SlideShare a Scribd company logo
RSA Authentication Manager 8.2
2
Over 25,000 customers
50 – 60 million active tokens in circulation
10 million units shipped per year
More than 50% market share
RSA Ready Partner Program: 400 Partners with
Native SecurID Integration
THE undisputed leader in multi-factor auth
• 2016 SC Magazine Awards: Best Authentication
• Reigning Leader, Gartner MQ
3
RSA Authentication Manager 8.2 Key Themes
Seamless
• RSA Via
Access
SecurID
Agent Hub
Secure
• FIPS Inside
Compliance
• PCI DSS
Compliance
• IPv6 Phase I
Simple
• Provision Once
SW Tokens
• Token Expiry
Alert
• Dashboard
Search Option
• Report Ready
Notification
Scalable
• AMBA
(Enterprise)
• New Identity
Sources
4
Seamless
5
Via Access SecurID Agent Hub (need to purchase RSA Via Access)
SecurID / RSA Via Access
• Via Access Tokencodes for 2FA to
SecurID Agents
– No Change to SecurID Agent
Infrastructure
– Leverage RSAReady Program
with over 400 Certified Integrations
– PIN or Fingerprint to unlock
Tokencode
• Simplifies Registration and
Provisioning Processes
ORG1
ORG2
HUNDREDSOFAPPLICATIONS
ON-PREMANDINTHECLOUD
Access Manager
Cloud
On-Premises
SecurID Agents
6
Identity
Router
Authentication
Manager 8.2
SecurID Agent
Protected
Resource
1 User opens Via Access app,
enters PIN or Biometric
Thumbprint to unlock the
Via Tokencode
2 User enters UserID &
Via Tokencode into
SecurID Agent
Username & Via
Tokencode are
passed to AM8.2
3
4 AM8.2 cannot locate
user locally so reaches
out to Trusted Realms
5 IDR locates user
Passes Via Tokencode
to Via Access
6 Via Access validates
Via Tokencode
Returns response
7 User Permitted
or
Denied Access
Via Access SecurID Agent Hub
How it Works
Trusted
Realm
SecurID / RSA Via Access
4096 9913
7
Via Access User Experience
User ValidationPull Down the App
Simple End User Enrollment
Set Password
8
Device Registration
Via Access User Experience
Simple End User Device Registration & Authentication
Multi Factor Auth Create PIN Fingerprint
9
Via Access SecurID Agent Hub Benefits
SecurID / RSA Via Access
Seamless
Transition
No Change to
Agents
Streamlined
Registration &
Provisioning
Processes
Improves
End User
Experience
Lowers Total Cost Of Ownership
10
Simple
11
Improved Software Token Provisioning
“Provision Once” Software Tokens
• Software Tokens provisioned in AM 8.2 expire on the Server side only
meaning software tokens do not need to be re-provisioned!
• Significantly lowers administrative time and overhead to manage and
provision software tokens
Authentication
Manager 8.1
TOKEN
EXPIRED Authentication
Manager 8.2
5716 8299
AM8.1 and earlier NEW!
12
Email (Admin) for imminent token expiry
Simplifying Administration
User Dashboard search option (User Alias)
Email (Admin) report job completion
Friday, June 17, 2016 5:03 PM.
Improved Search and Notifications
13
Customizable Display Banner
• Customized Logo & Text Displayed
Prior to Login
• User Must Accept Notification
Before Login to AM
• Available on All AM Consoles
– Security Console
– Operations Console
– Self Service
– SSH
Meets Organizations Best Practices
Unauthorized Access is prohibited. If you are authorized
to access this site, please click the Accept button below.
If you are not authorized, please exit this site.
14
Secure & Scalable
15
FIPS 140-2 Compliance Inside
• AM Cipher Suite upgraded to meet NIST/FIPS Compliance*
PCI Compliance
• SSLv3 removal and expanded TLS 1.2 support*
• Strict TLS Mode option
NIST SP 800-131A
• Core / Plumbing Certificates upgradeable to SHA-2
Security Updates
* Does not include Radius and Off-Line Authentication
16
Without AMBA
1. Log into Security Console
2. Add New User & Relevant Info
3. Assign Software token
4. DistributeSoftware token
• Select token profile
• Select provisioning & delivery options
5. Repeat steps 2 to 4, 99 times
6. …
100. Done
With AMBA*
1. Prepare AMBAInput .csv file with New
User Info & Options
2. Access AM Command Line
3. Invoke AMBAUtility
• Run test & verify proper operation
• Execute command
4. Done
Authentication Manager Bulk Administration (AMBA)
Add 100 New Users, Assign & DistributeSoftware token
* Requires Enterprise License or standalone AMBA license
AMBA Pre-Packaged with Authentication Manager
17
• Appliance Operating System Upgrade
to SUSE 11 SP4
• Qualification of VMware ESXi 6.0
• Open LDAP as an Identity Source
• IPv6 RADIUS Clients
New Platform Support & Qualifications
18
Supported Migration Paths
AM 6.1
All OS Platforms
AM 7.1
All OS Platforms
RSA SecurID
Appliance 2.0
RSA SecurID
Appliance 3.0
AM 8.1 Release
AM 8.2 Release
AM 8.1 SP1
Hyper-V Appliance
AM 8.1 Hardware
Appliance
AM 8.1 VMware
Appliance
AM 8.2
Hyper-V Appliance
AM 8.1 SP1
Hardware /
VMware Appliance
AM 8.2 HW /
VMware Appliance
AM 6.1 EOPS: December, 2015
AM 7.1 EOPS: June, 2016
19
Streamlining Evaluations
• Auto Generates 25 SW Tokens
when 90-day Trial License is
Installed
– Eliminates time-consuming
distribution of Software Token
Media
• One-time Use Extension Code
extends trial by 90 Days
• Auto Deletes Eval License once
Production License is Installed
20
Thank You

