SlideShare a Scribd company logo
© 2014 IBM Corporation
ID105: Extend Your Security
Into the Cloud with IBM
SmartCloud Notes
David Kern | Resident Paranoid, STSM and
Global ICS Security Architect | IBM
22
IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole
discretion.
Information regarding potential future products is intended to outline our general product direction and it should not be
relied on in making a purchasing decision.
The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver
any material, code or functionality. Information about potential future products may not be incorporated into any contract.
The development, release, and timing of any future features or functionality described for our products remains at our sole
discretion
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment.
The actual throughput or performance that any user will experience will vary depending upon many factors, including
considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve
results similar to those stated here.
Please Note
10
Transparent Authentication
 Users have too many passwords
 Password prompts are annoying
 Many “different” passwords leads to lower security
 Users shouldn't know or care who provides their services or from where
 Password management is annoying – by using cryptographic mechanisms instead of
passwords, we can help keep the problem from getting worse, and maybe even help
improve the situation.
 SmartCloud for Social Business uses Security Assertion Markup Language (SAML)
– Public standard from OASIS
– Based on the strength of PKI – SAML uses signed XML identity assertions
– Many implementations available from IBM and third party providers
●
Including open source implementations
– Many organizations currently use SAML for web SSO
– Did I mention that SAML is a public standard yet?
11
Federated Identity
 Use your existing web passwords for SmartCloud for Social Business web resources
 Keep your passwords behind your corporate firewall
 Manage your own password requirements
 Manage your own change intervals
 Manage your own re-use requirements
 Never send a password over the 'net to SCSB!
– Also prevents crackers from guessing your passwords against SCSB
 Because SAML is a public standard, you can use any SAML 1.1 or SAML 2.0 compliant
identity provider
– Microsoft's ADFS 2.0 for Active Directory integration
– IBM's own Tivoli Federated Identity Manager (TFIM)
– OpenSAML
 IdP initiated SAML flows support a “web portal” user experience
12
Federated Identity
Web browser SAML Identity Provider
TAM/WebSEAL
TFIM
(SAML SP)
Customer Site
Internet
SCSB
SC Web App
443 (https)
13
Federated Identity
Web browser SAML Identity Provider
TAM/WebSEAL
TFIM
(SAML SP)
Customer Site
Internet
SCSB
SC Web App
14
Federated Identity
Web browser SAML Identity Provider
TAM/WebSEAL
TFIM
(SAML SP)
Customer Site
Internet
SCSB
SC Web App
15
Federated Identity
Web browser SAML Identity Provider
TAM/WebSEAL
TFIM
(SAML SP)
Customer Site
Internet
SCSB
SC Web App
HTTP(s) POST with SAML assertion
16
Federated Identity
Web browser SAML Identity Provider
TAM/WebSEAL
TFIM
(SAML SP)
Customer Site
Internet
SCSB
SC Web App
HTTP(s) GET with session cookie
17
Integrated login across SmartCloud for Social
Business services
 Users directly authenticate once (and only once) to SCSB
 Transparently authenticate to SCSB services around the world
 Your users shouldn't care about our back end topology
– Different data centers, different cages, different servers – no problem
 The advantages of centralized authentication and distributed processing power at the
same time
– Can help simplify integration of new services and partners
– Can help make expansion easier to accomodate
 Password data storage and checking minimized
6262
© Copyright IBM Corporation 2014. All rights reserved.
 U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
 IBM, the IBM logo, ibm.com, Lotus, Tivoli, Rational, and Lotus Notes, Notes, Domino, LotusLive, LotusLive Notes, and IBM SmartCloud are trademarks or registered trademarks of
International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this
information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such
trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at
www.ibm.com/legal/copytrade.shtml
Other company, product, or service names may be trademarks or service marks of others.
Availability. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates.
The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views. They are provided for informational purposes only, and are neither
intended to, nor shall have the effect of being, legal or other guidance or advice to any participant. While efforts were made to verify the completeness and accuracy of the information
contained in this presentation, it is provided AS-IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise
related to, this presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM or
its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software.
All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and
performance characteristics may vary by customer. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you
will result in any specific sales, revenue growth or other results.
Acknowledgements and Disclaimers

