SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
CESP-ID
Cybercom Enhanced
Security Platform

CESP-ID is a flexible authentication solution that provides secure authentica-
tion of users and enables Single Sign On between applications and organi-
zations. It is based on the Security Assertion Markup Language (SAML) 2.0,
which is an XML-based standard for exchanging authentication data between
security domains. CESP-ID supports several different authentication mecha-
nisms and is integrated with Trusted Security Server for providing verifica-
tion of electronic ID (EID). CESP-ID is compliant with the Swedish healthcare
standard “Bastjänster för Informationsförsörjning“, BIF and also conforms to
SAML V2.0 IdP LITE profile.
#2-12-2009
Cybercom
CESP-ID




CESP-ID                                                   CESP-ID Authentication Service
CESP-ID is built up by two services, CESP-ID Authenti-    CESP-ID Authentication Service is the Identity Provider
cation Service and CESP-ID Validation Service, which      (IdP) that authenticates the user and issues a SAML
together form a flexible authentication solution. It is   assertion that verifies the user’s identity. It ships with
possible to add new custom authentication provid-         the following features:
ers as well as integration modules according to your
organization’s needs, thanks to CESP-ID’s extensible      •	   Secure authentication with support for several
design and use of web services interface.                      different authentication methods through
                                                               CESP-ID Authentication Providers
The organization benefits of using CESP-ID is a more      •	   Issuing of SAML 2.0 Assertions
secure authentication and effective administration of
                                                          •	   Signing of assertions by the XML Digital Signa-
user accounts at one place for all applications, and
                                                               ture standard
the possibility to provide Single Sign On for enhanced
user experience.                                          •	   Support for Single Sign On through the SAML
                                                               Web Browser SSO Profile standard
                                                          •	   Support for Single Log Out (IdP- and SP-initiate
                                                          •	   Support for automatic registration of users
                                                          •	   Integration with legacy systems that use custom
                                                               stores for user credentials
                                                          •	   Logging of authentication events with customiz-
                                                               able detail level


                                                                                                                       Page 2
Cybercom
CESP-ID




CESP-ID Authentication Providers                              CESP-ID Validation Service
CESP-ID’s Authentication Providers delivers a flexible        CESP-ID Validation Service is responsible for verifying
solution for integrating different authentication             an issued SAML assertion and is used by the Service
methods with CESP-ID. The following Authentication            Provider when validating a user’s identity. It performs
Providers are currently available:                            the following checks on each SAML assertion:
                                                              •	   XML Validation against schema definitions en-
•	   Username & Password in custom database
                                                                   sures that the SAML assertion is well formed
•	   Integrated Windows Authentication through
                                                              •	   Valid Time Checking ensures that the assertion
     Active Directory (NTLM / Kerberos)
                                                                   is not expired and that the current time is within
•	   Verification of X.509-certificates including revo-            the valid time window
     cation control (CRL and OCSP)*
                                                              •	   Valid Signature Checking ensures that the asser-
•	   Verification of EID (electronic ID)*                          tion has not been tampered or forged
•	   Novell eDirectory using LDAP (SSL/TLS)                   •	   Signing Certificate Checking ensures that the
                                                                   signing certificate was valid at the time of sign-
*All certificate verifications are done through Trusted            ing and that it is issued by a trusted Certificate
Security Server, which is certified by “Bankernas ID-              Authority
tjänst”
                                                              •	   Proof of Possession Checking ensures that the
                                                                   user presenting the SAML assertion is in fact the
New authentication methods can be added by
                                                                   user it was issued to
implementing a custom Authentication Provider for
CESP-ID.
                                                              CESP-ID Integration Modules
CESP-ID Attribute Providers                                   CESP-ID Integration Modules ensures smooth integra-
CESP-ID ’s Attribute Providers makes it possible to use       tion with existing applications and systems. These
several different attribute sources. It is also possible to   integration modules enable other systems to take
configure which Service Providers that require certain        advantage of the authentication functions that
attributes, so that each SAML Assertion is customized         CESP-ID provides and can be used to achieve SSO
for the specific Service where it will be consumed.           between applications.