More Related Content

What's hot

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
Hitachi ID Systems, Inc.
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
NCCOMMS
 
RBMovil Powered by CHARGE Anywhere: MWC
RBMovil Powered by CHARGE Anywhere: MWCRBMovil Powered by CHARGE Anywhere: MWC
RBMovil Powered by CHARGE Anywhere: MWC
CHARGE Anywhere
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
Hitachi ID Systems, Inc.
 
2FA OTP Hard Token
2FA OTP Hard Token2FA OTP Hard Token
2FA OTP Hard Token
2FA, Inc.
 
P2PE Solutions From Futurex
P2PE Solutions From FuturexP2PE Solutions From Futurex
P2PE Solutions From Futurex
Greg Stone
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
NetwayClub
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
Hitachi ID Systems, Inc.
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
Greg Stone
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
Hitachi ID Systems, Inc.
 
Zero trust Architecture
Zero trust Architecture Zero trust Architecture
Zero trust Architecture
AddWeb Solution Pvt. Ltd.
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
Wen-Pai Lu
 
Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...
Chris Ryu
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
GENIANS, INC.
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
GENIANS, INC.
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
Carahsoft
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
Narudom Roongsiriwong, CISSP
 
STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDS
RapidSSLOnline.com
 
Futurex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonFuturex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonGreg Stone
 

What's hot (20)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Bi guardotp
Bi guardotpBi guardotp
Bi guardotp
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
RBMovil Powered by CHARGE Anywhere: MWC
RBMovil Powered by CHARGE Anywhere: MWCRBMovil Powered by CHARGE Anywhere: MWC
RBMovil Powered by CHARGE Anywhere: MWC
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
2FA OTP Hard Token
2FA OTP Hard Token2FA OTP Hard Token
2FA OTP Hard Token
 
P2PE Solutions From Futurex
P2PE Solutions From FuturexP2PE Solutions From Futurex
P2PE Solutions From Futurex
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Zero trust Architecture
Zero trust Architecture Zero trust Architecture
Zero trust Architecture
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDS
 
Futurex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonFuturex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, Boston
 

Viewers also liked

Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
Srilal Buddika
 
Design Matters
Design MattersDesign Matters
Design Matterscjmichal
 
Layer 7: 2010 RSA Presentation on REST and Oauth Security
Layer 7: 2010 RSA Presentation on REST and Oauth SecurityLayer 7: 2010 RSA Presentation on REST and Oauth Security
Layer 7: 2010 RSA Presentation on REST and Oauth Security
CA API Management
 
#6 Poza Ekranem: Projektowanie Interakcji Ucieleśnionej
#6 Poza Ekranem: Projektowanie Interakcji Ucieleśnionej#6 Poza Ekranem: Projektowanie Interakcji Ucieleśnionej
#6 Poza Ekranem: Projektowanie Interakcji Ucieleśnionej
Design Practice
 
