SlideShare a Scribd company logo
Choosing the Best Security
Model for Your App
Steve Morecraft
#Logi16
Steve Morecraft
Technical Manager for Europe, Middle East and Africa
Logi Analytics
steve.morecraft@logianalytics.com
Claim to fame: Went to school with Oscar winning actor Colin Firth
ABOUT ME
#Logi16
1. Categorize the various security needs we experience in
the field and learn how to select the best approach for
your application
2. Learn how to implement a solution which meets
requirements
3. Hear and see detail from John Fuller of Ironclad
Technology services of two implementations to meet
specific needs
WHAT WE ARE GOING TO LEARN TODAY
SECURITY NEEDS
Understanding Your Requirements
#Logi16
Authentication – determine the user’s identity
Authorization – assign roles to the user to allow implementation of
rights in the application
Auditing or Accounting – keeping track of what happens when
an application is used
The Core Three A’s of Security
#Logi16
In order of simplicity of needs we experience:
• Standalone
• Integrated Authentication and Centralized SSO
• Federated Single Sign-On
• Embedded
Four Broad Authentication Requirement Categories
#Logi16
Standalone Authentication
#Logi16
• What is it?
Logi Info Server is to manage its own user credentials
• Why Would I Use It?
– When integration is not required with other systems however the Logi application
needs to include user authentication, authorization and auditing
• Considerations:
– Multiple user names and passwords for different systems
– Source of user credentials, assigned roles and rights typically stored in relational
database or directory service
– Normally prompt user for credentials
– Roles and rights to be adopted by authenticated user to be controlled in Logi Info
Standalone Authentication
#Logi16
Integrated Authentication & Centralized SSO
#Logi16
• What is it?
Logi Info Server to be integrated into an existing infrastructure so user management
and authentication can to be carried out in same way as current systems.
• Why Would I Use It?
– For an internal use case using, for example, Integrated Windows Authentication
and Active Directory group membership for roles
• Considerations:
– All user administration can be carried out using standard networking tools
– Authorization Roles can be defined in infrastructure to be used to implement
rights in Logi application
Integrated Authentication & Centralized SSO
#Logi16
Federated Single Sign-On
#Logi16
• What is it?
– Users can access multiple systems and resources following a single login to
identity provider
• Why Would I Use It?
– Scenario where Single Sign On has been deployed in an Enterprise or to support
a product
– Examples PingOne, Windows Identity Foundation
• Considerations:
– Likely need is for Logi system to be included as a target resource will require
configuration and some customization
– Roles and rights can be defined inside or outside the SSO system
Federated Single Sign-On
#Logi16
Embedded Authentication
Example: Embedded Security
Trusted
#Logi16
• What is it?
Info is contained within a web application or portal using user identity and roles
which have been assigned in the hosting application
• Why Would I Use It?
– Create embedded dashboards, reports and analytics into a commercial or
internal web application
– Allows for control over the application experience
• Considerations:
– Re-uses hosting web application’s own user and rights management system
– Requires some work upfront to set it up
– Authorization Roles and rights can be defined in the hosting web application to be
implemented in Logi
Embedded Authentication
#Logi16
• Audit Trail
– Mostly for security assurance
– Can provide usage confirmation
• Usage Data
– Can be used to build metrics
– Data can be used for performance tuning
Auditing
Our Recommendation
How Logi Tackles Each Security Model
#Logi16
• Logi Info Security Element allows:
– Authentication sources
– Authorization through separate User Roles and User
Rights
• Logi Info Event Logging Element allows processes to
record:
– Authenticate User, Build Report, RunSP, RunSQL
– Can also run processes to record other user activities
IMPLEMENTATION OF SECURITY
#Logi16
STANDALONE SECURITY
Use Logi Standard Security Mode
• Present the user with a login form based on the Logi sample
• Can use server side code behind login form or just collect
credentials
• Authenticate using a data layer such as a stored procedure, web
service, plugin etc
• Resolve roles and rights using data layer queries
• Samples on DevNet
#Logi16
INTEGRATED SECURITY AND CENTRALIZED SSO
Configure the web application server to authenticate using
the same settings as other web applications in the
infrastructure
• Configure web application to authenticate users
• For example - Windows Authentication
• Use AuthNT security mode for Logi Info
• Get user’s roles from directory service such as Active Directory
• Resolve user’s rights from roles
#Logi16
FEDERATED SINGLE SIGN-ON
Two main alternatives
• Configure the Logi Application to use the SSO system natively
- Use AuthSession Security mode
- Include SSO libraries in project, use SSO functions in custom login
page to extract user name and other important security data to set