The attributes can be retrieved from the following            CESP-ID comes with a ready-made integration mod-
sources:                                                      ule for use together with Forms Authentication in
                                                              ASP.NET. This integration module is built on
•	   Database                                                 Microsoft’s Provider Model and can be used to
•	   LDAP catalog                                             provide a SAML based authentication in applications,
                                                              for example SharePoint and EPiServer. The Forms
•	   X.509 Certificate
                                                              Authentication integration module includes the
                                                              following:

                                                              •	   Specialized login page which performs authen-
                                                                   tication through CESP-ID Authentication Service
                                                                   according to SAML Web Browser SSO Profile.
                                                              •	   SamlMembershipProvider, SamlRoleProvider and
                                                                   SamlMembershipUser, which are used to create
                                                                   the user’s identity and role based on his/her
                                                                   SAML assertion



                                                                                                                        Page 3
Cybercom
CESP-ID




About Cybercom                                            Contact Details
The Cybercom Group is a high-tech consultancy that        For further information, please contact:
offers global sourcing for end-to-end solutions. The
                                                          Henrik Johansson, Business Unit Manager
Group established itself as a world-class supplier in
                                                          henrik.johansson@cybercomgroup.com
these segments: security, portal solutions, mobile
                                                          +46 70 825 00 80
services, and embedded systems.
                                                          or vistit our website www.cybercom.com
Thanks to its extensive industry and operations ex-
perience, Cybercom can offer strategic and techno-
logical expertise to these markets: telecom, industry,
media, public sector, retail, and banking and financial
services.

The Group employs 2,000 persons and runs projects
worldwide. Cybercom has 28 offices in 11 countries.
Since 1999, Cybercom’s share has been quoted on
the NASDAQ OMX Nordic Exchange. The company
was launched in 1995.




                                                                                                     Page 4


Cybercom Group Europe AB (publ.)
P.O. Box 7574 · SE-103 93 Stockholm · Sweden
Phone: +46 8 578 646 00 · www.cybercom.com

Más contenido relacionado

La actualidad más candente

SharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims AuthenticationSharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims AuthenticationBrian Culver
 
Slide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate AuthoritySlide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate Authoritywebhostingguy
 
Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...Amazon Web Services
 
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSAWS User Group Kochi
 
Aerohive-GuestManager
Aerohive-GuestManagerAerohive-GuestManager
Aerohive-GuestManagerppuichaud
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Systems, Inc.
 
Saas webinar-dec6-01
Saas webinar-dec6-01Saas webinar-dec6-01
Saas webinar-dec6-01Paul Madsen
 
CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0CloudIDSummit
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Michael Noel
 
Smart Card Authentication
Smart Card AuthenticationSmart Card Authentication
Smart Card AuthenticationDan Usher
 
Silverlight 4 & Windows Phone 7 at Zup Zip Black Coffee#5
Silverlight 4 & Windows Phone 7 at Zup Zip Black Coffee#5Silverlight 4 & Windows Phone 7 at Zup Zip Black Coffee#5
Silverlight 4 & Windows Phone 7 at Zup Zip Black Coffee#5SoftEngine
 
Thinkfree Office Live Introduction Material En
Thinkfree Office Live   Introduction Material EnThinkfree Office Live   Introduction Material En
Thinkfree Office Live Introduction Material EnBenedict Ji
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
 
ClouDesire @ Italian DevOps Initiative 2013 #idi2013
ClouDesire @ Italian DevOps Initiative 2013 #idi2013ClouDesire @ Italian DevOps Initiative 2013 #idi2013
ClouDesire @ Italian DevOps Initiative 2013 #idi2013Giovanni Toraldo
 
State-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationState-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationOliver Pfaff
 
Thomas vochten claims-spsbe26
Thomas vochten claims-spsbe26Thomas vochten claims-spsbe26
Thomas vochten claims-spsbe26BIWUG
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancyDevam Shah
 

La actualidad más candente (19)

SharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims AuthenticationSharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
 
Slide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate AuthoritySlide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate Authority
 
Amazon Cognito Deep Dive
Amazon Cognito Deep DiveAmazon Cognito Deep Dive
Amazon Cognito Deep Dive
 
Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...
 