Colocoloelequipoquehasabidosercampeon
ColocoloelequipoquehasabidosercampeonColocoloelequipoquehasabidosercampeon
Colocoloelequipoquehasabidosercampeon
Luis Gaete
 
Ultra pulse encore
Ultra pulse encoreUltra pulse encore
Ultra pulse encoreMick Myers
 
Giuseppe Mencarelli - TALK Integrazione Magento / ERP – poco fumo e tanto arr...
Giuseppe Mencarelli - TALK Integrazione Magento / ERP – poco fumo e tanto arr...Giuseppe Mencarelli - TALK Integrazione Magento / ERP – poco fumo e tanto arr...
Giuseppe Mencarelli - TALK Integrazione Magento / ERP – poco fumo e tanto arr...
Meet Magento Italy
 
Portafolio Marcela T
Portafolio Marcela TPortafolio Marcela T
Portafolio Marcela Tmarce_t_2000
 
U 1 Ae. %2 Bconceptos%2 Bbasicos%2 Bde%2 Badminist.%2 By%2 Borganiz
U 1 Ae. %2 Bconceptos%2 Bbasicos%2 Bde%2 Badminist.%2 By%2 BorganizU 1 Ae. %2 Bconceptos%2 Bbasicos%2 Bde%2 Badminist.%2 By%2 Borganiz
U 1 Ae. %2 Bconceptos%2 Bbasicos%2 Bde%2 Badminist.%2 By%2 BorganizJohanna Toledo Morillo
 
Capture @ #Wildtech '11
Capture @ #Wildtech '11Capture @ #Wildtech '11
Capture @ #Wildtech '11
Jason Neiffer
 
Periódico de las asambleas de Madrid, Madrid15M nº15 junio 2013
Periódico de las asambleas de Madrid, Madrid15M  nº15 junio 2013Periódico de las asambleas de Madrid, Madrid15M  nº15 junio 2013
Periódico de las asambleas de Madrid, Madrid15M nº15 junio 2013
Stéphane M. Grueso
 
plantas hidraulicas
plantas hidraulicasplantas hidraulicas
plantas hidraulicasgaspar_188
 
Empresas de reconocimiento
Empresas de reconocimientoEmpresas de reconocimiento
Empresas de reconocimientoluisA Carrillo
 
Ser freelance 2.0
Ser freelance 2.0Ser freelance 2.0
Ser freelance 2.0
Jimena Licitra
 
Diamond Dollars Case Competition Presentation 11-10-15
Diamond Dollars Case Competition Presentation 11-10-15Diamond Dollars Case Competition Presentation 11-10-15
Diamond Dollars Case Competition Presentation 11-10-15William Kniesner
 
Electricidad INTD
Electricidad INTDElectricidad INTD
Electricidad INTDOleam
 
Trabajo de genesis del contrato final
Trabajo de genesis del contrato finalTrabajo de genesis del contrato final
Trabajo de genesis del contrato final
Linett Chávez Ortiz
 
Pwc global insights and actions for banks 2014
Pwc global insights and actions for banks 2014Pwc global insights and actions for banks 2014
Pwc global insights and actions for banks 2014
Investors Group and LegacyTracker
 

Viewers also liked (20)

Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Design Matters
Design MattersDesign Matters
Design Matters
 
Layer 7: 2010 RSA Presentation on REST and Oauth Security
Layer 7: 2010 RSA Presentation on REST and Oauth SecurityLayer 7: 2010 RSA Presentation on REST and Oauth Security
Layer 7: 2010 RSA Presentation on REST and Oauth Security
 
#6 Poza Ekranem: Projektowanie Interakcji Ucieleśnionej
#6 Poza Ekranem: Projektowanie Interakcji Ucieleśnionej#6 Poza Ekranem: Projektowanie Interakcji Ucieleśnionej
#6 Poza Ekranem: Projektowanie Interakcji Ucieleśnionej
 
Colocoloelequipoquehasabidosercampeon
ColocoloelequipoquehasabidosercampeonColocoloelequipoquehasabidosercampeon
Colocoloelequipoquehasabidosercampeon
 
Ultra pulse encore
Ultra pulse encoreUltra pulse encore
Ultra pulse encore
 
Giuseppe Mencarelli - TALK Integrazione Magento / ERP – poco fumo e tanto arr...
Giuseppe Mencarelli - TALK Integrazione Magento / ERP – poco fumo e tanto arr...Giuseppe Mencarelli - TALK Integrazione Magento / ERP – poco fumo e tanto arr...
Giuseppe Mencarelli - TALK Integrazione Magento / ERP – poco fumo e tanto arr...
 