More Related Content

What's hot

A complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panoramaA complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panorama
Microsoft Singapore
 
We4IT lcty 2013 - keynote - ibm messaging & collaboration roadmap 2013
We4IT lcty 2013 - keynote - ibm messaging & collaboration roadmap 2013We4IT lcty 2013 - keynote - ibm messaging & collaboration roadmap 2013
We4IT lcty 2013 - keynote - ibm messaging & collaboration roadmap 2013
We4IT Group
 
Lotus Live 4 ClubAlliances.com
Lotus Live 4 ClubAlliances.comLotus Live 4 ClubAlliances.com
Lotus Live 4 ClubAlliances.com
Philippe MATHIEU
 
We4IT LCTY 2013 - Social Girl - Social Communications Strategy and the IBM Sa...
We4IT LCTY 2013 - Social Girl - Social Communications Strategy and the IBM Sa...We4IT LCTY 2013 - Social Girl - Social Communications Strategy and the IBM Sa...
We4IT LCTY 2013 - Social Girl - Social Communications Strategy and the IBM Sa...
We4IT Group
 
IBM Mobile strategy for Social Business - May 2012
IBM Mobile strategy for Social Business - May 2012IBM Mobile strategy for Social Business - May 2012
IBM Mobile strategy for Social Business - May 2012
Ed Brill
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
Chris Pepin
 
Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2
Dirk Nicol
 
Future of productivity hau lu
Future of productivity hau luFuture of productivity hau lu
Future of productivity hau lu
Microsoft Singapore
 
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
 Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
Ryan Boyles
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Dirk Nicol
 
Jmp303 the great howto 5
Jmp303 the great howto 5Jmp303 the great howto 5
Jmp303 the great howto 5
Mats Jansson
 
Ibm notes 9 social edition (external)
Ibm notes 9 social edition (external)Ibm notes 9 social edition (external)
Ibm notes 9 social edition (external)
Scott Souder
 
IBM Worklight - Introduction
IBM Worklight - IntroductionIBM Worklight - Introduction
IBM Worklight - Introduction
Maarga Systems
 
The journey to share point steve sofian_arvato
The journey to share point steve sofian_arvatoThe journey to share point steve sofian_arvato
The journey to share point steve sofian_arvato
Microsoft Singapore
 
Whats new in IBM Notes & iNotes Version 9 Social Edition
Whats new in IBM Notes & iNotes Version 9 Social EditionWhats new in IBM Notes & iNotes Version 9 Social Edition
Whats new in IBM Notes & iNotes Version 9 Social Edition
Novakenstein
 
ID106 Making the Move from Rich Clients to Browsers
ID106 Making the Move from Rich Clients to BrowsersID106 Making the Move from Rich Clients to Browsers
ID106 Making the Move from Rich Clients to Browsers
Rahul A. Garg
 
Inter connected enterprise trends & directions feb 19 2013
Inter connected enterprise trends & directions feb 19 2013Inter connected enterprise trends & directions feb 19 2013
Inter connected enterprise trends & directions feb 19 2013
Sid Bhatia
 
IBM Collaboration Solutions Domino on Cloud ICSUG 2015
IBM Collaboration Solutions Domino on Cloud ICSUG 2015IBM Collaboration Solutions Domino on Cloud ICSUG 2015
IBM Collaboration Solutions Domino on Cloud ICSUG 2015
ICS User Group
 

What's hot (18)

A complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panoramaA complete bi solution for the microsoft platform adam mor panorama
A complete bi solution for the microsoft platform adam mor panorama
 
We4IT lcty 2013 - keynote - ibm messaging & collaboration roadmap 2013
We4IT lcty 2013 - keynote - ibm messaging & collaboration roadmap 2013We4IT lcty 2013 - keynote - ibm messaging & collaboration roadmap 2013
We4IT lcty 2013 - keynote - ibm messaging & collaboration roadmap 2013
 
Lotus Live 4 ClubAlliances.com
Lotus Live 4 ClubAlliances.comLotus Live 4 ClubAlliances.com
Lotus Live 4 ClubAlliances.com
 
We4IT LCTY 2013 - Social Girl - Social Communications Strategy and the IBM Sa...
We4IT LCTY 2013 - Social Girl - Social Communications Strategy and the IBM Sa...We4IT LCTY 2013 - Social Girl - Social Communications Strategy and the IBM Sa...
We4IT LCTY 2013 - Social Girl - Social Communications Strategy and the IBM Sa...
 
