SlideShare a Scribd company logo
1 of 3
Access Management (for Best Practices & Use case)
OAM Features OAM Benefit
 Authentication & Authorization
 Advanced Authentication
 Federation features
 Single Sign On Features
 Password management
 Plug-in (Web gate) based security
 Coherence feature
 Access Manager Reports


 Improved and secured authentication & authorization to
enterprise level applications. Centralized secure user
authentication (LDAP/AD).
 Advanced authentication such as time based, network IP based,
token service, multifactor authentication will provide us level of
security applicable for sensitive enterprise IT applications.
 Multi domain environment integration (test1.com & test2.com) to
achieve single sign on across different organization application
secure access to end user.
 Authentication failure scenario/lock/unlock/login attempts,
tracking the logins are inbuilt features.
 Plug-in based authentication will mask IT infrastructure from the
end users which will prevent from server hacking.
 Detect anomalies with respective to application access and
control the user access and track their session and dismiss ay
administrator level.
 Authentication & Authorization related reports in the form of
dashboards are inbuilt features.
 Authentication & Authorization
 Advanced Authentication
 Federation features
 Improved and secured authentication & authorization to
enterprise level applications. Centralized secure user
authentication (LDAP/AD).
 Use Case: In an organization Active Directory is authentication
LDAP when you want to use single user login to access ERP & CRM
applications then you have 2 way of implementation
 1) Integrate ERP & CRM application with Active Directory
individually.
 2) Integrate Access Manager with ERP and CRM to delegate
authentication & authorization to Access manager system.


 Difference between option 1 & option 2 are as follows
 LDAP & Application integration V/s Access manager & Application
Integration.
 Less secured  More secured
 Application URL can't
be masked from end user
 Application UL can be
masked
 No audit and
compliance features available
 Rich audit &
compliance features available
 Do not have control
over user sessions
 control over user
sessions
 multifactor
authentication is not possible
 multifactor
authentication is possible
 doesn't support cross
domain authentication
mechanism
 Supports cross domain
authentication mechanism.
 One credential
multiple logins to access
multiple applications
 One credentials one
login to access multiple
applications
 no control over
authorization
 control over
authorization
 Password recovery
feature is not available
 Password recovery
feature is available
 IP & Time based
authentication features are
not available
 IP and Time based
authentication features are
available.
 Authentication &
authorization audits & reports
are not available
 Authentication &
authorization audits and
reports features can be
configurable.





More Related Content

What's hot

Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager IntroductionAidy Tificate
 
OWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptOWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptwebhostingguy
 
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)Yury Bondarau
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleSalesforce Developers
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products OverviewDell
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce OrgSalesforce Admins
 
SaaSPlex Enterprise
SaaSPlex EnterpriseSaaSPlex Enterprise
SaaSPlex EnterpriseLa Lakis
 
A Guide to Multi Factor Authentication
A Guide to Multi Factor AuthenticationA Guide to Multi Factor Authentication
A Guide to Multi Factor AuthenticationJack Forbes
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsAidy Tificate
 
Tjat services
Tjat servicesTjat services
Tjat servicesorilevi
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentationjasonlan
 
Enhancing your mobile enterprise security with ibm worklight tips
Enhancing your mobile enterprise security with ibm worklight tipsEnhancing your mobile enterprise security with ibm worklight tips
Enhancing your mobile enterprise security with ibm worklight tipsbupbechanhgmail
 
Security Testing In Application Authentication
Security Testing In Application AuthenticationSecurity Testing In Application Authentication
Security Testing In Application AuthenticationRapidValue
 
Ca site minder r12 professional study guide
Ca site minder r12 professional study guideCa site minder r12 professional study guide
Ca site minder r12 professional study guideNitish Nagar
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonJoel Oleson
 

What's hot (20)

3g 2 Audit Administration Software Webmars Features
3g   2   Audit Administration Software Webmars   Features3g   2   Audit Administration Software Webmars   Features
3g 2 Audit Administration Software Webmars Features
 
Webmars Presentation Ver2
Webmars Presentation Ver2Webmars Presentation Ver2
Webmars Presentation Ver2
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
OWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.pptOWASPSanAntonio_2006_08_SingleSignOn.ppt
OWASPSanAntonio_2006_08_SingleSignOn.ppt
 
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
Salesforce Security Model (Dmitry Goshko, Igor Haritonovich)
 
Managing the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise ScaleManaging the Role Hierarchy at Enterprise Scale
Managing the Role Hierarchy at Enterprise Scale
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products Overview
 
Security and Your Salesforce Org
Security and Your Salesforce OrgSecurity and Your Salesforce Org
Security and Your Salesforce Org
 
SaaSPlex Enterprise
SaaSPlex EnterpriseSaaSPlex Enterprise
SaaSPlex Enterprise
 
A Guide to Multi Factor Authentication
A Guide to Multi Factor AuthenticationA Guide to Multi Factor Authentication
A Guide to Multi Factor Authentication
 
Back up
Back upBack up
Back up
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
Tjat services
Tjat servicesTjat services
Tjat services
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
SiteMinder
SiteMinderSiteMinder
SiteMinder
 
Chris siteminder
Chris siteminderChris siteminder
Chris siteminder
 
Enhancing your mobile enterprise security with ibm worklight tips
Enhancing your mobile enterprise security with ibm worklight tipsEnhancing your mobile enterprise security with ibm worklight tips
Enhancing your mobile enterprise security with ibm worklight tips
 
Security Testing In Application Authentication
Security Testing In Application AuthenticationSecurity Testing In Application Authentication
Security Testing In Application Authentication
 