Portafolio Marcela T
Portafolio Marcela TPortafolio Marcela T
Portafolio Marcela T
 
U 1 Ae. %2 Bconceptos%2 Bbasicos%2 Bde%2 Badminist.%2 By%2 Borganiz
U 1 Ae. %2 Bconceptos%2 Bbasicos%2 Bde%2 Badminist.%2 By%2 BorganizU 1 Ae. %2 Bconceptos%2 Bbasicos%2 Bde%2 Badminist.%2 By%2 Borganiz
U 1 Ae. %2 Bconceptos%2 Bbasicos%2 Bde%2 Badminist.%2 By%2 Borganiz
 
Capture @ #Wildtech '11
Capture @ #Wildtech '11Capture @ #Wildtech '11
Capture @ #Wildtech '11
 
Periódico de las asambleas de Madrid, Madrid15M nº15 junio 2013
Periódico de las asambleas de Madrid, Madrid15M  nº15 junio 2013Periódico de las asambleas de Madrid, Madrid15M  nº15 junio 2013
Periódico de las asambleas de Madrid, Madrid15M nº15 junio 2013
 
plantas hidraulicas
plantas hidraulicasplantas hidraulicas
plantas hidraulicas
 
Empresas de reconocimiento
Empresas de reconocimientoEmpresas de reconocimiento
Empresas de reconocimiento
 
Profil daniel boogaerts
Profil daniel boogaertsProfil daniel boogaerts
Profil daniel boogaerts
 
Ser freelance 2.0
Ser freelance 2.0Ser freelance 2.0
Ser freelance 2.0
 
Diamond Dollars Case Competition Presentation 11-10-15
Diamond Dollars Case Competition Presentation 11-10-15Diamond Dollars Case Competition Presentation 11-10-15
Diamond Dollars Case Competition Presentation 11-10-15
 
Electricidad INTD
Electricidad INTDElectricidad INTD
Electricidad INTD
 
Trabajo de genesis del contrato final
Trabajo de genesis del contrato finalTrabajo de genesis del contrato final
Trabajo de genesis del contrato final
 
Pwc global insights and actions for banks 2014
Pwc global insights and actions for banks 2014Pwc global insights and actions for banks 2014
Pwc global insights and actions for banks 2014
 

Similar to Rsa authentication manager 8.2 presentation

The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems Overview
Nick Owen
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Precisely
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
 
RSASecureID.ppt
RSASecureID.pptRSASecureID.ppt
RSASecureID.ppt
PepeMartin23
 
RSASecureID (2).ppt
RSASecureID (2).pptRSASecureID (2).ppt
RSASecureID (2).ppt
PepeMartin23
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
Micro Focus
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
ForgeRock
 
Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Hai Nguyen
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
DATA SECURITY SOLUTIONS
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
Iftikhar Ali Iqbal
 
An Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldAn Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices World
VMware Tanzu
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
CA Technologies
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Sectricity
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
Ajay Nawani
 
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
APIsecure_ Official
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software Potential
SoftwarePotential
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software Potential
InishTech
 
Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018
Nicolas Destor
 
What's New in Centrify Server Suite 2016
What's New in Centrify Server Suite 2016What's New in Centrify Server Suite 2016
What's New in Centrify Server Suite 2016
Centrify Support
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
Mostafa El Lathy
 

Similar to Rsa authentication manager 8.2 presentation (20)

The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems Overview
 
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
RSASecureID.ppt
RSASecureID.pptRSASecureID.ppt
RSASecureID.ppt
 
RSASecureID (2).ppt
RSASecureID (2).pptRSASecureID (2).ppt
RSASecureID (2).ppt
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
 
Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
An Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldAn Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices World
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software Potential
 
Introduction to Software Potential
Introduction to Software PotentialIntroduction to Software Potential
Introduction to Software Potential
 
Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018
 
What's New in Centrify Server Suite 2016
What's New in Centrify Server Suite 2016What's New in Centrify Server Suite 2016
What's New in Centrify Server Suite 2016
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 

More from Zeev Shetach

חמש שיטות לתעדוף משימות פיתוח
חמש שיטות לתעדוף משימות פיתוחחמש שיטות לתעדוף משימות פיתוח
חמש שיטות לתעדוף משימות פיתוח
Zeev Shetach
 
Online Digital Signature Portal
Online Digital Signature Portal Online Digital Signature Portal
Online Digital Signature Portal
Zeev Shetach
 
פורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקום
פורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקוםפורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקום
פורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקום
Zeev Shetach
 
Digital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustDigital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrust
Zeev Shetach
 
פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון
 פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון
פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון
Zeev Shetach
 
How to be trusted in 2017
How to be trusted in 2017How to be trusted in 2017
How to be trusted in 2017
Zeev Shetach
 
Electronic Signatures Guidance - by BEIS
Electronic Signatures Guidance - by BEISElectronic Signatures Guidance - by BEIS
Electronic Signatures Guidance - by BEIS
Zeev Shetach
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
Zeev Shetach
 
Comsign & Trust
Comsign & TrustComsign & Trust
Comsign & Trust
Zeev Shetach
 
המדריך לחסכון ארגוני באמצעות טכנולוגיה
המדריך לחסכון ארגוני באמצעות טכנולוגיההמדריך לחסכון ארגוני באמצעות טכנולוגיה
המדריך לחסכון ארגוני באמצעות טכנולוגיה
Zeev Shetach
 
ComsignTrust Overview
ComsignTrust OverviewComsignTrust Overview
ComsignTrust Overview
Zeev Shetach
 

More from Zeev Shetach (11)

חמש שיטות לתעדוף משימות פיתוח
חמש שיטות לתעדוף משימות פיתוחחמש שיטות לתעדוף משימות פיתוח
חמש שיטות לתעדוף משימות פיתוח
 
Online Digital Signature Portal
Online Digital Signature Portal Online Digital Signature Portal
Online Digital Signature Portal
 
פורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקום
פורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקוםפורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקום
פורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקום
 
Digital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustDigital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrust
 
פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון
 פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון
פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון
 
How to be trusted in 2017
How to be trusted in 2017How to be trusted in 2017
How to be trusted in 2017
 
Electronic Signatures Guidance - by BEIS
Electronic Signatures Guidance - by BEISElectronic Signatures Guidance - by BEIS
Electronic Signatures Guidance - by BEIS
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
 
Comsign & Trust
Comsign & TrustComsign & Trust
Comsign & Trust
 
המדריך לחסכון ארגוני באמצעות טכנולוגיה
המדריך לחסכון ארגוני באמצעות טכנולוגיההמדריך לחסכון ארגוני באמצעות טכנולוגיה
המדריך לחסכון ארגוני באמצעות טכנולוגיה
 
ComsignTrust Overview
ComsignTrust OverviewComsignTrust Overview
ComsignTrust Overview
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Rsa authentication manager 8.2 presentation