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
 
Authentication Server
Authentication ServerAuthentication Server
Authentication Server
 
Aerohive-GuestManager
Aerohive-GuestManagerAerohive-GuestManager
Aerohive-GuestManager
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Saas webinar-dec6-01
Saas webinar-dec6-01Saas webinar-dec6-01
Saas webinar-dec6-01
 
CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0CIS13: Introduction to OAuth 2.0
CIS13: Introduction to OAuth 2.0
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
 
Smart Card Authentication
Smart Card AuthenticationSmart Card Authentication
Smart Card Authentication
 
Silverlight 4 & Windows Phone 7 at Zup Zip Black Coffee#5
Silverlight 4 & Windows Phone 7 at Zup Zip Black Coffee#5Silverlight 4 & Windows Phone 7 at Zup Zip Black Coffee#5
Silverlight 4 & Windows Phone 7 at Zup Zip Black Coffee#5
 
Thinkfree Office Live Introduction Material En
Thinkfree Office Live   Introduction Material EnThinkfree Office Live   Introduction Material En
Thinkfree Office Live Introduction Material En
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
 
ClouDesire @ Italian DevOps Initiative 2013 #idi2013
ClouDesire @ Italian DevOps Initiative 2013 #idi2013ClouDesire @ Italian DevOps Initiative 2013 #idi2013
ClouDesire @ Italian DevOps Initiative 2013 #idi2013
 
State-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationState-of-the-Art in Web Services Federation
State-of-the-Art in Web Services Federation
 
Thomas vochten claims-spsbe26
Thomas vochten claims-spsbe26Thomas vochten claims-spsbe26
Thomas vochten claims-spsbe26
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
 

Destacado

Baird's 2008 Industrial Conference
Baird's 2008 Industrial ConferenceBaird's 2008 Industrial Conference
Baird's 2008 Industrial Conferencefinance46
 
3projects
3projects3projects
3projectsklee4vp
 
telephone data systems TDS_Corporate
telephone data systems TDS_Corporatetelephone data systems TDS_Corporate
telephone data systems TDS_Corporatefinance48
 
Tendências Vestidos 2009
Tendências Vestidos 2009Tendências Vestidos 2009
Tendências Vestidos 2009casebem
 
hormel foods nrl_020201
hormel foods  nrl_020201hormel foods  nrl_020201
hormel foods nrl_020201finance46
 
molson coors brewing 200710K
molson coors brewing  200710Kmolson coors brewing  200710K
molson coors brewing 200710Kfinance46
 
CloudStack&日本CloudStackユーザ会のご紹介(仮)
CloudStack&日本CloudStackユーザ会のご紹介(仮)CloudStack&日本CloudStackユーザ会のご紹介(仮)
CloudStack&日本CloudStackユーザ会のご紹介(仮)Yoshitake Takata
 
ncr annual reports 2001
ncr annual reports 2001ncr annual reports 2001
ncr annual reports 2001finance46
 
Аудит маркетинга УТГ 2008
Аудит маркетинга УТГ 2008Аудит маркетинга УТГ 2008
Аудит маркетинга УТГ 2008Vadim Andreev
 
hormel foods hrl_990330_200_120
hormel foods  hrl_990330_200_120hormel foods  hrl_990330_200_120
hormel foods hrl_990330_200_120finance46
 
Прототип сайта Paymantix 06 2014(ver.3)
Прототип сайта Paymantix 06 2014(ver.3)Прототип сайта Paymantix 06 2014(ver.3)
Прототип сайта Paymantix 06 2014(ver.3)Vadim Andreev
 
