SlideShare a Scribd company logo
1 of 2
Download to read offline
Enable Secure Mobile & Web 
                                                  Access to Microsoft SharePoint 
Empower Mobile Employees by Providing Secure Access to Microsoft SharePoint & Other 
Intranet Resources from Beyond the Enterprise Perimeter 
Remote SharePoint Access: 
1. Remote user launches browser or 
   native mobile app to access Microsoft 
   SharePoint or other intranet resource. 
2. SecureSpan Gateway challenges user 
   for credentials and authenticates using 
   Microsoft Active Directory. 
3. SSO session is created. A cookie or 
   OAuth access token is issued and 
   returned to the mobile application. 
4. Mobile application consumes 
   SharePoint Web application or API on 
   Gateway using the cookie or token. 
5. Gateway reverse‐proxies Web 
   application or intranet API, maps 
   external cookie/token with Kerberos                                                                                                         
   ticket for internal authorization. 


Learn More About Layer 7’s                        The Problem: Accessing SharePoint Beyond the Enterprise Perimeter  
Mobile Access Solutions                     Microsoft SharePoint authorizes user access based on a Microsoft domain session using 
        Phone                              Kerberos or similar technologies. An external user without a direct domain session 
         +1‐800‐681‐9377                    cannot access SharePoint directly using common Single Sign‐On (SSO) solutions 
         (toll free within North America)   deployed at the perimeter of the enterprise. Requiring VPN access to the enterprise for 
         or +1‐604‐681‐9377                 accessing SharePoint and other intranet resources is not practical and widens the attack 
        Email                              surface of the enterprise. 
         info@layer7.com 
        Web                                      The Solution: Layer 7 SecureSpan Gateway 
         www.layer7.com 
                                                  Layer 7 delivers a simple solution for brokering access to Microsoft‐based Web 
        Facebook     
                                                  applications and APIs. By deploying Layer 7’s SecureSpan Gateway in the DMZ, the 
         www.facebook.com/layer7 
                                                  enterprise can enable and control access to Microsoft SharePoint without the need for 
        Twitter 
                                                  VPN connections. This solution integrates into the existing environment, including the 
         @layer7 
                                                  SSO solution. Once this infrastructure is in place, the enterprise can leverage the same 
                                                  SecureSpan Gateway to control access to any Web applications and APIs that need to 
                                                  be consumed by mobile applications.  
                                                  Layer 7’s comprehensive suite of Mobile Access technologies includes: 
                                                      • SecureSpan Mobile Access Gateway  
                                                        Provides Mobile Access to APIs and Web applications and enforces policies for 
                                                        controlling this access 
                                                      • Identity Broker  
                                                        Integrates with backend and externally‐facing identity and access management 
                                             
                                                        (IAM) solutions and brokers between them at runtime 
                                                      • Layer 7 OAuth Toolkit  
                                                        Provides a complete OAuth implementation for issuing tokens to mobile 
                                                        applications consuming APIs plus flexible token/session lifecycle management 

                 Copyright © 2013 Layer 7 Technologies Inc. All rights reserved.  SecureSpan and the Layer 7 Technologies design mark are  
                 trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 


      
 




 

    Key Features 
    Mediation & Security for External Access 
                                          Ability to reverse‐proxy Web and API traffic 
    Reverse‐Proxying 
                                          Support for a wide range of protocols including HTTP(S), WebSocket, (S)FTP(S) and XMPP 
                                          Filter, redact and encrypt content to help identify and suppress leakage of sensitive 
                                           information (credit card numbers etc.) 
                                          Configure and deploy the SecureSpan Gateway as part of a PCI‐compliant process using Layer 
                                           7’s PCI‐DSS installation and configuration guide 
    Security & Compliance 
                                          Institute threat protection against SQL injection, denial‐of‐service (DoS) and cross‐site 
                                           scripting (XSS) attacks 
                                          Validate HTTP parameters, REST query/POST parameters, JSON data structures, XML 
                                           schemas etc. 
    Auditing/Logging                      Record all instances of access to Web applications and APIs 
                                          Policy enforcement 
    Access Control                        Integration with existing IAM and SSO solutions 
                                          Attribute‐based authorization 