  • 2. 2 Over 25,000 customers 50 – 60 million active tokens in circulation 10 million units shipped per year More than 50% market share RSA Ready Partner Program: 400 Partners with Native SecurID Integration THE undisputed leader in multi-factor auth • 2016 SC Magazine Awards: Best Authentication • Reigning Leader, Gartner MQ
  • 3. 3 RSA Authentication Manager 8.2 Key Themes Seamless • RSA Via Access SecurID Agent Hub Secure • FIPS Inside Compliance • PCI DSS Compliance • IPv6 Phase I Simple • Provision Once SW Tokens • Token Expiry Alert • Dashboard Search Option • Report Ready Notification Scalable • AMBA (Enterprise) • New Identity Sources
  • 5. 5 Via Access SecurID Agent Hub (need to purchase RSA Via Access) SecurID / RSA Via Access • Via Access Tokencodes for 2FA to SecurID Agents – No Change to SecurID Agent Infrastructure – Leverage RSAReady Program with over 400 Certified Integrations – PIN or Fingerprint to unlock Tokencode • Simplifies Registration and Provisioning Processes ORG1 ORG2 HUNDREDSOFAPPLICATIONS ON-PREMANDINTHECLOUD Access Manager Cloud On-Premises SecurID Agents
  • 6. 6 Identity Router Authentication Manager 8.2 SecurID Agent Protected Resource 1 User opens Via Access app, enters PIN or Biometric Thumbprint to unlock the Via Tokencode 2 User enters UserID & Via Tokencode into SecurID Agent Username & Via Tokencode are passed to AM8.2 3 4 AM8.2 cannot locate user locally so reaches out to Trusted Realms 5 IDR locates user Passes Via Tokencode to Via Access 6 Via Access validates Via Tokencode Returns response 7 User Permitted or Denied Access Via Access SecurID Agent Hub How it Works Trusted Realm SecurID / RSA Via Access 4096 9913
  • 7. 7 Via Access User Experience User ValidationPull Down the App Simple End User Enrollment Set Password
  • 8. 8 Device Registration Via Access User Experience Simple End User Device Registration & Authentication Multi Factor Auth Create PIN Fingerprint
  • 9. 9 Via Access SecurID Agent Hub Benefits SecurID / RSA Via Access Seamless Transition No Change to Agents Streamlined Registration & Provisioning Processes Improves End User Experience Lowers Total Cost Of Ownership
  • 11. 11 Improved Software Token Provisioning “Provision Once” Software Tokens • Software Tokens provisioned in AM 8.2 expire on the Server side only meaning software tokens do not need to be re-provisioned! • Significantly lowers administrative time and overhead to manage and provision software tokens Authentication Manager 8.1 TOKEN EXPIRED Authentication Manager 8.2 5716 8299 AM8.1 and earlier NEW!
  • 12. 12 Email (Admin) for imminent token expiry Simplifying Administration User Dashboard search option (User Alias) Email (Admin) report job completion Friday, June 17, 2016 5:03 PM. Improved Search and Notifications
  • 13. 13 Customizable Display Banner • Customized Logo & Text Displayed Prior to Login • User Must Accept Notification Before Login to AM • Available on All AM Consoles – Security Console – Operations Console – Self Service – SSH Meets Organizations Best Practices Unauthorized Access is prohibited. If you are authorized to access this site, please click the Accept button below. If you are not authorized, please exit this site.
  • 15. 15 FIPS 140-2 Compliance Inside • AM Cipher Suite upgraded to meet NIST/FIPS Compliance* PCI Compliance • SSLv3 removal and expanded TLS 1.2 support* • Strict TLS Mode option NIST SP 800-131A • Core / Plumbing Certificates upgradeable to SHA-2 Security Updates * Does not include Radius and Off-Line Authentication
  • 16. 16 Without AMBA 1. Log into Security Console 2. Add New User & Relevant Info 3. Assign Software token 4. DistributeSoftware token • Select token profile • Select provisioning & delivery options 5. Repeat steps 2 to 4, 99 times 6. … 100. Done With AMBA* 1. Prepare AMBAInput .csv file with New User Info & Options 2. Access AM Command Line 3. Invoke AMBAUtility • Run test & verify proper operation • Execute command 4. Done Authentication Manager Bulk Administration (AMBA) Add 100 New Users, Assign & DistributeSoftware token * Requires Enterprise License or standalone AMBA license AMBA Pre-Packaged with Authentication Manager
  • 17. 17 • Appliance Operating System Upgrade to SUSE 11 SP4 • Qualification of VMware ESXi 6.0 • Open LDAP as an Identity Source • IPv6 RADIUS Clients New Platform Support & Qualifications
  • 18. 18 Supported Migration Paths AM 6.1 All OS Platforms AM 7.1 All OS Platforms RSA SecurID Appliance 2.0 RSA SecurID Appliance 3.0 AM 8.1 Release AM 8.2 Release AM 8.1 SP1 Hyper-V Appliance AM 8.1 Hardware Appliance AM 8.1 VMware Appliance AM 8.2 Hyper-V Appliance AM 8.1 SP1 Hardware / VMware Appliance AM 8.2 HW / VMware Appliance AM 6.1 EOPS: December, 2015 AM 7.1 EOPS: June, 2016
  • 19. 19 Streamlining Evaluations • Auto Generates 25 SW Tokens when 90-day Trial License is Installed – Eliminates time-consuming distribution of Software Token Media • One-time Use Extension Code extends trial by 90 Days • Auto Deletes Eval License once Production License is Installed