SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
1 Authentication Management
Managing the User Lifecycle
Across On-Premises and
Cloud-Hosted Applications
The evolution of password management beyond password synchronization and reset.
2 In the beginning...
• Password management products mostly started out doing just two simple things:
– Password synchronization.
– Self-service password reset.
• Integrations were relatively simple:
– Windows NT / Novell NetWare / Sun LDAP.
– Maybe a database or two.
• The user interface was simple:
– Web browser.
– Easy as 1 ... 2 ... 3:
* Sign in with a login ID.
* Type your password or answer a few questions.
* Choose a new password.
• This is so simple, any summer student could write one.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 1
Slide Presentation
3 But then things got complicated
• Users forget their primary password
– Catch 22: can’t login, so can’t open a browser, so can’t SSPR, so can’t login.
• Companies deployed lots of applications.
– 100 SAP servers?
– 10 mainframes?
– 1000 Unix boxes?
– 1000 databases?
• Enterprises started using this stuff, globally.
• Password management grew to meet these requirements:
– GINA DLLs – SSPR for locked out users.
– Lots of connectors – synch and reset app passwords.
– Translation / localization was added.
• This is not a summer student project any more!
4 Complexity keeps growing
Mobile workforce • Users need access to SSPR from anywhere, even before they
establish a VPN connection.
Global network • There may be hundreds of AD DCs.
• Users can’t wait for changes made at one site to affect their
account at another.
Smart cards and tokens • Users forget their PINs and need to reset those too.
Smart phones • These have passwords too.
• Should be both supported and leveraged.
Full disk encryption • Every security-conscious organization is deploying it and feels
the pain of key-recovery.
Integrate with IDM • Provision a user – and don’t wait before he can do SSPR.
• Authenticate before launching a federated connection (SAML,
WS*, Shibboleth).
© 2015 Hitachi ID Systems, Inc. All rights reserved. 2
Slide Presentation
5 It’s not just passwords any more
Users need to manage more authentication factors today:
• Passwords – likely will never go away.
• Smart cards – unlocked with a PIN.
• Token PINs – unlocked with a PIN or password.
• Hard disk encryption – must type a password before the OS will boot.
• PKI certificates – unlocked by a password or PIN.
• Voice or other biometrics – need to be enrolled.
• Security questions – first enrolled and periodically refreshed.
• Cell phone number/provider – can act as another authentication factor.
6 Many valid use cases
Self-service and enrollment basically mean that a user signs in with one authentication factor before
updating another:
Use case: Login with: To do this:
Password synch • Current password. • Choose a new password.
Self-service • Security questions.
• Smart card or token.
• Cell phone (random PIN via
SMS).
• Biometric.
• Choose a new password.
• Reset token PIN.
• Reset smart card PIN. HDD
key recovery.
Enrollment • Current password.
• Smart card or token.
• Fill in security questions.
• Provide voice print.
• Register cell phone.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 3
Slide Presentation
7 Small, one-platform solutions
• Many vendors are creating "silo" solutions to streamline support for their own products.
• Examples:
– RSA: including self-service PIN reset with token system.
– McAfee: including self-service HDD key recovery with SafeBoot.
– Smart card vendors: getting into PIN reset too.
– Quest, Namescape, many IVR vendors and some help desk vendors and probably many others
make AD-only SSPR systems.
• The whole point of identity management systems is to eliminate "security in a silo" solutions!
• Enterprises don’t want users to enroll 3 or 4 different profiles of security questions, or to support
multiple infrastructures.
• What’s needed is a consolidated, enterprise-class system to manage all authentication
factors.
8 Enterprises should demand better
• A single system to manage all authentication factors.
• Integrations with all of their major systems and applications.
• Support for mobile users – SSPR, cached credentials, etc.
• Integration with user provisioning, for "instant-on" capability.
• Integration with federation/WebSSO, for "login here, access app there" capability.
• Support for smart card PIN reset (note: this can never be done via a telephone).
• Support for token PIN reset.
• Support for hard drive key recovery.
• Support for collecting old and distributing new PKI certificates.
• Many authentication options: passwords, security questions, tokens, smart cards, biometrics, cell
phones.
• Many enrollment options: security questions, biometrics, phones.
• This is much more than just SSPR!
• This is AUTHENTICATION MANAGEMENT.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 4
Slide Presentation
9 Authentication management technology
• SSPR:
– Web UI (of course).
– GINA DLL (for 40% of issues that are Windows lockouts).
– GINA Service (same as GINA DLL but without the risk).
– Windows 7 Credential Provider (new PCs need this).
– Telephone / IVR (for mobile users and orgs that prefer the phone).
– Secure Kiosk Account (to avoid client software deployment).
• Self-service, non-password:
– Smart card PIN reset (must be done using ActiveX in browser).
– Token card PIN reset (at least for RSA).
– PKI certificate management (at least for Lotus Notes).
– HDD key recovery (becoming urgent for many customers).
• Mobile users:
– UI should work in a small browser (phone).
– Manage Blackberry passwords.
– SSPR for mobile users over temporary VPN.
– Update cached passwords on Windows after a PW change.
10 User adoption
• Most of these processes depend on user cooperation:
– Enrollment: typically to populate answers to security questions.
– Self-service: rather than calling the help desk.
• Users will not volunteer to do either.
• To get user adoption, we need a combination of things:
– Frequent reminders.
– Accessible UI (e.g., available when needed).
– Hard to miss UI (e.g., access from login prompt, portal, etc.).
– User friendly UI (e.g., no training required).
– A carrot (e.g., synchronized passwords; dinner for 2).
– A stick (e.g., slow response if you call the help desk).
• It helps if some of these things are built right into the authentication management product.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 5
Slide Presentation
11 Hitachi ID Password Manager
HiPM is the only product on the market that meets all of the requirements of enterprise authentication
management.
• Authenticate with and manage any
factor:
– Passwords
– Token and smart card PINs
– Security questions
– Cell phone / SMS PIN
– Voice biometrics
• Smart card PIN resets is via ActiveX.
• HDD key recovery is via telephone.
• Managed user enrollment is built-in.
• Access from anywhere:
– Web browser (any)
– Smart phone (any).
– Locked out workstation (GINA
service, SKA).
– Mobile laptop (temporary VPN).
– Voice phone (IVR).
12 Services Engagements
• Some of these features are complicated to setup.
• Just as "authentication management" is more powerful than "password management," these projects
are going to be longer.
• Examples:
– SSPR for mobile users – need to integrate with and customize temporary VPN connection.
– Smart card PIN reset – need to integrate with one-off card management system and with
whatever card readers and cards have been deployed.
– HDD key recovery – needs IVR plus key recovery server integration.
• Expect 30+ day deployments, even if there are just 2-3 integrations.
www.Hitachi-ID.com
500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com
Date: May 22, 2015 File: PRCS:pres