    Identity Brokering 
                                          Authenticate users via form‐based authentication, HTTP Basic, NTLM, mutual authentication 
    Direct/Indirect                        or multi‐factor authentication 
    Authentication                        Create and manage sessions directly 
                                          Federate authentication to external SSO systems by redirecting 
                                          Integrate with IAM and SSO solutions including Microsoft Active Directory, CA SiteMinder, 
    IAM Integration                        Oracle Access Manager, OpenSSO/OpenAM, Tivoli and custom auth APIs 
                                          Map between external cookie/token and internal cookie/token 

    OAuth 
                                          Support for OAuth 1.0, 1.0a and 2.0 
                                          Sample applications for each core grant type (authorization code, implicit, password, client 
    Specification                          creds) and relevant extension grant types (SAML bearer, JWT), as well as two‐ and three‐
                                           legged scenarios 
                                          Bearer token or MAC token types 
                                          Policy‐based implementation for easy integration with existing APIs and IAM systems 
                                          Out‐of‐the‐box authorization server endpoints and resource server actions 
    Implementation 
                                          Token lifecycle management through APIs 
                                          Easy token revocation 

    Supported Standards

    HTTP(S), TLS 1.0 to 1.2, WebSocket, XMPP, AMQP, MQ Series, Tibco EMS, (S)FTP(S), WCF, Kerberos, Kerberos Delegation, 
    Kerberos Constrained Delegation, NTLM, OAuth 2.0, OAuth 1.0, OpenID Connect, SAML 1.1, SAML 2.0, Active Directory, LDAP, 
    XACML, PKCS, FIPS 140‐2, X.509 Certificates, Apple Push Notifications, Android Notifications, WS‐Security, WS‐Trust, 
    WS‐Federation, WS‐Addressing, WSSecureConversation, WS‐I BSP, WS‐ MetadataExchange, WS‐Policy, WS‐SecurityPolicy, 
    WS‐PolicyAttachment, WS‐SecureExchange, WS‐I, WSIL, UDDI, WSRR, MTOM, XML Signature, XML Encryption, XML, SOAP, 
    REST, XPath, XSLT, WSDL, XML Schema, JSON, JSON Path, JSON Schema 

    To learn more about Layer 7, call us today at +1‐800‐681‐9377 (toll free within North America) or +1‐604‐681‐9377. You can also: email 
         us at info@layer7.com; friend us on Facebook at facebook.com/layer7; visit us at layer7.com; follow us on Twitter (@layer7). 
         




                 Copyright © 2013 Layer 7 Technologies Inc. All rights reserved.  SecureSpan and the Layer 7 Technologies design mark are  
                 trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners. 

More Related Content

What's hot

5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
How to Choose the Right API Management Solution
How to Choose the Right API Management SolutionHow to Choose the Right API Management Solution
How to Choose the Right API Management SolutionCA API Management
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Melbourne API Management Seminar
Melbourne API Management SeminarMelbourne API Management Seminar
Melbourne API Management SeminarCA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
Best Practices for API Management
Best Practices for API Management Best Practices for API Management
Best Practices for API Management WSO2
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs CA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
APIs: State of the Union - Ross Garrett @ AppsWorld 2014
APIs: State of the Union - Ross Garrett @ AppsWorld 2014APIs: State of the Union - Ross Garrett @ AppsWorld 2014
APIs: State of the Union - Ross Garrett @ AppsWorld 2014CA API Management
 
apidays LIVE JAKARTA - Enterprise API management in agile integration by Ragh...
apidays LIVE JAKARTA - Enterprise API management in agile integration by Ragh...apidays LIVE JAKARTA - Enterprise API management in agile integration by Ragh...
apidays LIVE JAKARTA - Enterprise API management in agile integration by Ragh...apidays
 