РЖД-Партнер №3 (151) 02-2009
РЖД-Партнер №3 (151) 02-2009РЖД-Партнер №3 (151) 02-2009
РЖД-Партнер №3 (151) 02-2009Vadim Andreev
 
advance auto parts 2001ar
advance auto parts 2001aradvance auto parts 2001ar
advance auto parts 2001arfinance48
 
Emixion Koffie verkeerd presentatie - Hoe communiceren met Google
Emixion Koffie verkeerd presentatie - Hoe communiceren met GoogleEmixion Koffie verkeerd presentatie - Hoe communiceren met Google
Emixion Koffie verkeerd presentatie - Hoe communiceren met GoogleJohn Meijering ✔
 
hormel foods 2003_Proxy
hormel foods  2003_Proxyhormel foods  2003_Proxy
hormel foods 2003_Proxyfinance46
 
Roebuck Media Kit 7.09
Roebuck Media Kit 7.09Roebuck Media Kit 7.09
Roebuck Media Kit 7.09stwordsmith
 
molson coors brewing 2007AnnualReportEN
molson coors brewing   2007AnnualReportENmolson coors brewing   2007AnnualReportEN
molson coors brewing 2007AnnualReportENfinance46
 

Destacado (20)

1438 Misin Imposible I,Ii,Iii
1438 Misin Imposible I,Ii,Iii1438 Misin Imposible I,Ii,Iii
1438 Misin Imposible I,Ii,Iii
 
Baird's 2008 Industrial Conference
Baird's 2008 Industrial ConferenceBaird's 2008 Industrial Conference
Baird's 2008 Industrial Conference
 
3projects
3projects3projects
3projects
 
telephone data systems TDS_Corporate
telephone data systems TDS_Corporatetelephone data systems TDS_Corporate
telephone data systems TDS_Corporate
 
Tendências Vestidos 2009
Tendências Vestidos 2009Tendências Vestidos 2009
Tendências Vestidos 2009
 
hormel foods nrl_020201
hormel foods  nrl_020201hormel foods  nrl_020201
hormel foods nrl_020201
 
molson coors brewing 200710K
molson coors brewing  200710Kmolson coors brewing  200710K
molson coors brewing 200710K
 
CloudStack&日本CloudStackユーザ会のご紹介(仮)
CloudStack&日本CloudStackユーザ会のご紹介(仮)CloudStack&日本CloudStackユーザ会のご紹介(仮)
CloudStack&日本CloudStackユーザ会のご紹介(仮)
 
ncr annual reports 2001
ncr annual reports 2001ncr annual reports 2001
ncr annual reports 2001
 
Аудит маркетинга УТГ 2008
Аудит маркетинга УТГ 2008Аудит маркетинга УТГ 2008
Аудит маркетинга УТГ 2008
 
hormel foods hrl_990330_200_120
hormel foods  hrl_990330_200_120hormel foods  hrl_990330_200_120
hormel foods hrl_990330_200_120
 
The Social Research Group
The Social Research GroupThe Social Research Group
The Social Research Group
 
Прототип сайта Paymantix 06 2014(ver.3)
Прототип сайта Paymantix 06 2014(ver.3)Прототип сайта Paymantix 06 2014(ver.3)
Прототип сайта Paymantix 06 2014(ver.3)
 
РЖД-Партнер №3 (151) 02-2009
РЖД-Партнер №3 (151) 02-2009РЖД-Партнер №3 (151) 02-2009
РЖД-Партнер №3 (151) 02-2009
 
advance auto parts 2001ar
advance auto parts 2001aradvance auto parts 2001ar
advance auto parts 2001ar
 
Emixion Koffie verkeerd presentatie - Hoe communiceren met Google
Emixion Koffie verkeerd presentatie - Hoe communiceren met GoogleEmixion Koffie verkeerd presentatie - Hoe communiceren met Google
Emixion Koffie verkeerd presentatie - Hoe communiceren met Google
 
hormel foods 2003_Proxy
hormel foods  2003_Proxyhormel foods  2003_Proxy
hormel foods 2003_Proxy
 