session variables
- Or implement by Plugin
• Use embedded security SecureKey from a web application
already SSO enabled
#Logi16
Logi SecureKey provides the best approach in the majority
of scenarios especially if the hosting system is on a
different machine or different platform
• Pass parameters securely from hosting server as session
variables
• Can pass user name, roles, and rights directly from application
session
• Integrated fully with embedded reports API
• Fully documented with sample code on DevNet
EMBEDDED SECURITY
USING LOGI
John Fuller, Ironclad Technology
Services
#Logi16
John Fuller
Business Intelligence Developer
IRONCLAD TECHNOLOGY SERVICES
john.fuller@ironcladts.com
ABOUT ME
#Logi16
Quick Facts
• Founded in January 2008
• Consulting/Professional services for Government CFO’s,
CIO’s, Supply Chain Managers, and other Senior
Decision Makers
• Offices in Virginia Beach, VA (HQ), Tampa, FL, and
Arlington, VA
• 150+ employees in 17 states and overseas
• TS facility clearance, 91% cleared workforce
• Leveraging the Logi Analytics platform over the past 4
years to build applications for Government customers
CORPORATE SNAPSHOT
Core Competencies
 Big Data & Business Analytics
 Software Development
 Supply Chain/Logistics
 Information Assurance
 Enterprise Resource Planning
(ERP)
 Enterprise IT Support
 Intelligence Support
#Logi16
Two Examples
1. Standalone Security
2. Single Sign-On
IRONCLAD APPLICATION
#Logi16
• User level authentication
- Standard username and password login
• User level authorization on both a screen level and
individual element level
- Roles and rights defined for each user
• User auditability for user input screens
- Track user activity on a transaction level for reporting and
auditability
1. SECURITY REQUIREMENTS
#Logi16
• Utilize Logi’s Standard security option
– Use Logi supplied logon page or apply simple HTML code
modifications to customize the logon page
– Write simple database stored procedure to authenticate the user
and determine right/roles based on a user table
1. SECURITY SOLUTION AUTHENTICATION
#Logi16
• Use the roles and rights retrieved from the Standard security child
elements coupled with the database stored procedure to easily
control authorization throughout the application
• Use the Security Right ID attribute to control user authorization
- Applicable to entire Logi reports
- Applicable to specific elements on any given report
• Individual records in data table elements can also be restricted by
including the UserRoles~ and UserRights~ tokens within the SQL
queries feeding the reports
1. SECURITY SOLUTION AUTHORIZATION
#Logi16
• Use the @Function.UserName~ token coupled with Logi
Processes and database user stored procedures to track
user activity
1. SECURITY SOLUTION AUDITABILITY
#Logi16
• User level authentication
- DoD Common Access Card (CAC) login
• User level authorization on both a screen level and
individual element level
- Roles and rights defined for each user
• User auditability for user input screens
- Track user activity on a transaction level for reporting and
auditability
2. SECURITY REQUIREMENTS - SSO
#Logi16
• Export functionality and file management and security
for user generated files
– Populate and retain Adobe .pdf and MS Excel templates with
user input data
2. SECURITY REQUIREMENTS - SSO
#Logi16
• Authentication
– Build, configure and deploy custom CAC enabled login process
to feed into Logi’s AuthSession security option
• Authorization
– Use the roles and rights retrieved from the AuthSession security
child elements coupled with a database stored procedure to
easily control authorization throughout the application
2. SECURITY SOLUTION SSO
#Logi16
• Auditability
– Use the @Function.UserName~ token coupled with Logi
Processes and database user stored procedures to track user
activity
2. SECURITY SOLUTION SSO
#Logi16
• File management and Security
– Build file management system with built in Logi elements coupled
with database code
– The custom CAC enabled login process along with the
AuthSession Logi security option secures the entire Logi
application, including user generated files not associated with the
Logi software
2. SECURITY SOLUTION SSO
#Logi16
SSO EXAMPLE – HOW IT WORKS
#Logi16
 The built in Logi security options are easy to use and
provide a very high level of control
 The Standard security option requires very little
configuration and can be used for securing applications
that do not generate new files within the application
IRONCLAD: LESSONS LEARNED
#Logi16
 Custom built Single Sign On processes securing the
entire application folder can be plugged into Logi
applications using the AuthSession option.
 This approach is best used for applications that provide
the functionality for users to generate new files. The
custom security layer secures the entire application while
Logi handles the authentication through its built-in
elements.
IRONCLAD: LESSONS LEARNED
Extensible Solution
The Logi Info product provides a
flexible and extensible means to
solving your security needs for your
application
Questions?
Contact our Professional Services
team, Expert On-Demand or your
Logi Analytics Partner.
steve.morecraft@
logianalytics.com

