single sign-on (SSO) to PeopleSoft applicationsSingle sign-on (SSO) to PeopleSoft applications Secure Web access to Peoplesoft applications through standardized access control managementSecure Web access to Peoplesoft applications through standardized access control management

© 1998 Gradient Technologies, Inc. Integrated Product Benefits Consistent security model across all tiers in the distributed environmentConsistent security model across all tiers in the distributed environment Complements existing relationship with NetdynamicsComplements existing relationship with Netdynamics Complements strategy for other RAD partners--BluestoneComplements strategy for other RAD partners--Bluestone

© 1998 Gradient Technologies, Inc. Secure Web access to SAP’s R/3 An Integration project by Gradient and Deloitte & Touche for SAP

© 1998 Gradient Technologies, Inc. NetCrusader / Deloitte & Touche Integration Access Control Library NetDynamics Security Adapter Web Server with WebCrusader Security Adapter NetDynamics Application Server NetCrusader Commander Web Browser Access Control Database SAP Applications Data Source

© 1998 Gradient Technologies, Inc. Integrated Product Benefits Solution (NetCrusader, NetDynamics, and D&T) leverages NetCrusader security services and NetDynamics development tools to create Web-based front-ends to new or existing SAP functionalitySolution (NetCrusader, NetDynamics, and D&T) leverages NetCrusader security services and NetDynamics development tools to create Web-based front-ends to new or existing SAP functionality Secure access to SAP R/3 by extracting digital signature from public key certificate and mapping it to a NetCrusader Universal User IdentitySecure access to SAP R/3 by extracting digital signature from public key certificate and mapping it to a NetCrusader Universal User Identity

© 1998 Gradient Technologies, Inc. Integrated Product Benefits Takes advantage of NetDynamics SAP Platform Adapter Components (PAC)Takes advantage of NetDynamics SAP Platform Adapter Components (PAC) Single Sign-On (SSO) extends to include SAP R/3 applicationsSingle Sign-On (SSO) extends to include SAP R/3 applications Tools for simplified, decentralized management of the security infrastructureTools for simplified, decentralized management of the security infrastructure

© 1998 Gradient Technologies, Inc. Developing Secure Object-based Applications The Integration of PC-DCE and IONA Orbix

© 1998 Gradient Technologies, Inc. PC-DCE and OrbixSecurity Client OrbServer Orb Orbix RT PC-DCE RT Orbix RT PC-DCE Security Server IIOP OrbixSecurity

© 1998 Gradient Technologies, Inc. Integrated Product Benefits Introduces security to object-based applicationsIntroduces security to object-based applications No application modification requiredNo application modification required Consistent security model across all tiers in the distributed environmentConsistent security model across all tiers in the distributed environment Single standardized facility for access control managementSingle standardized facility for access control management Easier management of security infrastructureEasier management of security infrastructure

© 1998 Gradient Technologies, Inc. There are many others... Transarc DFSTransarc DFS Transarc EncinaTransarc Encina Checkpoint Firewall-1Checkpoint Firewall-1 Oracle ANOOracle ANO Sybase Open Client, Open ServerSybase Open Client, Open Server VersatilityVersatility ManugisticsManugistics

© 1998 Gradient Technologies, Inc. Distributed Security Management Graphical management of users and groupsGraphical management of users and groups

© 1998 Gradient Technologies, Inc. NetCrusader and Sapphire/Web deliver the best of security and RAD CrossRoads 98 Award Winner for Security InfrastructureCrossRoads 98 Award Winner for Security Infrastructure CrossRoads 98 Award Winner for RAD toolsCrossRoads 98 Award Winner for RAD tools NetCrusader

© 1998 Gradient Technologies, Inc. Gradient’s NetCrusader Gradient’s NetCrusader succeeds in delivering a comprehensive enterprise-wide security infrastructure thru both innovation and partnership with market and technology leaders

P R O D U C T F A M I L Y ® NetCrusader Security Solutions for the Enterprise Gradient Technologies, Inc. 2 Mount Royal Avenue Marlborough, MA USA