Roebuck Media Kit 7.09
Roebuck Media Kit 7.09Roebuck Media Kit 7.09
Roebuck Media Kit 7.09
 
Kajian Pengobatan Nabi
Kajian Pengobatan NabiKajian Pengobatan Nabi
Kajian Pengobatan Nabi
 
molson coors brewing 2007AnnualReportEN
molson coors brewing   2007AnnualReportENmolson coors brewing   2007AnnualReportEN
molson coors brewing 2007AnnualReportEN
 

Similar a Cybercom Enhanced Security Platform, CESP-ID

Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCloudIDSummit
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandkate_holden
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demandpjpallen
 
Deep Dive on Amazon Cognito - DevDay Los Angeles 2017
Deep Dive on Amazon Cognito - DevDay Los Angeles 2017Deep Dive on Amazon Cognito - DevDay Los Angeles 2017
Deep Dive on Amazon Cognito - DevDay Los Angeles 2017Amazon Web Services
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SASrobbuddingh
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdfDeepakAC3
 
Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8Iwantha Lekamge
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforcedeimos
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsIRJET Journal
 
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech TalksDeep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech TalksAmazon Web Services
 
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Amazon Web Services
 
Office 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsOffice 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsamitchachra
 
Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...
Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...
Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...Amazon Web Services
 
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...Cisco Canada
 

Similar a Cybercom Enhanced Security Platform, CESP-ID (20)

Cognito Customer Deep Dive
Cognito Customer Deep DiveCognito Customer Deep Dive
Cognito Customer Deep Dive
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the Cloud
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 
Signify Passcode On Demand
Signify Passcode On DemandSignify Passcode On Demand
Signify Passcode On Demand
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Deep Dive on Amazon Cognito - DevDay Los Angeles 2017
Deep Dive on Amazon Cognito - DevDay Los Angeles 2017Deep Dive on Amazon Cognito - DevDay Los Angeles 2017
Deep Dive on Amazon Cognito - DevDay Los Angeles 2017
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
 
Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforce
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed Systems
 
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech TalksDeep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
Deep Dive on User Sign-up Sign-in with Amazon Cognito - AWS Online Tech Talks
 
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
 
Federated and fabulous identity
Federated and fabulous identityFederated and fabulous identity
Federated and fabulous identity
 
Office 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsOffice 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfs
 
Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...
Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...
Amazon Cognito Public Beta of Built-in UI for User Sign-up/in and SAML Federa...
 