Más contenido relacionado

La actualidad más candente

Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
Hitachi ID Systems, Inc.
 
ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013
Aurangzeb Mufti
 

La actualidad más candente (18)

Biometric Products By WYSE Biometric System
Biometric Products By WYSE Biometric SystemBiometric Products By WYSE Biometric System
Biometric Products By WYSE Biometric System
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
 
VBOT
VBOTVBOT
VBOT
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
The changing computer for small biz
The changing computer for small bizThe changing computer for small biz
The changing computer for small biz
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Iot security and Authentication solution
Iot security and Authentication solutionIot security and Authentication solution
Iot security and Authentication solution
 
ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013ACTAtek corporate presentation march 2013
ACTAtek corporate presentation march 2013
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PE
 
Building Your Business Continuity Plan
Building Your Business Continuity PlanBuilding Your Business Continuity Plan
Building Your Business Continuity Plan
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013
 
Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"Алексей Слепцов_"Интернет вещей. Что это и для чего"
Алексей Слепцов_"Интернет вещей. Что это и для чего"
 
Insights into your IT Service Management - Middle East
Insights into your IT Service Management - Middle EastInsights into your IT Service Management - Middle East
Insights into your IT Service Management - Middle East
 
ACTAtek 3 Introduction
ACTAtek 3 IntroductionACTAtek 3 Introduction
ACTAtek 3 Introduction
 

Similar a Authentication Management

Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
Hitachi ID Systems, Inc.
 

Similar a Authentication Management (20)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptx
 

Más de Hitachi ID Systems, Inc.

Más de Hitachi ID Systems, Inc. (15)

Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
 

Último

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 

Último (20)