API Management
API ManagementAPI Management
API ManagementProlifics
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...Akana
 
API Management Solution Powerpoint Presentation Slides
API Management Solution Powerpoint Presentation SlidesAPI Management Solution Powerpoint Presentation Slides
API Management Solution Powerpoint Presentation SlidesSlideTeam
 

What's hot (20)

5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
How to Choose the Right API Management Solution
How to Choose the Right API Management SolutionHow to Choose the Right API Management Solution
How to Choose the Right API Management Solution
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
CA API Gateway
CA API GatewayCA API Gateway
CA API Gateway
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
5 pillars of API Management
5 pillars of API Management5 pillars of API Management
5 pillars of API Management
 
Melbourne API Management Seminar
Melbourne API Management SeminarMelbourne API Management Seminar
Melbourne API Management Seminar
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
Best Practices for API Management
Best Practices for API Management Best Practices for API Management
Best Practices for API Management
 
API strategy with IBM API connect
API strategy with IBM API connectAPI strategy with IBM API connect
API strategy with IBM API connect
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
APIs: State of the Union - Ross Garrett @ AppsWorld 2014
APIs: State of the Union - Ross Garrett @ AppsWorld 2014APIs: State of the Union - Ross Garrett @ AppsWorld 2014
APIs: State of the Union - Ross Garrett @ AppsWorld 2014
 
apidays LIVE JAKARTA - Enterprise API management in agile integration by Ragh...
apidays LIVE JAKARTA - Enterprise API management in agile integration by Ragh...apidays LIVE JAKARTA - Enterprise API management in agile integration by Ragh...
apidays LIVE JAKARTA - Enterprise API management in agile integration by Ragh...
 
API Management
API ManagementAPI Management
API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
 
API Management Solution Powerpoint Presentation Slides
API Management Solution Powerpoint Presentation SlidesAPI Management Solution Powerpoint Presentation Slides
API Management Solution Powerpoint Presentation Slides
 

Viewers also liked

Value of SOA Governance for Cloud Computing
Value of SOA Governance for Cloud ComputingValue of SOA Governance for Cloud Computing
Value of SOA Governance for Cloud ComputingCA API Management
 
Not all XML Gateways are Created Equal
Not all XML Gateways are Created EqualNot all XML Gateways are Created Equal
Not all XML Gateways are Created EqualCA API Management
 
Technological revolutions
Technological revolutionsTechnological revolutions
Technological revolutionsFrank Calberg
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 

Viewers also liked (9)

Sharepoint mobile
Sharepoint mobileSharepoint mobile
Sharepoint mobile
 
Value of SOA Governance for Cloud Computing
Value of SOA Governance for Cloud ComputingValue of SOA Governance for Cloud Computing
Value of SOA Governance for Cloud Computing
 
Not all XML Gateways are Created Equal
Not all XML Gateways are Created EqualNot all XML Gateways are Created Equal
Not all XML Gateways are Created Equal
 
Technological revolutions
Technological revolutionsTechnological revolutions
Technological revolutions
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Reusable APIs
Reusable APIsReusable APIs
Reusable APIs
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 

Similar to Enable Secure Mobile & Web Access to Microsoft SharePoint

WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE Mahzad Zahedi
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforcedeimos
 
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseThe Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseForgeRock
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonJoel Oleson
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...apidays
 
Secure Elements in Web Applications
Secure Elements in Web ApplicationsSecure Elements in Web Applications
Secure Elements in Web ApplicationsOlivier Potonniée
 
The Middleware technology that connects the enterprise
The Middleware technology that connects the enterpriseThe Middleware technology that connects the enterprise
The Middleware technology that connects the enterprise Kasun Indrasiri
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access ManagementKalyana Sundaram
 
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?Tobias Koprowski
 
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityFederation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityCA API Management
 
