SlideShare uma empresa Scribd logo
1 de 10
KeyShield SSO
SSO infrastructure for Novell
technologiesVáclav Šamša & dear Novell guests:
Dean Lythgoe
Richard Lindstedt
Kai Reichert
KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO
Novell solutions
Novell products?
 We are talking about Filr, Vibe, GroupWise Mobility Service,
GroupWise, iPrint, Messenger, Service Desk ...
 All are or getting pretty standard, working with a principal – the only
thing they need is to identify the user's object within a directory
(eDirectory, Active Directory ...).
 Btw, the vaste majority of users is still consuming Novell products
service from the Windows desktop, cca 30% still with XP ...
 Before, the integration point for SSO was the Novell Client for
Windows, now, there is no connection in between the client and
browser, web client...
 So, back in 2009, the question was, how to make everything working
together, on Windows, Linux, Mac and, of course, all mobile devices
KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO
SSO infrastructure for Novell solutions
How do KeyShield SSO do it?
 SAML support
 ReST API interface for easy and fast direct integrations
 The integrated system needs a short and easy piece of code, which will ask
KeyShield SSO for the principal (UserID). Let's see the simplified schema
KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO
KeyShield SSO - authenticationKeyShield SSO - authentication
Windows WorkstationWindows Workstation Browser or Native clientBrowser or Native client Integrated systemIntegrated system KeyShield SSO serverKeyShield SSO server
Check user by IP of the
Windows Workstation
(Address of the Client)
Send user ID (Principal)
Valid session? No – ask
KeyShield SSO server
for the principal
Search user profiles
database for user ID
provided by the
KeyShield SSO server.
Found – start session
User is successfully
authenticated by IS
Run
client/browser
Client connect to the IS
KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO
SSO infrastructure for Novell solutions
How do KeyShield SSO do it?
 The user is identified by the IP address which is currently used by the
user's device
 This is working with anything which communicates via IP from the device
 This includes any browser, any WebDAV. Let's see the simplified schema
for Filr and Vibe
KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO
KeyShield SSO – Filr WebDAV exampleKeyShield SSO – Filr WebDAV example
BrowserBrowser Web ClientWeb Client Novell Filr or VibeNovell Filr or Vibe KeyShield SSO serverKeyShield SSO server
Check user by IP of the
Windows Workstation
(Address of the Client)
Send user ID (Principal)
WebDAV has no access
to the browser cookie or
session – ask KeyShield
SSO server for the
user's identity
Search user profile for
user ID provided by the
KeyShield SSO server.
Found. Session created.
User can edit the file
User clicks the Edit
button for a particular
document
Windows built in Web
Client gets request via
WebDAV
KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO
SSO infrastructure for Novell solutions
How do KeyShield SSO do it?
 The user can authenticate to the SSO system, but means at least 2
authentications a day – to the environment/desktop and to the SSO
 The demand we clearly see is for really tight integration – once the user is
authenticated to the environment/desktop (eDirectory, ActiveDirectory etc),
no further authentication is necessary for any systém
 Any system means everything inside the LAN/WAN and also anything
hosted (clouded)
 There can be a SSO solution supporting NTLM and there is the KeyShield
SSO – we support both. Let's see Novell Client for Windows integration
simplified schema
KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO
Novell ClientNovell Client KeyShield clientKeyShield client KeyShield serverKeyShield server
Authentication to
eDirectory &
to the workstation
Authentication detected.
Send user info to the
KeyShield SSO server
together with workstation
IP address.
Generates token which
writes to the user's object
in eDirectory. Token ID
together with an
authentication challenge
is than sent to the
KeyShield SSO client.
Receive token
ID and challenge
eDirectory search for
token ID, return value to
the KeyShield client
Generate response
Validity check
Authentication OK!
KeyShield SSOKeyShield SSO
KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO
SSO infrastructure for Novell solutions
How do KeyShield SSO do it?
 The integration mechanism is rock solid.
 With this kind of integration, the whole Novell environment, can be much
more efficient and convenient then Microsoft.
 Together with our colleagues from Novell, we support all scenarios, user
platforms, server platforms, mobile devices
 If you have any home brewed system, you are lucky with us – the
integration is piece of cake
 Let's discuss the SSO support for Novell technologies, following slides are
pretty theoretical and boring ..
KeyShield SSO
SSO infrastructure for Novell
technologiesvsamsa@tdp.cz
www.keyshieldsso.com
www.securewinbox.com

Mais conteúdo relacionado

Mais procurados

Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADuberbaum
 
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...Akeyless
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerNovell
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Anil Saldanha
 
Server to Server API Security
Server to Server API SecurityServer to Server API Security
Server to Server API SecurityGanesh Ghag
 
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onCraig Dickson
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsUsing Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsNovell
 