IBM Mobile strategy for Social Business - May 2012
IBM Mobile strategy for Social Business - May 2012IBM Mobile strategy for Social Business - May 2012
IBM Mobile strategy for Social Business - May 2012
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2Gwc mobilefoundation-final-2
Gwc mobilefoundation-final-2
 
Future of productivity hau lu
Future of productivity hau luFuture of productivity hau lu
Future of productivity hau lu
 
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
 Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
Connect the Cloud: A Strategy for Enterprise, Mobile and Developer APIs
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
Jmp303 the great howto 5
Jmp303 the great howto 5Jmp303 the great howto 5
Jmp303 the great howto 5
 
Ibm notes 9 social edition (external)
Ibm notes 9 social edition (external)Ibm notes 9 social edition (external)
Ibm notes 9 social edition (external)
 
IBM Worklight - Introduction
IBM Worklight - IntroductionIBM Worklight - Introduction
IBM Worklight - Introduction
 
The journey to share point steve sofian_arvato
The journey to share point steve sofian_arvatoThe journey to share point steve sofian_arvato
The journey to share point steve sofian_arvato
 
Whats new in IBM Notes & iNotes Version 9 Social Edition
Whats new in IBM Notes & iNotes Version 9 Social EditionWhats new in IBM Notes & iNotes Version 9 Social Edition
Whats new in IBM Notes & iNotes Version 9 Social Edition
 
ID106 Making the Move from Rich Clients to Browsers
ID106 Making the Move from Rich Clients to BrowsersID106 Making the Move from Rich Clients to Browsers
ID106 Making the Move from Rich Clients to Browsers
 
Inter connected enterprise trends & directions feb 19 2013
Inter connected enterprise trends & directions feb 19 2013Inter connected enterprise trends & directions feb 19 2013
Inter connected enterprise trends & directions feb 19 2013
 
IBM Collaboration Solutions Domino on Cloud ICSUG 2015
IBM Collaboration Solutions Domino on Cloud ICSUG 2015IBM Collaboration Solutions Domino on Cloud ICSUG 2015
IBM Collaboration Solutions Domino on Cloud ICSUG 2015
 

Similar to Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM SmartCloud Notes

Managing integration in a multi cluster world
Managing integration in a multi cluster worldManaging integration in a multi cluster world
Managing integration in a multi cluster world
Shikha Srivastava
 
2829 liberty
2829 liberty2829 liberty
2829 liberty
nick_garrod
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
sflynn073
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
sflynn073
 
Tip from IBM Connect 2014: What You Shouldn't Care About With Cloud, But Do A...
Tip from IBM Connect 2014: What You Shouldn't Care About With Cloud, But Do A...Tip from IBM Connect 2014: What You Shouldn't Care About With Cloud, But Do A...
Tip from IBM Connect 2014: What You Shouldn't Care About With Cloud, But Do A...
SocialBiz UserGroup
 
Become an IBM Cloud Architect in 40 Minutes
Become an IBM Cloud Architect in 40 MinutesBecome an IBM Cloud Architect in 40 Minutes
Become an IBM Cloud Architect in 40 Minutes
Andrew Ferrier
 
Improving Software Delivery with Software Defined Environments (IBM Interconn...
Improving Software Delivery with Software Defined Environments (IBM Interconn...Improving Software Delivery with Software Defined Environments (IBM Interconn...
Improving Software Delivery with Software Defined Environments (IBM Interconn...
Michael Elder
 
AD506: IBM Connect 2014. IBM Sametime Proxy 9: A fuller, richer customizable ...
AD506: IBM Connect 2014. IBM Sametime Proxy 9: A fuller, richer customizable ...AD506: IBM Connect 2014. IBM Sametime Proxy 9: A fuller, richer customizable ...
AD506: IBM Connect 2014. IBM Sametime Proxy 9: A fuller, richer customizable ...
William Holmes
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloud
Vincent Burckhardt
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018
Michael Elder
 