Open Identity Stack Roadmap
Open Identity Stack RoadmapOpen Identity Stack Roadmap
Open Identity Stack RoadmapForgeRock
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantoneJose R
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
Design Practices for a Secure Azure Solution
Design Practices for a Secure Azure SolutionDesign Practices for a Secure Azure Solution
Design Practices for a Secure Azure SolutionMichele Leroux Bustamante
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with EverythingDave Hay
 

Similar to Enable Secure Mobile & Web Access to Microsoft SharePoint (20)

WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforce
 
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseThe Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
 
Secure Elements in Web Applications
Secure Elements in Web ApplicationsSecure Elements in Web Applications
Secure Elements in Web Applications
 
The Middleware technology that connects the enterprise
The Middleware technology that connects the enterpriseThe Middleware technology that connects the enterprise
The Middleware technology that connects the enterprise
 
RESTful Security
RESTful SecurityRESTful Security
RESTful Security
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Sign- On Express- Data Sheet
Sign- On Express-  Data SheetSign- On Express-  Data Sheet
Sign- On Express- Data Sheet
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
 
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityFederation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
 
Architect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon SessionArchitect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon Session
 
Open Identity Stack Roadmap
Open Identity Stack RoadmapOpen Identity Stack Roadmap
Open Identity Stack Roadmap
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Design Practices for a Secure Azure Solution
Design Practices for a Secure Azure SolutionDesign Practices for a Secure Azure Solution
Design Practices for a Secure Azure Solution
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything
 

More from CA API Management

Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...CA API Management
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014CA API Management
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...CA API Management
 
Is there an API in that (IoT)?
Is there an API in that (IoT)?Is there an API in that (IoT)?
Is there an API in that (IoT)?CA API Management
 
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureMapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureCA API Management
 
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...CA API Management
 
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...CA API Management
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
 

More from CA API Management (15)

Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
 
Is there an API in that (IoT)?
Is there an API in that (IoT)?Is there an API in that (IoT)?
Is there an API in that (IoT)?
 
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureMapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
 