More Related Content

What's hot

Beyond the Bar Chart - How to Build Better Visualizations
Beyond the Bar Chart - How to Build Better VisualizationsBeyond the Bar Chart - How to Build Better Visualizations
Beyond the Bar Chart - How to Build Better VisualizationsLogi Analytics
 
Integrate External Data w/ business connectivity services (BCS)
Integrate External Data w/ business connectivity services (BCS)Integrate External Data w/ business connectivity services (BCS)
Integrate External Data w/ business connectivity services (BCS)Tom Resing
 
Scottish Summit - Azure Information Protection and SharePoint 2020
Scottish Summit - Azure Information Protection and SharePoint 2020Scottish Summit - Azure Information Protection and SharePoint 2020
Scottish Summit - Azure Information Protection and SharePoint 2020Albert Hoitingh
 
Managing your user data with Sitecore xDB
Managing your user data with Sitecore xDBManaging your user data with Sitecore xDB
Managing your user data with Sitecore xDBRuud van Falier
 
SharePoint Saturday Toronto 2015 - Inside the mind of a SharePoint Architect
SharePoint Saturday Toronto 2015 - Inside the mind of a SharePoint ArchitectSharePoint Saturday Toronto 2015 - Inside the mind of a SharePoint Architect
SharePoint Saturday Toronto 2015 - Inside the mind of a SharePoint ArchitectNoorez Khamis
 
What’s new in SharePoint 2016!
What’s new in SharePoint 2016!What’s new in SharePoint 2016!
What’s new in SharePoint 2016!AntonioMaio2
 
Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016
Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016
Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016Adam Levithan
 
MFILE_Presentation-1
MFILE_Presentation-1MFILE_Presentation-1
MFILE_Presentation-1Ragesh kv
 
Style This: Your Essential Toolkit for Dashboard Design
Style This: Your Essential Toolkit for Dashboard DesignStyle This: Your Essential Toolkit for Dashboard Design
Style This: Your Essential Toolkit for Dashboard DesignLogi Analytics
 
IBM Connections Customizer: From Zero To Hero
IBM Connections Customizer: From Zero To HeroIBM Connections Customizer: From Zero To Hero
IBM Connections Customizer: From Zero To HeroLetsConnect
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutQuest
 
SharePoint Migration Series: Success Takes Three Actions
SharePoint Migration Series: Success Takes Three ActionsSharePoint Migration Series: Success Takes Three Actions
SharePoint Migration Series: Success Takes Three ActionsAdam Levithan
 
5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for Hybrid5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for HybridAdam Levithan
 
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...Albert Hoitingh
 
Elasticsearch – Introducing New Containerized Metrics
Elasticsearch – Introducing New Containerized MetricsElasticsearch – Introducing New Containerized Metrics
Elasticsearch – Introducing New Containerized MetricsLetsConnect
 
SharePoint 2013 ediscovery overview
SharePoint 2013 ediscovery overviewSharePoint 2013 ediscovery overview
SharePoint 2013 ediscovery overviewElie Kash
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideDavid J Rosenthal
 
Sp24 design a share point 2013 architecture – the basics
Sp24   design a share point 2013 architecture – the basicsSp24   design a share point 2013 architecture – the basics
Sp24 design a share point 2013 architecture – the basicsAlexander Meijers
 
Real world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedReal world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedAntonioMaio2
 

What's hot (20)

Beyond the Bar Chart - How to Build Better Visualizations
Beyond the Bar Chart - How to Build Better VisualizationsBeyond the Bar Chart - How to Build Better Visualizations
Beyond the Bar Chart - How to Build Better Visualizations
 
Integrate External Data w/ business connectivity services (BCS)
Integrate External Data w/ business connectivity services (BCS)Integrate External Data w/ business connectivity services (BCS)
Integrate External Data w/ business connectivity services (BCS)
 