IC6284A - The Art of Choosing the Best Cloud Solution
IC6284A - The Art of Choosing the Best Cloud SolutionIC6284A - The Art of Choosing the Best Cloud Solution
IC6284A - The Art of Choosing the Best Cloud Solution
Hendrik van Run
 
The Bluemix Quadruple Threat
The Bluemix Quadruple ThreatThe Bluemix Quadruple Threat
The Bluemix Quadruple Threat
Ram Vennam
 
Why Ibm cloud private
Why Ibm cloud private Why Ibm cloud private
Why Ibm cloud private
Shikha Srivastava
 
The Power of IBM SmartCloud for Social Business and XPages App Dev
The Power of IBM SmartCloud for Social Business and XPages App DevThe Power of IBM SmartCloud for Social Business and XPages App Dev
The Power of IBM SmartCloud for Social Business and XPages App Dev
Niklas Heidloff
 
The Power of IBM SmartCloud for Social Business and XPages App Dev
The Power of IBM SmartCloud for Social Business and XPages App DevThe Power of IBM SmartCloud for Social Business and XPages App Dev
The Power of IBM SmartCloud for Social Business and XPages App Dev
IBM Connections Developers
 
Tip from ConnectED 2015: An intro to IBM Security Directory Integrator for IB...
Tip from ConnectED 2015: An intro to IBM Security Directory Integrator for IB...Tip from ConnectED 2015: An intro to IBM Security Directory Integrator for IB...
Tip from ConnectED 2015: An intro to IBM Security Directory Integrator for IB...
SocialBiz UserGroup
 
Cognitive Connections Architectures, Use Cases and Code
Cognitive Connections Architectures, Use Cases and CodeCognitive Connections Architectures, Use Cases and Code
Cognitive Connections Architectures, Use Cases and Code
Van Staub, MBA
 
sMash AppBuilder
sMash AppBuildersMash AppBuilder
sMash AppBuilder
Project Zero
 
Integrate Application Security Testing into your SDLC
Integrate Application Security Testing into your SDLCIntegrate Application Security Testing into your SDLC
Integrate Application Security Testing into your SDLC
IBM Security
 
Sunny Days, (Smart)Cloud-y Users
Sunny Days, (Smart)Cloud-y UsersSunny Days, (Smart)Cloud-y Users
Sunny Days, (Smart)Cloud-y Users
Mitch Cohen
 

Similar to Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM SmartCloud Notes (20)

Managing integration in a multi cluster world
Managing integration in a multi cluster worldManaging integration in a multi cluster world
Managing integration in a multi cluster world
 
2829 liberty
2829 liberty2829 liberty
2829 liberty
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
 
Tip from IBM Connect 2014: What You Shouldn't Care About With Cloud, But Do A...
Tip from IBM Connect 2014: What You Shouldn't Care About With Cloud, But Do A...Tip from IBM Connect 2014: What You Shouldn't Care About With Cloud, But Do A...
Tip from IBM Connect 2014: What You Shouldn't Care About With Cloud, But Do A...
 
Become an IBM Cloud Architect in 40 Minutes
Become an IBM Cloud Architect in 40 MinutesBecome an IBM Cloud Architect in 40 Minutes
Become an IBM Cloud Architect in 40 Minutes
 
Improving Software Delivery with Software Defined Environments (IBM Interconn...
Improving Software Delivery with Software Defined Environments (IBM Interconn...Improving Software Delivery with Software Defined Environments (IBM Interconn...
Improving Software Delivery with Software Defined Environments (IBM Interconn...
 