A Developer's Introduction to Azure Active Directory B2C
A Developer's Introduction to Azure Active Directory B2CA Developer's Introduction to Azure Active Directory B2C
A Developer's Introduction to Azure Active Directory B2CJohn Garland
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSylvain Maret
 
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génératione-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere générationSylvain Maret
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CJoonas Westlin
 
Web Single sign on system
Web Single sign on systemWeb Single sign on system
Web Single sign on systemSwati Sinha
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CloudIDSummit
 
The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)Jay Simcox
 
Enterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSOEnterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSOOliver Mueller
 
SSL Certificate and Code Signing
SSL Certificate and Code SigningSSL Certificate and Code Signing
SSL Certificate and Code SigningLi-Wei Yao
 

Mais procurados (20)

Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
 
Server to Server API Security
Server to Server API SecurityServer to Server API Security
Server to Server API Security
 
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner ApplicationsUsing Federation to Simplify Access to SharePoint, SaaS and Partner Applications
Using Federation to Simplify Access to SharePoint, SaaS and Partner Applications
 
SAML and Liferay
SAML and LiferaySAML and Liferay
SAML and Liferay
 
A Developer's Introduction to Azure Active Directory B2C
A Developer's Introduction to Azure Active Directory B2CA Developer's Introduction to Azure Active Directory B2C
A Developer's Introduction to Azure Active Directory B2C
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génératione-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
 
Web Single sign on system
Web Single sign on systemWeb Single sign on system
Web Single sign on system
 
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
CIS13: Identity as a Matter of Public Safety: A Case Study in Secure API Acce...
 
Azure B2C
Azure B2CAzure B2C
Azure B2C
 
Auth experience - vol 1.0
Auth experience  - vol 1.0Auth experience  - vol 1.0
Auth experience - vol 1.0
 
The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)
 
Enterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSOEnterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSO
 
SSL Certificate and Code Signing
SSL Certificate and Code SigningSSL Certificate and Code Signing
SSL Certificate and Code Signing
 

Destaque

GWAVACon - SEP Sesam Backup: We care about your data (English)
GWAVACon - SEP Sesam Backup: We care about your data (English)GWAVACon - SEP Sesam Backup: We care about your data (English)
GWAVACon - SEP Sesam Backup: We care about your data (English)GWAVA
 
Smart Backup Architectures for Big Data in Complex, Open Source Based IT Envi...
Smart Backup Architectures for Big Data in Complex, Open Source Based IT Envi...Smart Backup Architectures for Big Data in Complex, Open Source Based IT Envi...
Smart Backup Architectures for Big Data in Complex, Open Source Based IT Envi...Hubert Schweinesbein
 
GWAVACon 2013: Requirements to Backup Solutions
GWAVACon 2013: Requirements to Backup SolutionsGWAVACon 2013: Requirements to Backup Solutions
GWAVACon 2013: Requirements to Backup SolutionsGWAVA
 
2012 10-sep-gwava-vibe-sharepoint-more
2012 10-sep-gwava-vibe-sharepoint-more2012 10-sep-gwava-vibe-sharepoint-more
2012 10-sep-gwava-vibe-sharepoint-moreGWAVA
 
GWAVACon - How to efficiently manage Novell GroupWise Security, Backup, Mail...
GWAVACon - How to efficiently manage Novell GroupWise  Security, Backup, Mail...GWAVACon - How to efficiently manage Novell GroupWise  Security, Backup, Mail...
GWAVACon - How to efficiently manage Novell GroupWise Security, Backup, Mail...GWAVA
 
Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen GWAVA
 
Open Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschOpen Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschGWAVA
 

Destaque (7)

GWAVACon - SEP Sesam Backup: We care about your data (English)
GWAVACon - SEP Sesam Backup: We care about your data (English)GWAVACon - SEP Sesam Backup: We care about your data (English)
GWAVACon - SEP Sesam Backup: We care about your data (English)
 
Smart Backup Architectures for Big Data in Complex, Open Source Based IT Envi...
Smart Backup Architectures for Big Data in Complex, Open Source Based IT Envi...Smart Backup Architectures for Big Data in Complex, Open Source Based IT Envi...
Smart Backup Architectures for Big Data in Complex, Open Source Based IT Envi...
 
GWAVACon 2013: Requirements to Backup Solutions
GWAVACon 2013: Requirements to Backup SolutionsGWAVACon 2013: Requirements to Backup Solutions
GWAVACon 2013: Requirements to Backup Solutions
 
2012 10-sep-gwava-vibe-sharepoint-more
2012 10-sep-gwava-vibe-sharepoint-more2012 10-sep-gwava-vibe-sharepoint-more
2012 10-sep-gwava-vibe-sharepoint-more
 
GWAVACon - How to efficiently manage Novell GroupWise Security, Backup, Mail...
GWAVACon - How to efficiently manage Novell GroupWise  Security, Backup, Mail...GWAVACon - How to efficiently manage Novell GroupWise  Security, Backup, Mail...
GWAVACon - How to efficiently manage Novell GroupWise Security, Backup, Mail...
 
Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen
 
Open Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschOpen Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor Deutsch
 

Semelhante a GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies

Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)jasonlan
 
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander BerkouwerO365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander BerkouwerNCCOMMS
 
vDesk.works vs Microsoft Cloud 365 (VDI)
vDesk.works vs Microsoft Cloud 365 (VDI)vDesk.works vs Microsoft Cloud 365 (VDI)
vDesk.works vs Microsoft Cloud 365 (VDI)vDesk.Works
 
Azure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDKAzure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDKPeter Selch Dahl
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
InduSoft Water Wastewater Webinar 2012
InduSoft Water Wastewater Webinar 2012InduSoft Water Wastewater Webinar 2012
InduSoft Water Wastewater Webinar 2012AVEVA
 
SphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and SecuritySphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and SecurityYoav Crombie
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - PresentationAGATSoftware
 
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Stanfy
 
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...Codemotion Tel Aviv
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENDaron Walker
 
Evident.io corp overview
Evident.io corp overviewEvident.io corp overview
Evident.io corp overviewMark Marquiss
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaBipeen Sinha
 
Cloud computing bpos & windows azure oss
Cloud computing   bpos & windows azure ossCloud computing   bpos & windows azure oss
Cloud computing bpos & windows azure ossAvni Gupta
 

Semelhante a GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies (20)

Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander BerkouwerO365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
vDesk.works vs Microsoft Cloud 365 (VDI)
vDesk.works vs Microsoft Cloud 365 (VDI)vDesk.works vs Microsoft Cloud 365 (VDI)
vDesk.works vs Microsoft Cloud 365 (VDI)
 
Azure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDKAzure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDK
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Evernym May 2021 Product Update
Evernym May 2021 Product UpdateEvernym May 2021 Product Update
Evernym May 2021 Product Update
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
InduSoft Water Wastewater Webinar 2012
InduSoft Water Wastewater Webinar 2012InduSoft Water Wastewater Webinar 2012
InduSoft Water Wastewater Webinar 2012
 
SphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and SecuritySphereShield for Skype for Business - Compliance and Security
SphereShield for Skype for Business - Compliance and Security
 
SphereShield For Skype - Presentation
SphereShield For Skype - PresentationSphereShield For Skype - Presentation
SphereShield For Skype - Presentation
 
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
 
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation EN
 
Evident.io corp overview
Evident.io corp overviewEvident.io corp overview
Evident.io corp overview
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
Cloud computing bpos & windows azure oss
Cloud computing   bpos & windows azure ossCloud computing   bpos & windows azure oss
Cloud computing bpos & windows azure oss
 
Password Express - Data Sheet
Password Express - Data SheetPassword Express - Data Sheet
Password Express - Data Sheet
 

Mais de GWAVA

Open Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunOpen Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunGWAVA
 
Open Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishOpen Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishGWAVA
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrintGWAVA
 
GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GWAVA
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...GWAVA
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationDesktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationGWAVA
 
Open Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldOpen Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldGWAVA
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - OverviewGWAVA
 
Vibe Custom Development
Vibe Custom DevelopmentVibe Custom Development
Vibe Custom DevelopmentGWAVA
 
Third Party Client Access to GroupWise
Third Party Client Access to GroupWiseThird Party Client Access to GroupWise
Third Party Client Access to GroupWiseGWAVA
 
Gwava Cloud Offering
Gwava Cloud OfferingGwava Cloud Offering
Gwava Cloud OfferingGWAVA
 
Let’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesLet’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesGWAVA
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Exchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationExchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationGWAVA
 
Large Scale GWAVA 7
Large Scale GWAVA 7Large Scale GWAVA 7
Large Scale GWAVA 7GWAVA
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)GWAVA
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersGWAVA
 
Mobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainMobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainGWAVA
 
Archiving 2.0 - Retain Business Value
Archiving 2.0 - Retain Business ValueArchiving 2.0 - Retain Business Value
Archiving 2.0 - Retain Business ValueGWAVA
 

Mais de GWAVA (20)

Open Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunOpen Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit Run
 
Open Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishOpen Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor English
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrint
 
GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationDesktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
 
Open Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldOpen Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows world
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - Overview
 
Vibe Custom Development
Vibe Custom DevelopmentVibe Custom Development
Vibe Custom Development
 
Third Party Client Access to GroupWise
Third Party Client Access to GroupWiseThird Party Client Access to GroupWise
Third Party Client Access to GroupWise
 
Gwava Cloud Offering
Gwava Cloud OfferingGwava Cloud Offering
Gwava Cloud Offering
 