Ca site minder r12 professional study guide
Ca site minder r12 professional study guideCa site minder r12 professional study guide
Ca site minder r12 professional study guide
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 

Similar to AM Side details

20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptxAnand Dhouni
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industryAjit Dadresa
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Authentication with OAuth and Connected Apps
Authentication with OAuth and Connected AppsAuthentication with OAuth and Connected Apps
Authentication with OAuth and Connected AppsSalesforce Developers
 
Cloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperCloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperRoger Chien
 
Identity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingIdentity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingCiente
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADuberbaum
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iPrecisely
 
Dev Dives: Master advanced authentication and performance in Productivity Act...
Dev Dives: Master advanced authentication and performance in Productivity Act...Dev Dives: Master advanced authentication and performance in Productivity Act...
Dev Dives: Master advanced authentication and performance in Productivity Act...UiPathCommunity
 
Why upgrade your MFA to Adaptive Authentication?
Why upgrade your MFA to Adaptive Authentication?Why upgrade your MFA to Adaptive Authentication?
Why upgrade your MFA to Adaptive Authentication?WSO2
 
Understanding Authentication and Authorization in RESTful API: A Comprehensiv...
Understanding Authentication and Authorization in RESTful API: A Comprehensiv...Understanding Authentication and Authorization in RESTful API: A Comprehensiv...
Understanding Authentication and Authorization in RESTful API: A Comprehensiv...Uncodemy
 
05 application security fundamentals - part 2 - security mechanisms - autho...
05   application security fundamentals - part 2 - security mechanisms - autho...05   application security fundamentals - part 2 - security mechanisms - autho...
05 application security fundamentals - part 2 - security mechanisms - autho...appsec
 
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...NCCOMMS
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceShesh Kondi
 

Similar to AM Side details (20)

20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Authentication with OAuth and Connected Apps
Authentication with OAuth and Connected AppsAuthentication with OAuth and Connected Apps
Authentication with OAuth and Connected Apps
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Soa security2
Soa security2Soa security2
Soa security2
 
Cloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperCloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & Gatekeeper
 
Co p
Co pCo p
Co p
 
Identity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingIdentity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud Computing
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
Co p
Co pCo p
Co p
 
AbedElilahElmahmoumP1.pptx
AbedElilahElmahmoumP1.pptxAbedElilahElmahmoumP1.pptx
AbedElilahElmahmoumP1.pptx
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
Dev Dives: Master advanced authentication and performance in Productivity Act...
Dev Dives: Master advanced authentication and performance in Productivity Act...Dev Dives: Master advanced authentication and performance in Productivity Act...
Dev Dives: Master advanced authentication and performance in Productivity Act...
 
WEB API Gateway
WEB API GatewayWEB API Gateway
WEB API Gateway
 
Why upgrade your MFA to Adaptive Authentication?
Why upgrade your MFA to Adaptive Authentication?Why upgrade your MFA to Adaptive Authentication?
Why upgrade your MFA to Adaptive Authentication?
 
Understanding Authentication and Authorization in RESTful API: A Comprehensiv...
Understanding Authentication and Authorization in RESTful API: A Comprehensiv...Understanding Authentication and Authorization in RESTful API: A Comprehensiv...
Understanding Authentication and Authorization in RESTful API: A Comprehensiv...
 
05 application security fundamentals - part 2 - security mechanisms - autho...
05   application security fundamentals - part 2 - security mechanisms - autho...05   application security fundamentals - part 2 - security mechanisms - autho...
05 application security fundamentals - part 2 - security mechanisms - autho...
 
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 

AM Side details

  • 1. Access Management (for Best Practices & Use case) OAM Features OAM Benefit  Authentication & Authorization  Advanced Authentication  Federation features  Single Sign On Features  Password management  Plug-in (Web gate) based security  Coherence feature  Access Manager Reports    Improved and secured authentication & authorization to enterprise level applications. Centralized secure user authentication (LDAP/AD).  Advanced authentication such as time based, network IP based, token service, multifactor authentication will provide us level of security applicable for sensitive enterprise IT applications.  Multi domain environment integration (test1.com & test2.com) to achieve single sign on across different organization application secure access to end user.  Authentication failure scenario/lock/unlock/login attempts, tracking the logins are inbuilt features.  Plug-in based authentication will mask IT infrastructure from the end users which will prevent from server hacking.  Detect anomalies with respective to application access and control the user access and track their session and dismiss ay administrator level.  Authentication & Authorization related reports in the form of dashboards are inbuilt features.  Authentication & Authorization  Advanced Authentication  Federation features  Improved and secured authentication & authorization to enterprise level applications. Centralized secure user authentication (LDAP/AD).  Use Case: In an organization Active Directory is authentication LDAP when you want to use single user login to access ERP & CRM applications then you have 2 way of implementation  1) Integrate ERP & CRM application with Active Directory individually.  2) Integrate Access Manager with ERP and CRM to delegate authentication & authorization to Access manager system.  
  • 2.  Difference between option 1 & option 2 are as follows  LDAP & Application integration V/s Access manager & Application Integration.  Less secured  More secured  Application URL can't be masked from end user  Application UL can be masked  No audit and compliance features available  Rich audit & compliance features available  Do not have control over user sessions  control over user sessions  multifactor authentication is not possible  multifactor authentication is possible  doesn't support cross domain authentication mechanism  Supports cross domain authentication mechanism.  One credential multiple logins to access multiple applications  One credentials one login to access multiple applications  no control over authorization  control over authorization  Password recovery feature is not available  Password recovery feature is available  IP & Time based authentication features are not available  IP and Time based authentication features are available.  Authentication & authorization audits & reports are not available  Authentication & authorization audits and reports features can be configurable.  