AD506: IBM Connect 2014. IBM Sametime Proxy 9: A fuller, richer customizable ...
AD506: IBM Connect 2014. IBM Sametime Proxy 9: A fuller, richer customizable ...AD506: IBM Connect 2014. IBM Sametime Proxy 9: A fuller, richer customizable ...
AD506: IBM Connect 2014. IBM Sametime Proxy 9: A fuller, richer customizable ...
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloud
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018
 
IC6284A - The Art of Choosing the Best Cloud Solution
IC6284A - The Art of Choosing the Best Cloud SolutionIC6284A - The Art of Choosing the Best Cloud Solution
IC6284A - The Art of Choosing the Best Cloud Solution
 
The Bluemix Quadruple Threat
The Bluemix Quadruple ThreatThe Bluemix Quadruple Threat
The Bluemix Quadruple Threat
 
Why Ibm cloud private
Why Ibm cloud private Why Ibm cloud private
Why Ibm cloud private
 
The Power of IBM SmartCloud for Social Business and XPages App Dev
The Power of IBM SmartCloud for Social Business and XPages App DevThe Power of IBM SmartCloud for Social Business and XPages App Dev
The Power of IBM SmartCloud for Social Business and XPages App Dev
 
The Power of IBM SmartCloud for Social Business and XPages App Dev
The Power of IBM SmartCloud for Social Business and XPages App DevThe Power of IBM SmartCloud for Social Business and XPages App Dev
The Power of IBM SmartCloud for Social Business and XPages App Dev
 
Tip from ConnectED 2015: An intro to IBM Security Directory Integrator for IB...
Tip from ConnectED 2015: An intro to IBM Security Directory Integrator for IB...Tip from ConnectED 2015: An intro to IBM Security Directory Integrator for IB...
Tip from ConnectED 2015: An intro to IBM Security Directory Integrator for IB...
 
Cognitive Connections Architectures, Use Cases and Code
Cognitive Connections Architectures, Use Cases and CodeCognitive Connections Architectures, Use Cases and Code
Cognitive Connections Architectures, Use Cases and Code
 
sMash AppBuilder
sMash AppBuildersMash AppBuilder
sMash AppBuilder
 
Integrate Application Security Testing into your SDLC
Integrate Application Security Testing into your SDLCIntegrate Application Security Testing into your SDLC
Integrate Application Security Testing into your SDLC
 
Sunny Days, (Smart)Cloud-y Users
Sunny Days, (Smart)Cloud-y UsersSunny Days, (Smart)Cloud-y Users
Sunny Days, (Smart)Cloud-y Users
 

More from SocialBiz UserGroup

Tip from ConnectED 2015: IBM Sametime - Design and Implementation of a Full H...
Tip from ConnectED 2015: IBM Sametime - Design and Implementation of a Full H...Tip from ConnectED 2015: IBM Sametime - Design and Implementation of a Full H...
Tip from ConnectED 2015: IBM Sametime - Design and Implementation of a Full H...
SocialBiz UserGroup
 
Tip from ConnectED 2015: Best and Worst Practices Deploying IBM Connections
Tip from ConnectED 2015: Best and Worst Practices Deploying IBM ConnectionsTip from ConnectED 2015: Best and Worst Practices Deploying IBM Connections
Tip from ConnectED 2015: Best and Worst Practices Deploying IBM Connections
SocialBiz UserGroup
 
Tip from ConnectED 2015: Using Bootstrap and Ratchet frameworks in Domino mob...
Tip from ConnectED 2015: Using Bootstrap and Ratchet frameworks in Domino mob...Tip from ConnectED 2015: Using Bootstrap and Ratchet frameworks in Domino mob...
Tip from ConnectED 2015: Using Bootstrap and Ratchet frameworks in Domino mob...
SocialBiz UserGroup
 
Tip from ConnectED 2015: How to Use Those Cool New Frameworks in Mobile Domin...
Tip from ConnectED 2015: How to Use Those Cool New Frameworks in Mobile Domin...Tip from ConnectED 2015: How to Use Those Cool New Frameworks in Mobile Domin...
Tip from ConnectED 2015: How to Use Those Cool New Frameworks in Mobile Domin...
SocialBiz UserGroup
 
Tip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupTip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundup
SocialBiz UserGroup
 
Tip from ConnectED: Notes Goes Cloud: The IBM Notes Browser Plug-in Integrate...
Tip from ConnectED: Notes Goes Cloud: The IBM Notes Browser Plug-in Integrate...Tip from ConnectED: Notes Goes Cloud: The IBM Notes Browser Plug-in Integrate...
Tip from ConnectED: Notes Goes Cloud: The IBM Notes Browser Plug-in Integrate...
SocialBiz UserGroup
 