Scottish Summit - Azure Information Protection and SharePoint 2020
Scottish Summit - Azure Information Protection and SharePoint 2020Scottish Summit - Azure Information Protection and SharePoint 2020
Scottish Summit - Azure Information Protection and SharePoint 2020
 
Managing your user data with Sitecore xDB
Managing your user data with Sitecore xDBManaging your user data with Sitecore xDB
Managing your user data with Sitecore xDB
 
Meet Logi 12.2
Meet Logi 12.2Meet Logi 12.2
Meet Logi 12.2
 
SharePoint Saturday Toronto 2015 - Inside the mind of a SharePoint Architect
SharePoint Saturday Toronto 2015 - Inside the mind of a SharePoint ArchitectSharePoint Saturday Toronto 2015 - Inside the mind of a SharePoint Architect
SharePoint Saturday Toronto 2015 - Inside the mind of a SharePoint Architect
 
What’s new in SharePoint 2016!
What’s new in SharePoint 2016!What’s new in SharePoint 2016!
What’s new in SharePoint 2016!
 
Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016
Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016
Hybrid Dilemma: Dividing Content Between Azure, Office 365 & SharePoint 2016
 
MFILE_Presentation-1
MFILE_Presentation-1MFILE_Presentation-1
MFILE_Presentation-1
 
Style This: Your Essential Toolkit for Dashboard Design
Style This: Your Essential Toolkit for Dashboard DesignStyle This: Your Essential Toolkit for Dashboard Design
Style This: Your Essential Toolkit for Dashboard Design
 
IBM Connections Customizer: From Zero To Hero
IBM Connections Customizer: From Zero To HeroIBM Connections Customizer: From Zero To Hero
IBM Connections Customizer: From Zero To Hero
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
 
SharePoint Migration Series: Success Takes Three Actions
SharePoint Migration Series: Success Takes Three ActionsSharePoint Migration Series: Success Takes Three Actions
SharePoint Migration Series: Success Takes Three Actions
 
5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for Hybrid5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for Hybrid
 
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...
Modern Workplace Conference 2022 - Paris Microsoft Information Protection Dem...
 
Elasticsearch – Introducing New Containerized Metrics
Elasticsearch – Introducing New Containerized MetricsElasticsearch – Introducing New Containerized Metrics
Elasticsearch – Introducing New Containerized Metrics
 
SharePoint 2013 ediscovery overview
SharePoint 2013 ediscovery overviewSharePoint 2013 ediscovery overview
SharePoint 2013 ediscovery overview
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions Guide
 
Sp24 design a share point 2013 architecture – the basics
Sp24   design a share point 2013 architecture – the basicsSp24   design a share point 2013 architecture – the basics
Sp24 design a share point 2013 architecture – the basics
 
Real world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedReal world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - published
 

Similar to Choosing the Best Business Intelligence Security Model for Your App

Logincat MFA and SSO
Logincat  MFA and SSOLogincat  MFA and SSO
Logincat MFA and SSORohit Kapoor
 
Web Security Overview
Web Security OverviewWeb Security Overview
Web Security OverviewNoah Jaehnert
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodromDoina Draganescu
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches Jim Kaplan CIA CFE
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
 
Dreamforce 2017 - Advanced Logging Patterns with Platform Events
Dreamforce 2017 - Advanced Logging Patterns with Platform EventsDreamforce 2017 - Advanced Logging Patterns with Platform Events
Dreamforce 2017 - Advanced Logging Patterns with Platform Eventsandyinthecloud
 
Ladies Be Architects: Integration Study Group: Security & State Management
Ladies Be Architects: Integration Study Group: Security & State ManagementLadies Be Architects: Integration Study Group: Security & State Management
Ladies Be Architects: Integration Study Group: Security & State Managementgemziebeth
 
Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3Mark Adcock
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns WSO2
 
ReflectInsight - Let your application speak volume
ReflectInsight - Let your application speak volumeReflectInsight - Let your application speak volume
ReflectInsight - Let your application speak volumeCallon Campbell
 
Implementation of Single Sign On (SSO) Technology Using SAML Standards At U...
Implementation of Single Sign On (SSO) Technology  Using SAML Standards  At U...Implementation of Single Sign On (SSO) Technology  Using SAML Standards  At U...
Implementation of Single Sign On (SSO) Technology Using SAML Standards At U...irawan afrianto
 