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
 
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 

Enable Secure Mobile & Web Access to Microsoft SharePoint

  • 1. Enable Secure Mobile & Web  Access to Microsoft SharePoint  Empower Mobile Employees by Providing Secure Access to Microsoft SharePoint & Other  Intranet Resources from Beyond the Enterprise Perimeter  Remote SharePoint Access:  1. Remote user launches browser or  native mobile app to access Microsoft  SharePoint or other intranet resource.  2. SecureSpan Gateway challenges user  for credentials and authenticates using  Microsoft Active Directory.  3. SSO session is created. A cookie or  OAuth access token is issued and  returned to the mobile application.  4. Mobile application consumes  SharePoint Web application or API on  Gateway using the cookie or token.  5. Gateway reverse‐proxies Web  application or intranet API, maps  external cookie/token with Kerberos    ticket for internal authorization.  Learn More About Layer 7’s  The Problem: Accessing SharePoint Beyond the Enterprise Perimeter   Mobile Access Solutions  Microsoft SharePoint authorizes user access based on a Microsoft domain session using   Phone  Kerberos or similar technologies. An external user without a direct domain session  +1‐800‐681‐9377   cannot access SharePoint directly using common Single Sign‐On (SSO) solutions  (toll free within North America)   deployed at the perimeter of the enterprise. Requiring VPN access to the enterprise for  or +1‐604‐681‐9377  accessing SharePoint and other intranet resources is not practical and widens the attack   Email  surface of the enterprise.  info@layer7.com   Web   The Solution: Layer 7 SecureSpan Gateway  www.layer7.com  Layer 7 delivers a simple solution for brokering access to Microsoft‐based Web   Facebook      applications and APIs. By deploying Layer 7’s SecureSpan Gateway in the DMZ, the  www.facebook.com/layer7  enterprise can enable and control access to Microsoft SharePoint without the need for   Twitter  VPN connections. This solution integrates into the existing environment, including the  @layer7  SSO solution. Once this infrastructure is in place, the enterprise can leverage the same  SecureSpan Gateway to control access to any Web applications and APIs that need to  be consumed by mobile applications.   Layer 7’s comprehensive suite of Mobile Access technologies includes:  • SecureSpan Mobile Access Gateway   Provides Mobile Access to APIs and Web applications and enforces policies for  controlling this access  • Identity Broker   Integrates with backend and externally‐facing identity and access management    (IAM) solutions and brokers between them at runtime  • Layer 7 OAuth Toolkit   Provides a complete OAuth implementation for issuing tokens to mobile  applications consuming APIs plus flexible token/session lifecycle management  Copyright © 2013 Layer 7 Technologies Inc. All rights reserved.  SecureSpan and the Layer 7 Technologies design mark are   trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.   
  • 2.     Key Features  Mediation & Security for External Access   Ability to reverse‐proxy Web and API traffic  Reverse‐Proxying   Support for a wide range of protocols including HTTP(S), WebSocket, (S)FTP(S) and XMPP   Filter, redact and encrypt content to help identify and suppress leakage of sensitive  information (credit card numbers etc.)   Configure and deploy the SecureSpan Gateway as part of a PCI‐compliant process using Layer  7’s PCI‐DSS installation and configuration guide  Security & Compliance   Institute threat protection against SQL injection, denial‐of‐service (DoS) and cross‐site  scripting (XSS) attacks   Validate HTTP parameters, REST query/POST parameters, JSON data structures, XML  schemas etc.  Auditing/Logging   Record all instances of access to Web applications and APIs   Policy enforcement  Access Control   Integration with existing IAM and SSO solutions   Attribute‐based authorization  Identity Brokering   Authenticate users via form‐based authentication, HTTP Basic, NTLM, mutual authentication  Direct/Indirect  or multi‐factor authentication  Authentication   Create and manage sessions directly   Federate authentication to external SSO systems by redirecting   Integrate with IAM and SSO solutions including Microsoft Active Directory, CA SiteMinder,  IAM Integration  Oracle Access Manager, OpenSSO/OpenAM, Tivoli and custom auth APIs   Map between external cookie/token and internal cookie/token  OAuth   Support for OAuth 1.0, 1.0a and 2.0   Sample applications for each core grant type (authorization code, implicit, password, client  Specification  creds) and relevant extension grant types (SAML bearer, JWT), as well as two‐ and three‐ legged scenarios   Bearer token or MAC token types   Policy‐based implementation for easy integration with existing APIs and IAM systems   Out‐of‐the‐box authorization server endpoints and resource server actions  Implementation   Token lifecycle management through APIs   Easy token revocation  Supported Standards HTTP(S), TLS 1.0 to 1.2, WebSocket, XMPP, AMQP, MQ Series, Tibco EMS, (S)FTP(S), WCF, Kerberos, Kerberos Delegation,  Kerberos Constrained Delegation, NTLM, OAuth 2.0, OAuth 1.0, OpenID Connect, SAML 1.1, SAML 2.0, Active Directory, LDAP,  XACML, PKCS, FIPS 140‐2, X.509 Certificates, Apple Push Notifications, Android Notifications, WS‐Security, WS‐Trust,  WS‐Federation, WS‐Addressing, WSSecureConversation, WS‐I BSP, WS‐ MetadataExchange, WS‐Policy, WS‐SecurityPolicy,  WS‐PolicyAttachment, WS‐SecureExchange, WS‐I, WSIL, UDDI, WSRR, MTOM, XML Signature, XML Encryption, XML, SOAP,  REST, XPath, XSLT, WSDL, XML Schema, JSON, JSON Path, JSON Schema  To learn more about Layer 7, call us today at +1‐800‐681‐9377 (toll free within North America) or +1‐604‐681‐9377. You can also: email  us at info@layer7.com; friend us on Facebook at facebook.com/layer7; visit us at layer7.com; follow us on Twitter (@layer7).    Copyright © 2013 Layer 7 Technologies Inc. All rights reserved.  SecureSpan and the Layer 7 Technologies design mark are   trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.