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...
SocialBiz UserGroup
 
Tip from ConnectED 2015: Considerations for the cloud
Tip from ConnectED 2015: Considerations for the cloudTip from ConnectED 2015: Considerations for the cloud
Tip from ConnectED 2015: Considerations for the cloud
SocialBiz UserGroup
 
Tip from IBM Connect 2014: Rapid XPages Developing Using the Application Layo...
Tip from IBM Connect 2014: Rapid XPages Developing Using the Application Layo...Tip from IBM Connect 2014: Rapid XPages Developing Using the Application Layo...
Tip from IBM Connect 2014: Rapid XPages Developing Using the Application Layo...
SocialBiz UserGroup
 
Tip from IBM Connect2014: XPages Accessibility
Tip from IBM Connect2014: XPages AccessibilityTip from IBM Connect2014: XPages Accessibility
Tip from IBM Connect2014: XPages Accessibility
SocialBiz UserGroup
 
Tip from IBM Connect 2014: New security features in IBM Domino 8.5.x-9.x
Tip from IBM Connect 2014: New security features in IBM Domino 8.5.x-9.xTip from IBM Connect 2014: New security features in IBM Domino 8.5.x-9.x
Tip from IBM Connect 2014: New security features in IBM Domino 8.5.x-9.x
SocialBiz UserGroup
 
Tip from IBM Connect 2014: Mobile security roundup
Tip from IBM Connect 2014: Mobile security roundupTip from IBM Connect 2014: Mobile security roundup
Tip from IBM Connect 2014: Mobile security roundup
SocialBiz UserGroup
 
Tip from IBM Connect 2014: Socialytics = Social Business, Big Social Data and...
Tip from IBM Connect 2014: Socialytics = Social Business, Big Social Data and...Tip from IBM Connect 2014: Socialytics = Social Business, Big Social Data and...
Tip from IBM Connect 2014: Socialytics = Social Business, Big Social Data and...
SocialBiz UserGroup
 
Tip from IBM Connect 2014: Stepping into the Cloud and Evaluating Your Options
Tip from IBM Connect 2014: Stepping into the Cloud and Evaluating Your OptionsTip from IBM Connect 2014: Stepping into the Cloud and Evaluating Your Options
Tip from IBM Connect 2014: Stepping into the Cloud and Evaluating Your Options
SocialBiz UserGroup
 
Tip from IBM Connect 2014: XPages Mobile Development in IBM Domino 9.0.1 and ...
Tip from IBM Connect 2014: XPages Mobile Development in IBM Domino 9.0.1 and ...Tip from IBM Connect 2014: XPages Mobile Development in IBM Domino 9.0.1 and ...
Tip from IBM Connect 2014: XPages Mobile Development in IBM Domino 9.0.1 and ...
SocialBiz UserGroup
 
Tip from IBM Connect 2014: IBM Domino 64-bit: All you need to know
Tip from IBM Connect 2014: IBM Domino 64-bit: All you need to knowTip from IBM Connect 2014: IBM Domino 64-bit: All you need to know
Tip from IBM Connect 2014: IBM Domino 64-bit: All you need to know
SocialBiz UserGroup
 
IBM Domino Designer: Tips and tricks for maximum productivity
IBM Domino Designer: Tips and tricks for maximum productivityIBM Domino Designer: Tips and tricks for maximum productivity
IBM Domino Designer: Tips and tricks for maximum productivity
SocialBiz UserGroup
 
I've Installed Connections Now What?
I've Installed Connections Now What?I've Installed Connections Now What?
I've Installed Connections Now What?
SocialBiz UserGroup
 

More from SocialBiz UserGroup (18)

Tip from ConnectED 2015: IBM Sametime - Design and Implementation of a Full H...
Tip from ConnectED 2015: IBM Sametime - Design and Implementation of a Full H...Tip from ConnectED 2015: IBM Sametime - Design and Implementation of a Full H...
Tip from ConnectED 2015: IBM Sametime - Design and Implementation of a Full H...
 