Red Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceRed Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceMarc Boorshtein
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppAppsecco
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applicationskanimozhin
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsCache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsInterSystems Corporation
 

Similar to Choosing the Best Business Intelligence Security Model for Your App (20)

OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)
 
Logincat MFA and SSO
Logincat  MFA and SSOLogincat  MFA and SSO
Logincat MFA and SSO
 
Web Security Overview
Web Security OverviewWeb Security Overview
Web Security Overview
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 
Dreamforce 2017 - Advanced Logging Patterns with Platform Events
Dreamforce 2017 - Advanced Logging Patterns with Platform EventsDreamforce 2017 - Advanced Logging Patterns with Platform Events
Dreamforce 2017 - Advanced Logging Patterns with Platform Events
 
Ladies Be Architects: Integration Study Group: Security & State Management
Ladies Be Architects: Integration Study Group: Security & State ManagementLadies Be Architects: Integration Study Group: Security & State Management
Ladies Be Architects: Integration Study Group: Security & State Management
 
Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3Secure Development on the Salesforce Platform - Part 3
Secure Development on the Salesforce Platform - Part 3
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
 
ReflectInsight - Let your application speak volume
ReflectInsight - Let your application speak volumeReflectInsight - Let your application speak volume
ReflectInsight - Let your application speak volume
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Implementation of Single Sign On (SSO) Technology Using SAML Standards At U...
Implementation of Single Sign On (SSO) Technology  Using SAML Standards  At U...Implementation of Single Sign On (SSO) Technology  Using SAML Standards  At U...
Implementation of Single Sign On (SSO) Technology Using SAML Standards At U...
 
Red Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceRed Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and Compliance
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your App
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsCache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure Applications
 

More from Logi Analytics

Why the Future of Analytics Is Embedded
Why the Future of Analytics Is EmbeddedWhy the Future of Analytics Is Embedded
Why the Future of Analytics Is EmbeddedLogi Analytics
 
What's the Big Deal About Big Data?
What's the Big Deal About Big Data?What's the Big Deal About Big Data?
What's the Big Deal About Big Data?Logi Analytics
 
The Evolution of Business Intelligence: Maturing Enterprise Analytics
The Evolution of Business Intelligence: Maturing Enterprise AnalyticsThe Evolution of Business Intelligence: Maturing Enterprise Analytics
The Evolution of Business Intelligence: Maturing Enterprise AnalyticsLogi Analytics
 
Building and Deploying a SaaS Business Intelligence Solution
Building and Deploying a SaaS Business Intelligence SolutionBuilding and Deploying a SaaS Business Intelligence Solution
Building and Deploying a SaaS Business Intelligence SolutionLogi Analytics
 
Bringing Your SaaS Apps to Market
Bringing Your SaaS Apps to MarketBringing Your SaaS Apps to Market
Bringing Your SaaS Apps to MarketLogi Analytics
 
There's a Map for That!
There's a Map for That!There's a Map for That!
There's a Map for That!Logi Analytics
 
Logi Hacks: Tips & Tricks for Using Info
Logi Hacks: Tips & Tricks for Using InfoLogi Hacks: Tips & Tricks for Using Info
Logi Hacks: Tips & Tricks for Using InfoLogi Analytics
 
Extreme Application Makeover
Extreme Application MakeoverExtreme Application Makeover
Extreme Application MakeoverLogi Analytics
 
What Will Embedded Analytics Look Like in 2020?
What Will Embedded Analytics Look Like in 2020?What Will Embedded Analytics Look Like in 2020?
What Will Embedded Analytics Look Like in 2020?Logi Analytics
 
Embedded Analytics Maturity Model
Embedded Analytics Maturity ModelEmbedded Analytics Maturity Model
Embedded Analytics Maturity ModelLogi Analytics
 
Creating Great Dashboards - Beyond the Colors & Fonts
Creating Great Dashboards - Beyond the Colors & FontsCreating Great Dashboards - Beyond the Colors & Fonts
Creating Great Dashboards - Beyond the Colors & FontsLogi Analytics
 

More from Logi Analytics (12)

Why the Future of Analytics Is Embedded
Why the Future of Analytics Is EmbeddedWhy the Future of Analytics Is Embedded
Why the Future of Analytics Is Embedded
 
What's the Big Deal About Big Data?
What's the Big Deal About Big Data?What's the Big Deal About Big Data?
What's the Big Deal About Big Data?
 