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
 

Cybercom Enhanced Security Platform, CESP-ID

  • 1. CESP-ID Cybercom Enhanced Security Platform CESP-ID is a flexible authentication solution that provides secure authentica- tion of users and enables Single Sign On between applications and organi- zations. It is based on the Security Assertion Markup Language (SAML) 2.0, which is an XML-based standard for exchanging authentication data between security domains. CESP-ID supports several different authentication mecha- nisms and is integrated with Trusted Security Server for providing verifica- tion of electronic ID (EID). CESP-ID is compliant with the Swedish healthcare standard “Bastjänster för Informationsförsörjning“, BIF and also conforms to SAML V2.0 IdP LITE profile.
  • 2. #2-12-2009 Cybercom CESP-ID CESP-ID CESP-ID Authentication Service CESP-ID is built up by two services, CESP-ID Authenti- CESP-ID Authentication Service is the Identity Provider cation Service and CESP-ID Validation Service, which (IdP) that authenticates the user and issues a SAML together form a flexible authentication solution. It is assertion that verifies the user’s identity. It ships with possible to add new custom authentication provid- the following features: ers as well as integration modules according to your organization’s needs, thanks to CESP-ID’s extensible • Secure authentication with support for several design and use of web services interface. different authentication methods through CESP-ID Authentication Providers The organization benefits of using CESP-ID is a more • Issuing of SAML 2.0 Assertions secure authentication and effective administration of • Signing of assertions by the XML Digital Signa- user accounts at one place for all applications, and ture standard the possibility to provide Single Sign On for enhanced user experience. • Support for Single Sign On through the SAML Web Browser SSO Profile standard • Support for Single Log Out (IdP- and SP-initiate • Support for automatic registration of users • Integration with legacy systems that use custom stores for user credentials • Logging of authentication events with customiz- able detail level Page 2
  • 3. Cybercom CESP-ID CESP-ID Authentication Providers CESP-ID Validation Service CESP-ID’s Authentication Providers delivers a flexible CESP-ID Validation Service is responsible for verifying solution for integrating different authentication an issued SAML assertion and is used by the Service methods with CESP-ID. The following Authentication Provider when validating a user’s identity. It performs Providers are currently available: the following checks on each SAML assertion: • XML Validation against schema definitions en- • Username & Password in custom database sures that the SAML assertion is well formed • Integrated Windows Authentication through • Valid Time Checking ensures that the assertion Active Directory (NTLM / Kerberos) is not expired and that the current time is within • Verification of X.509-certificates including revo- the valid time window cation control (CRL and OCSP)* • Valid Signature Checking ensures that the asser- • Verification of EID (electronic ID)* tion has not been tampered or forged • Novell eDirectory using LDAP (SSL/TLS) • Signing Certificate Checking ensures that the signing certificate was valid at the time of sign- *All certificate verifications are done through Trusted ing and that it is issued by a trusted Certificate Security Server, which is certified by “Bankernas ID- Authority tjänst” • Proof of Possession Checking ensures that the user presenting the SAML assertion is in fact the New authentication methods can be added by user it was issued to implementing a custom Authentication Provider for CESP-ID. CESP-ID Integration Modules CESP-ID Attribute Providers CESP-ID Integration Modules ensures smooth integra- CESP-ID ’s Attribute Providers makes it possible to use tion with existing applications and systems. These several different attribute sources. It is also possible to integration modules enable other systems to take configure which Service Providers that require certain advantage of the authentication functions that attributes, so that each SAML Assertion is customized CESP-ID provides and can be used to achieve SSO for the specific Service where it will be consumed. between applications. The attributes can be retrieved from the following CESP-ID comes with a ready-made integration mod- sources: ule for use together with Forms Authentication in ASP.NET. This integration module is built on • Database Microsoft’s Provider Model and can be used to • LDAP catalog provide a SAML based authentication in applications, for example SharePoint and EPiServer. The Forms • X.509 Certificate Authentication integration module includes the following: • Specialized login page which performs authen- tication through CESP-ID Authentication Service according to SAML Web Browser SSO Profile. • SamlMembershipProvider, SamlRoleProvider and SamlMembershipUser, which are used to create the user’s identity and role based on his/her SAML assertion Page 3
  • 4. Cybercom CESP-ID About Cybercom Contact Details The Cybercom Group is a high-tech consultancy that For further information, please contact: offers global sourcing for end-to-end solutions. The Henrik Johansson, Business Unit Manager Group established itself as a world-class supplier in henrik.johansson@cybercomgroup.com these segments: security, portal solutions, mobile +46 70 825 00 80 services, and embedded systems. or vistit our website www.cybercom.com Thanks to its extensive industry and operations ex- perience, Cybercom can offer strategic and techno- logical expertise to these markets: telecom, industry, media, public sector, retail, and banking and financial services. The Group employs 2,000 persons and runs projects worldwide. Cybercom has 28 offices in 11 countries. Since 1999, Cybercom’s share has been quoted on the NASDAQ OMX Nordic Exchange. The company was launched in 1995. Page 4 Cybercom Group Europe AB (publ.) P.O. Box 7574 · SE-103 93 Stockholm · Sweden Phone: +46 8 578 646 00 · www.cybercom.com