Let’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesLet’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and Features
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Exchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationExchange 2016 Cloud Migration
Exchange 2016 Cloud Migration
 
Large Scale GWAVA 7
Large Scale GWAVA 7Large Scale GWAVA 7
Large Scale GWAVA 7
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYING
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
 
Mobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainMobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with Retain
 
Archiving 2.0 - Retain Business Value
Archiving 2.0 - Retain Business ValueArchiving 2.0 - Retain Business Value
Archiving 2.0 - Retain Business Value
 

Último

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Último (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies

  • 1. KeyShield SSO SSO infrastructure for Novell technologiesVáclav Šamša & dear Novell guests: Dean Lythgoe Richard Lindstedt Kai Reichert
  • 2. KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO Novell solutions Novell products?  We are talking about Filr, Vibe, GroupWise Mobility Service, GroupWise, iPrint, Messenger, Service Desk ...  All are or getting pretty standard, working with a principal – the only thing they need is to identify the user's object within a directory (eDirectory, Active Directory ...).  Btw, the vaste majority of users is still consuming Novell products service from the Windows desktop, cca 30% still with XP ...  Before, the integration point for SSO was the Novell Client for Windows, now, there is no connection in between the client and browser, web client...  So, back in 2009, the question was, how to make everything working together, on Windows, Linux, Mac and, of course, all mobile devices
  • 3. KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO SSO infrastructure for Novell solutions How do KeyShield SSO do it?  SAML support  ReST API interface for easy and fast direct integrations  The integrated system needs a short and easy piece of code, which will ask KeyShield SSO for the principal (UserID). Let's see the simplified schema
  • 4. KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO KeyShield SSO - authenticationKeyShield SSO - authentication Windows WorkstationWindows Workstation Browser or Native clientBrowser or Native client Integrated systemIntegrated system KeyShield SSO serverKeyShield SSO server Check user by IP of the Windows Workstation (Address of the Client) Send user ID (Principal) Valid session? No – ask KeyShield SSO server for the principal Search user profiles database for user ID provided by the KeyShield SSO server. Found – start session User is successfully authenticated by IS Run client/browser Client connect to the IS
  • 5. KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO SSO infrastructure for Novell solutions How do KeyShield SSO do it?  The user is identified by the IP address which is currently used by the user's device  This is working with anything which communicates via IP from the device  This includes any browser, any WebDAV. Let's see the simplified schema for Filr and Vibe
  • 6. KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO KeyShield SSO – Filr WebDAV exampleKeyShield SSO – Filr WebDAV example BrowserBrowser Web ClientWeb Client Novell Filr or VibeNovell Filr or Vibe KeyShield SSO serverKeyShield SSO server Check user by IP of the Windows Workstation (Address of the Client) Send user ID (Principal) WebDAV has no access to the browser cookie or session – ask KeyShield SSO server for the user's identity Search user profile for user ID provided by the KeyShield SSO server. Found. Session created. User can edit the file User clicks the Edit button for a particular document Windows built in Web Client gets request via WebDAV
  • 7. KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO SSO infrastructure for Novell solutions How do KeyShield SSO do it?  The user can authenticate to the SSO system, but means at least 2 authentications a day – to the environment/desktop and to the SSO  The demand we clearly see is for really tight integration – once the user is authenticated to the environment/desktop (eDirectory, ActiveDirectory etc), no further authentication is necessary for any systém  Any system means everything inside the LAN/WAN and also anything hosted (clouded)  There can be a SSO solution supporting NTLM and there is the KeyShield SSO – we support both. Let's see Novell Client for Windows integration simplified schema
  • 8. KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO Novell ClientNovell Client KeyShield clientKeyShield client KeyShield serverKeyShield server Authentication to eDirectory & to the workstation Authentication detected. Send user info to the KeyShield SSO server together with workstation IP address. Generates token which writes to the user's object in eDirectory. Token ID together with an authentication challenge is than sent to the KeyShield SSO client. Receive token ID and challenge eDirectory search for token ID, return value to the KeyShield client Generate response Validity check Authentication OK! KeyShield SSOKeyShield SSO
  • 9. KeyShield SSO Connects eDir/AD desktop login and mobile devices with SSO SSO infrastructure for Novell solutions How do KeyShield SSO do it?  The integration mechanism is rock solid.  With this kind of integration, the whole Novell environment, can be much more efficient and convenient then Microsoft.  Together with our colleagues from Novell, we support all scenarios, user platforms, server platforms, mobile devices  If you have any home brewed system, you are lucky with us – the integration is piece of cake  Let's discuss the SSO support for Novell technologies, following slides are pretty theoretical and boring ..
  • 10. KeyShield SSO SSO infrastructure for Novell technologiesvsamsa@tdp.cz www.keyshieldsso.com www.securewinbox.com