The Evolution of Business Intelligence: Maturing Enterprise Analytics
The Evolution of Business Intelligence: Maturing Enterprise AnalyticsThe Evolution of Business Intelligence: Maturing Enterprise Analytics
The Evolution of Business Intelligence: Maturing Enterprise Analytics
 
Building and Deploying a SaaS Business Intelligence Solution
Building and Deploying a SaaS Business Intelligence SolutionBuilding and Deploying a SaaS Business Intelligence Solution
Building and Deploying a SaaS Business Intelligence Solution
 
Bringing Your SaaS Apps to Market
Bringing Your SaaS Apps to MarketBringing Your SaaS Apps to Market
Bringing Your SaaS Apps to Market
 
There's a Map for That!
There's a Map for That!There's a Map for That!
There's a Map for That!
 
Logi Hacks: Tips & Tricks for Using Info
Logi Hacks: Tips & Tricks for Using InfoLogi Hacks: Tips & Tricks for Using Info
Logi Hacks: Tips & Tricks for Using Info
 
Extreme Application Makeover
Extreme Application MakeoverExtreme Application Makeover
Extreme Application Makeover
 
What Will Embedded Analytics Look Like in 2020?
What Will Embedded Analytics Look Like in 2020?What Will Embedded Analytics Look Like in 2020?
What Will Embedded Analytics Look Like in 2020?
 
The Path to SaaS
The Path to SaaSThe Path to SaaS
The Path to SaaS
 
Embedded Analytics Maturity Model
Embedded Analytics Maturity ModelEmbedded Analytics Maturity Model
Embedded Analytics Maturity Model
 
Creating Great Dashboards - Beyond the Colors & Fonts
Creating Great Dashboards - Beyond the Colors & FontsCreating Great Dashboards - Beyond the Colors & Fonts
Creating Great Dashboards - Beyond the Colors & Fonts
 

Recently uploaded

一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单ewymefz
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIAlejandraGmez176757
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .NABLAS株式会社
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单vcaxypu
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单nscud
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单ewymefz
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sMAQIB18
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJames Polillo
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单ocavb
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单ewymefz
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单ukgaet
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhArpitMalhotra16
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单ewymefz
 
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...Domenico Conte
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单ewymefz
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsCEPTES Software Inc
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单nscud
 
Uber Ride Supply Demand Gap Analysis Report
Uber Ride Supply Demand Gap Analysis ReportUber Ride Supply Demand Gap Analysis Report
Uber Ride Supply Demand Gap Analysis ReportSatyamNeelmani2
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesStarCompliance.io
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsalex933524
 

Recently uploaded (20)

一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage s
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
Professional Data Engineer Certification Exam Guide  _  Learn  _  Google Clou...
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
Uber Ride Supply Demand Gap Analysis Report
Uber Ride Supply Demand Gap Analysis ReportUber Ride Supply Demand Gap Analysis Report
Uber Ride Supply Demand Gap Analysis Report
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflows
 