Tip from ConnectED 2015: Best and Worst Practices Deploying IBM Connections
Tip from ConnectED 2015: Best and Worst Practices Deploying IBM ConnectionsTip from ConnectED 2015: Best and Worst Practices Deploying IBM Connections
Tip from ConnectED 2015: Best and Worst Practices Deploying IBM Connections
 
Tip from ConnectED 2015: Using Bootstrap and Ratchet frameworks in Domino mob...
Tip from ConnectED 2015: Using Bootstrap and Ratchet frameworks in Domino mob...Tip from ConnectED 2015: Using Bootstrap and Ratchet frameworks in Domino mob...
Tip from ConnectED 2015: Using Bootstrap and Ratchet frameworks in Domino mob...
 
Tip from ConnectED 2015: How to Use Those Cool New Frameworks in Mobile Domin...
Tip from ConnectED 2015: How to Use Those Cool New Frameworks in Mobile Domin...Tip from ConnectED 2015: How to Use Those Cool New Frameworks in Mobile Domin...
Tip from ConnectED 2015: How to Use Those Cool New Frameworks in Mobile Domin...
 
Tip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupTip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundup
 
Tip from ConnectED: Notes Goes Cloud: The IBM Notes Browser Plug-in Integrate...
Tip from ConnectED: Notes Goes Cloud: The IBM Notes Browser Plug-in Integrate...Tip from ConnectED: Notes Goes Cloud: The IBM Notes Browser Plug-in Integrate...
Tip from ConnectED: Notes Goes Cloud: The IBM Notes Browser Plug-in Integrate...
 
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...
Tip from ConnectED 2015: Managing your Enterprise Data in the Cloud – Securit...
 
Tip from ConnectED 2015: Considerations for the cloud
Tip from ConnectED 2015: Considerations for the cloudTip from ConnectED 2015: Considerations for the cloud
Tip from ConnectED 2015: Considerations for the cloud
 
Tip from IBM Connect 2014: Rapid XPages Developing Using the Application Layo...
Tip from IBM Connect 2014: Rapid XPages Developing Using the Application Layo...Tip from IBM Connect 2014: Rapid XPages Developing Using the Application Layo...
Tip from IBM Connect 2014: Rapid XPages Developing Using the Application Layo...
 
Tip from IBM Connect2014: XPages Accessibility
Tip from IBM Connect2014: XPages AccessibilityTip from IBM Connect2014: XPages Accessibility
Tip from IBM Connect2014: XPages Accessibility
 
Tip from IBM Connect 2014: New security features in IBM Domino 8.5.x-9.x
Tip from IBM Connect 2014: New security features in IBM Domino 8.5.x-9.xTip from IBM Connect 2014: New security features in IBM Domino 8.5.x-9.x
Tip from IBM Connect 2014: New security features in IBM Domino 8.5.x-9.x
 
Tip from IBM Connect 2014: Mobile security roundup
Tip from IBM Connect 2014: Mobile security roundupTip from IBM Connect 2014: Mobile security roundup
Tip from IBM Connect 2014: Mobile security roundup
 
Tip from IBM Connect 2014: Socialytics = Social Business, Big Social Data and...
Tip from IBM Connect 2014: Socialytics = Social Business, Big Social Data and...Tip from IBM Connect 2014: Socialytics = Social Business, Big Social Data and...
Tip from IBM Connect 2014: Socialytics = Social Business, Big Social Data and...
 
Tip from IBM Connect 2014: Stepping into the Cloud and Evaluating Your Options
Tip from IBM Connect 2014: Stepping into the Cloud and Evaluating Your OptionsTip from IBM Connect 2014: Stepping into the Cloud and Evaluating Your Options
Tip from IBM Connect 2014: Stepping into the Cloud and Evaluating Your Options
 
Tip from IBM Connect 2014: XPages Mobile Development in IBM Domino 9.0.1 and ...
Tip from IBM Connect 2014: XPages Mobile Development in IBM Domino 9.0.1 and ...Tip from IBM Connect 2014: XPages Mobile Development in IBM Domino 9.0.1 and ...
Tip from IBM Connect 2014: XPages Mobile Development in IBM Domino 9.0.1 and ...
 