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 

Authentication Management

  • 1. 1 Authentication Management Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications The evolution of password management beyond password synchronization and reset. 2 In the beginning... • Password management products mostly started out doing just two simple things: – Password synchronization. – Self-service password reset. • Integrations were relatively simple: – Windows NT / Novell NetWare / Sun LDAP. – Maybe a database or two. • The user interface was simple: – Web browser. – Easy as 1 ... 2 ... 3: * Sign in with a login ID. * Type your password or answer a few questions. * Choose a new password. • This is so simple, any summer student could write one. © 2015 Hitachi ID Systems, Inc. All rights reserved. 1
  • 2. Slide Presentation 3 But then things got complicated • Users forget their primary password – Catch 22: can’t login, so can’t open a browser, so can’t SSPR, so can’t login. • Companies deployed lots of applications. – 100 SAP servers? – 10 mainframes? – 1000 Unix boxes? – 1000 databases? • Enterprises started using this stuff, globally. • Password management grew to meet these requirements: – GINA DLLs – SSPR for locked out users. – Lots of connectors – synch and reset app passwords. – Translation / localization was added. • This is not a summer student project any more! 4 Complexity keeps growing Mobile workforce • Users need access to SSPR from anywhere, even before they establish a VPN connection. Global network • There may be hundreds of AD DCs. • Users can’t wait for changes made at one site to affect their account at another. Smart cards and tokens • Users forget their PINs and need to reset those too. Smart phones • These have passwords too. • Should be both supported and leveraged. Full disk encryption • Every security-conscious organization is deploying it and feels the pain of key-recovery. Integrate with IDM • Provision a user – and don’t wait before he can do SSPR. • Authenticate before launching a federated connection (SAML, WS*, Shibboleth). © 2015 Hitachi ID Systems, Inc. All rights reserved. 2
  • 3. Slide Presentation 5 It’s not just passwords any more Users need to manage more authentication factors today: • Passwords – likely will never go away. • Smart cards – unlocked with a PIN. • Token PINs – unlocked with a PIN or password. • Hard disk encryption – must type a password before the OS will boot. • PKI certificates – unlocked by a password or PIN. • Voice or other biometrics – need to be enrolled. • Security questions – first enrolled and periodically refreshed. • Cell phone number/provider – can act as another authentication factor. 6 Many valid use cases Self-service and enrollment basically mean that a user signs in with one authentication factor before updating another: Use case: Login with: To do this: Password synch • Current password. • Choose a new password. Self-service • Security questions. • Smart card or token. • Cell phone (random PIN via SMS). • Biometric. • Choose a new password. • Reset token PIN. • Reset smart card PIN. HDD key recovery. Enrollment • Current password. • Smart card or token. • Fill in security questions. • Provide voice print. • Register cell phone. © 2015 Hitachi ID Systems, Inc. All rights reserved. 3
  • 4. Slide Presentation 7 Small, one-platform solutions • Many vendors are creating "silo" solutions to streamline support for their own products. • Examples: – RSA: including self-service PIN reset with token system. – McAfee: including self-service HDD key recovery with SafeBoot. – Smart card vendors: getting into PIN reset too. – Quest, Namescape, many IVR vendors and some help desk vendors and probably many others make AD-only SSPR systems. • The whole point of identity management systems is to eliminate "security in a silo" solutions! • Enterprises don’t want users to enroll 3 or 4 different profiles of security questions, or to support multiple infrastructures. • What’s needed is a consolidated, enterprise-class system to manage all authentication factors. 8 Enterprises should demand better • A single system to manage all authentication factors. • Integrations with all of their major systems and applications. • Support for mobile users – SSPR, cached credentials, etc. • Integration with user provisioning, for "instant-on" capability. • Integration with federation/WebSSO, for "login here, access app there" capability. • Support for smart card PIN reset (note: this can never be done via a telephone). • Support for token PIN reset. • Support for hard drive key recovery. • Support for collecting old and distributing new PKI certificates. • Many authentication options: passwords, security questions, tokens, smart cards, biometrics, cell phones. • Many enrollment options: security questions, biometrics, phones. • This is much more than just SSPR! • This is AUTHENTICATION MANAGEMENT. © 2015 Hitachi ID Systems, Inc. All rights reserved. 4
  • 5. Slide Presentation 9 Authentication management technology • SSPR: – Web UI (of course). – GINA DLL (for 40% of issues that are Windows lockouts). – GINA Service (same as GINA DLL but without the risk). – Windows 7 Credential Provider (new PCs need this). – Telephone / IVR (for mobile users and orgs that prefer the phone). – Secure Kiosk Account (to avoid client software deployment). • Self-service, non-password: – Smart card PIN reset (must be done using ActiveX in browser). – Token card PIN reset (at least for RSA). – PKI certificate management (at least for Lotus Notes). – HDD key recovery (becoming urgent for many customers). • Mobile users: – UI should work in a small browser (phone). – Manage Blackberry passwords. – SSPR for mobile users over temporary VPN. – Update cached passwords on Windows after a PW change. 10 User adoption • Most of these processes depend on user cooperation: – Enrollment: typically to populate answers to security questions. – Self-service: rather than calling the help desk. • Users will not volunteer to do either. • To get user adoption, we need a combination of things: – Frequent reminders. – Accessible UI (e.g., available when needed). – Hard to miss UI (e.g., access from login prompt, portal, etc.). – User friendly UI (e.g., no training required). – A carrot (e.g., synchronized passwords; dinner for 2). – A stick (e.g., slow response if you call the help desk). • It helps if some of these things are built right into the authentication management product. © 2015 Hitachi ID Systems, Inc. All rights reserved. 5
  • 6. Slide Presentation 11 Hitachi ID Password Manager HiPM is the only product on the market that meets all of the requirements of enterprise authentication management. • Authenticate with and manage any factor: – Passwords – Token and smart card PINs – Security questions – Cell phone / SMS PIN – Voice biometrics • Smart card PIN resets is via ActiveX. • HDD key recovery is via telephone. • Managed user enrollment is built-in. • Access from anywhere: – Web browser (any) – Smart phone (any). – Locked out workstation (GINA service, SKA). – Mobile laptop (temporary VPN). – Voice phone (IVR). 12 Services Engagements • Some of these features are complicated to setup. • Just as "authentication management" is more powerful than "password management," these projects are going to be longer. • Examples: – SSPR for mobile users – need to integrate with and customize temporary VPN connection. – Smart card PIN reset – need to integrate with one-off card management system and with whatever card readers and cards have been deployed. – HDD key recovery – needs IVR plus key recovery server integration. • Expect 30+ day deployments, even if there are just 2-3 integrations. www.Hitachi-ID.com 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com Date: May 22, 2015 File: PRCS:pres