Choosing the Best Business Intelligence Security Model for Your App

  • 1. Choosing the Best Security Model for Your App Steve Morecraft
  • 2. #Logi16 Steve Morecraft Technical Manager for Europe, Middle East and Africa Logi Analytics steve.morecraft@logianalytics.com Claim to fame: Went to school with Oscar winning actor Colin Firth ABOUT ME
  • 3. #Logi16 1. Categorize the various security needs we experience in the field and learn how to select the best approach for your application 2. Learn how to implement a solution which meets requirements 3. Hear and see detail from John Fuller of Ironclad Technology services of two implementations to meet specific needs WHAT WE ARE GOING TO LEARN TODAY
  • 5. #Logi16 Authentication – determine the user’s identity Authorization – assign roles to the user to allow implementation of rights in the application Auditing or Accounting – keeping track of what happens when an application is used The Core Three A’s of Security
  • 6. #Logi16 In order of simplicity of needs we experience: • Standalone • Integrated Authentication and Centralized SSO • Federated Single Sign-On • Embedded Four Broad Authentication Requirement Categories
  • 8. #Logi16 • What is it? Logi Info Server is to manage its own user credentials • Why Would I Use It? – When integration is not required with other systems however the Logi application needs to include user authentication, authorization and auditing • Considerations: – Multiple user names and passwords for different systems – Source of user credentials, assigned roles and rights typically stored in relational database or directory service – Normally prompt user for credentials – Roles and rights to be adopted by authenticated user to be controlled in Logi Info Standalone Authentication
  • 10. #Logi16 • What is it? Logi Info Server to be integrated into an existing infrastructure so user management and authentication can to be carried out in same way as current systems. • Why Would I Use It? – For an internal use case using, for example, Integrated Windows Authentication and Active Directory group membership for roles • Considerations: – All user administration can be carried out using standard networking tools – Authorization Roles can be defined in infrastructure to be used to implement rights in Logi application Integrated Authentication & Centralized SSO
  • 12. #Logi16 • What is it? – Users can access multiple systems and resources following a single login to identity provider • Why Would I Use It? – Scenario where Single Sign On has been deployed in an Enterprise or to support a product – Examples PingOne, Windows Identity Foundation • Considerations: – Likely need is for Logi system to be included as a target resource will require configuration and some customization – Roles and rights can be defined inside or outside the SSO system Federated Single Sign-On
  • 14. #Logi16 • What is it? Info is contained within a web application or portal using user identity and roles which have been assigned in the hosting application • Why Would I Use It? – Create embedded dashboards, reports and analytics into a commercial or internal web application – Allows for control over the application experience • Considerations: – Re-uses hosting web application’s own user and rights management system – Requires some work upfront to set it up – Authorization Roles and rights can be defined in the hosting web application to be implemented in Logi Embedded Authentication
  • 15. #Logi16 • Audit Trail – Mostly for security assurance – Can provide usage confirmation • Usage Data – Can be used to build metrics – Data can be used for performance tuning Auditing
  • 16. Our Recommendation How Logi Tackles Each Security Model
  • 17. #Logi16 • Logi Info Security Element allows: – Authentication sources – Authorization through separate User Roles and User Rights • Logi Info Event Logging Element allows processes to record: – Authenticate User, Build Report, RunSP, RunSQL – Can also run processes to record other user activities IMPLEMENTATION OF SECURITY
  • 18. #Logi16 STANDALONE SECURITY Use Logi Standard Security Mode • Present the user with a login form based on the Logi sample • Can use server side code behind login form or just collect credentials • Authenticate using a data layer such as a stored procedure, web service, plugin etc • Resolve roles and rights using data layer queries • Samples on DevNet
  • 19. #Logi16 INTEGRATED SECURITY AND CENTRALIZED SSO Configure the web application server to authenticate using the same settings as other web applications in the infrastructure • Configure web application to authenticate users • For example - Windows Authentication • Use AuthNT security mode for Logi Info • Get user’s roles from directory service such as Active Directory • Resolve user’s rights from roles
  • 20. #Logi16 FEDERATED SINGLE SIGN-ON Two main alternatives • Configure the Logi Application to use the SSO system natively - Use AuthSession Security mode - Include SSO libraries in project, use SSO functions in custom login page to extract user name and other important security data to set session variables - Or implement by Plugin • Use embedded security SecureKey from a web application already SSO enabled
  • 21. #Logi16 Logi SecureKey provides the best approach in the majority of scenarios especially if the hosting system is on a different machine or different platform • Pass parameters securely from hosting server as session variables • Can pass user name, roles, and rights directly from application session • Integrated fully with embedded reports API • Fully documented with sample code on DevNet EMBEDDED SECURITY
  • 22. USING LOGI John Fuller, Ironclad Technology Services
  • 23. #Logi16 John Fuller Business Intelligence Developer IRONCLAD TECHNOLOGY SERVICES john.fuller@ironcladts.com ABOUT ME