Tip from IBM Connect 2014: IBM Domino 64-bit: All you need to know
Tip from IBM Connect 2014: IBM Domino 64-bit: All you need to knowTip from IBM Connect 2014: IBM Domino 64-bit: All you need to know
Tip from IBM Connect 2014: IBM Domino 64-bit: All you need to know
 
IBM Domino Designer: Tips and tricks for maximum productivity
IBM Domino Designer: Tips and tricks for maximum productivityIBM Domino Designer: Tips and tricks for maximum productivity
IBM Domino Designer: Tips and tricks for maximum productivity
 
I've Installed Connections Now What?
I've Installed Connections Now What?I've Installed Connections Now What?
I've Installed Connections Now What?
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Tip from IBM Connect 2014: Extend Your Security into the Cloud with IBM SmartCloud Notes

  • 1. © 2014 IBM Corporation ID105: Extend Your Security Into the Cloud with IBM SmartCloud Notes David Kern | Resident Paranoid, STSM and Global ICS Security Architect | IBM
  • 2. 22 IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. Please Note
  • 3. 10 Transparent Authentication  Users have too many passwords  Password prompts are annoying  Many “different” passwords leads to lower security  Users shouldn't know or care who provides their services or from where  Password management is annoying – by using cryptographic mechanisms instead of passwords, we can help keep the problem from getting worse, and maybe even help improve the situation.  SmartCloud for Social Business uses Security Assertion Markup Language (SAML) – Public standard from OASIS – Based on the strength of PKI – SAML uses signed XML identity assertions – Many implementations available from IBM and third party providers ● Including open source implementations – Many organizations currently use SAML for web SSO – Did I mention that SAML is a public standard yet?
  • 4. 11 Federated Identity  Use your existing web passwords for SmartCloud for Social Business web resources  Keep your passwords behind your corporate firewall  Manage your own password requirements  Manage your own change intervals  Manage your own re-use requirements  Never send a password over the 'net to SCSB! – Also prevents crackers from guessing your passwords against SCSB  Because SAML is a public standard, you can use any SAML 1.1 or SAML 2.0 compliant identity provider – Microsoft's ADFS 2.0 for Active Directory integration – IBM's own Tivoli Federated Identity Manager (TFIM) – OpenSAML  IdP initiated SAML flows support a “web portal” user experience
  • 5. 12 Federated Identity Web browser SAML Identity Provider TAM/WebSEAL TFIM (SAML SP) Customer Site Internet SCSB SC Web App 443 (https)
  • 6. 13 Federated Identity Web browser SAML Identity Provider TAM/WebSEAL TFIM (SAML SP) Customer Site Internet SCSB SC Web App
  • 7. 14 Federated Identity Web browser SAML Identity Provider TAM/WebSEAL TFIM (SAML SP) Customer Site Internet SCSB SC Web App
  • 8. 15 Federated Identity Web browser SAML Identity Provider TAM/WebSEAL TFIM (SAML SP) Customer Site Internet SCSB SC Web App HTTP(s) POST with SAML assertion
  • 9. 16 Federated Identity Web browser SAML Identity Provider TAM/WebSEAL TFIM (SAML SP) Customer Site Internet SCSB SC Web App HTTP(s) GET with session cookie
  • 10. 17 Integrated login across SmartCloud for Social Business services  Users directly authenticate once (and only once) to SCSB  Transparently authenticate to SCSB services around the world  Your users shouldn't care about our back end topology – Different data centers, different cages, different servers – no problem  The advantages of centralized authentication and distributed processing power at the same time – Can help simplify integration of new services and partners – Can help make expansion easier to accomodate  Password data storage and checking minimized
  • 11. 6262 © Copyright IBM Corporation 2014. All rights reserved.  U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.  IBM, the IBM logo, ibm.com, Lotus, Tivoli, Rational, and Lotus Notes, Notes, Domino, LotusLive, LotusLive Notes, and IBM SmartCloud are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml Other company, product, or service names may be trademarks or service marks of others. Availability. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views. They are provided for informational purposes only, and are neither intended to, nor shall have the effect of being, legal or other guidance or advice to any participant. While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided AS-IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. Acknowledgements and Disclaimers