  • 24. #Logi16 Quick Facts • Founded in January 2008 • Consulting/Professional services for Government CFO’s, CIO’s, Supply Chain Managers, and other Senior Decision Makers • Offices in Virginia Beach, VA (HQ), Tampa, FL, and Arlington, VA • 150+ employees in 17 states and overseas • TS facility clearance, 91% cleared workforce • Leveraging the Logi Analytics platform over the past 4 years to build applications for Government customers CORPORATE SNAPSHOT Core Competencies  Big Data & Business Analytics  Software Development  Supply Chain/Logistics  Information Assurance  Enterprise Resource Planning (ERP)  Enterprise IT Support  Intelligence Support
  • 25. #Logi16 Two Examples 1. Standalone Security 2. Single Sign-On IRONCLAD APPLICATION
  • 26. #Logi16 • User level authentication - Standard username and password login • User level authorization on both a screen level and individual element level - Roles and rights defined for each user • User auditability for user input screens - Track user activity on a transaction level for reporting and auditability 1. SECURITY REQUIREMENTS
  • 27. #Logi16 • Utilize Logi’s Standard security option – Use Logi supplied logon page or apply simple HTML code modifications to customize the logon page – Write simple database stored procedure to authenticate the user and determine right/roles based on a user table 1. SECURITY SOLUTION AUTHENTICATION
  • 28. #Logi16 • Use the roles and rights retrieved from the Standard security child elements coupled with the database stored procedure to easily control authorization throughout the application • Use the Security Right ID attribute to control user authorization - Applicable to entire Logi reports - Applicable to specific elements on any given report • Individual records in data table elements can also be restricted by including the UserRoles~ and UserRights~ tokens within the SQL queries feeding the reports 1. SECURITY SOLUTION AUTHORIZATION
  • 29. #Logi16 • Use the @Function.UserName~ token coupled with Logi Processes and database user stored procedures to track user activity 1. SECURITY SOLUTION AUDITABILITY
  • 30. #Logi16 • User level authentication - DoD Common Access Card (CAC) login • User level authorization on both a screen level and individual element level - Roles and rights defined for each user • User auditability for user input screens - Track user activity on a transaction level for reporting and auditability 2. SECURITY REQUIREMENTS - SSO
  • 31. #Logi16 • Export functionality and file management and security for user generated files – Populate and retain Adobe .pdf and MS Excel templates with user input data 2. SECURITY REQUIREMENTS - SSO
  • 32. #Logi16 • Authentication – Build, configure and deploy custom CAC enabled login process to feed into Logi’s AuthSession security option • Authorization – Use the roles and rights retrieved from the AuthSession security child elements coupled with a database stored procedure to easily control authorization throughout the application 2. SECURITY SOLUTION SSO
  • 33. #Logi16 • Auditability – Use the @Function.UserName~ token coupled with Logi Processes and database user stored procedures to track user activity 2. SECURITY SOLUTION SSO
  • 34. #Logi16 • File management and Security – Build file management system with built in Logi elements coupled with database code – The custom CAC enabled login process along with the AuthSession Logi security option secures the entire Logi application, including user generated files not associated with the Logi software 2. SECURITY SOLUTION SSO
  • 35. #Logi16 SSO EXAMPLE – HOW IT WORKS
  • 36. #Logi16  The built in Logi security options are easy to use and provide a very high level of control  The Standard security option requires very little configuration and can be used for securing applications that do not generate new files within the application IRONCLAD: LESSONS LEARNED
  • 37. #Logi16  Custom built Single Sign On processes securing the entire application folder can be plugged into Logi applications using the AuthSession option.  This approach is best used for applications that provide the functionality for users to generate new files. The custom security layer secures the entire application while Logi handles the authentication through its built-in elements. IRONCLAD: LESSONS LEARNED
  • 38. Extensible Solution The Logi Info product provides a flexible and extensible means to solving your security needs for your application
  • 39. Questions? Contact our Professional Services team, Expert On-Demand or your Logi Analytics Partner.

Editor's Notes

  1. He never calls
  2. Traditional approach to security Exchange credentials Allocate roles to users to prohibit and allow operations in application
  3. Standalone – Logi Info Server is to manage its own user credentials Typical scenario is situation where integration is not required with other systems however the Logi application needs to include user authentication Source of user credentials, assigned roles and rights typically stored in relational database
  4. Integrated Security – Logi Info Server is to be integrated into existing infrastructure so user management and authentication to be carried out in same way as current systems Typically for an internal use case using Windows Authentication and Active Directory group membership for role All user administration carried out using standard networking tools
  5. Single Sign On – authentication is carried out by identity provider using single set of credentials in order to access multiple applications which is to include Logi Info Can be centralized or federated using identity and service providers Likely need is for Logi system to be included as a target resource
  6. What is it? Logi Info is contained within web application or portal using user identity and roles which have been assigned in the hosting application Why Would I Use It? Can be used to create embedded dashboards, reports and analytics into a commercial or internal web application What to Consider: Typically for ISV or SaaS provider with existing system Hosting web application has its own user and rights management system Rather than rework all business rules much more efficient to create trust relationship between hosting system and Logi to reuse identity and roles as a trusted subsystem