SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Technical Note

Sign-On Express Security –
A technical note
Sign-On Express is a next generation Web Single Sign On solution that
provides users with seamless and secured access to any web based onpremise or cloud application from any device, anytime and anywhere. With
Sign-On Express, users have to sign-in once and they don’t have to type
their userid/password again and again.

Security in Sign-On Express
Sign On Express benefits
Increase user convenience and
productivity
SSO to any web based on-premise
or cloud application.
Secured cloud applications with
standard SSO protocols
Reduce password related help-desk
calls
Achieve compliance with extensive
auditing and reporting
Over 1500 SSO connectors
out-of-the-box and Do-It-Yourself
wizards to onboard other web based
applications for SSO without any
technical skill-set

SIMPLE

With ILANTUS’s deep domain experience in IAM and security since year 2000,
Sign-On Express has been architected ground up considering security best
practices to meet industry standard compliance norms. Sign-On Express deals
with lot of sensitive data that makes it imperative to secure data either at rest
or in motion.

Sign-On Express Development
Right from the development of the tool, the engineering team follows strict
security development lifecycle program based on AGILE SCRUM methodologies.
Before any version release is done, there are dedicated SPRINTS on peer code
review, vulnerability and penetration testing.

Security while data is in motion
Communication between all Sign-On Express components is over a secured
channel as depicted in the diagram.

SECURE

SWIFT
The following are the interactions between various components as indicated in the diagram:
1.

User’s browser to Sign-On Express Server – This communication is over secured HTTP(S) channel
and is encrypted. Depending on Sign-On Express deployment architecture, firewall, intrusion detection system,
proxy or reverse proxy could be some of the components that may be involved as well.

2.

Sign-On Express Server to LDAP – This communication is over secured LDAP(S) channel and is encrypted.

3.

Sign-On Express Server to Database – This communication is over secured channel and is encrypted.

Security while data is at rest
Static data resides in Database. All tables that have sensitive information are encrypted using industry standard AES 256-bit
block cipher encryption with unique key per customer.

Below table highlights the various additional security parameters of Sign-On Express
Security Parameter

Remarks


Multi-Factor Authentication



Password Vault Security



Integrated Windows
Authentication (IWA)
advanced security policies





In addition to regular userid/password based authentication, Sign-On Express also supports
multi-factor authentication built on HMAC-SHA1 algorithm.
The second level of authentication adds additional layer of security for user authentication.
For SSO to non-federated web-applications, Sign-On Express replays userid/password to give
users SSO experience. Sign-On Express leverages a secured Password Vault designed within the
database to securely store userid/password of the user.
Passwords are encrypted with industry standard AES 256-bit block cipher encryption with unique
key per customer. Passwords are not cached on the users workstation or browser at any point of
time. Only at run-time the userid/password is retrieved from the database and is injected to an
application on the browser.
Sign On Express supports IWA Authentication.
With advanced security policy, IWA can be restricted to multiple IP ranges. The feature adds
additional check for systems accessing the Sign On Express.

Vulnerability and
Penetration Testing



Every Sign-On Express release undergoes thorough vulnerability and penetration testing to ensure
strict security standard is followed.

Extensive Auditing & Logging



All events on Sign-On Express are audited and log levels can be configured.

SIEM integration for
co-relations and analytics



SIEM solutions could be integrated with Sign-On Express audit tables for co-relations to detect
anomalies at the enterprise level.

ILANTUS is a pioneer in identity and access management for more than a decade in industry
delivering the most comprehensive identity solution through its unique Hosting Express (HXP).
The HXP is built on a unique framework that enables components from multiple vendors of
your choice to be integrated into a unified solution, delivered in cloud or on-premise, and
managed by you or ILANTUS. All major Identity & Access Management components - Identity
& Access Governance, User Administration & Provisioning and Identity & Access intelligence
are incorporated in the HXP framework.

HOSTING

Weitere ähnliche Inhalte

Mehr von ILANTUS Technologies (9)

Score your Goals, Leave Password Management to us!
Score your Goals, Leave Password Management to us!Score your Goals, Leave Password Management to us!
Score your Goals, Leave Password Management to us!
 
Sign On Express for BPO
Sign On Express for BPOSign On Express for BPO
Sign On Express for BPO
 
Heartbleed
HeartbleedHeartbleed
Heartbleed
 
Heart bleed
Heart bleedHeart bleed
Heart bleed
 
ILANTUS Customer Case Study -- iGATE
ILANTUS Customer Case Study -- iGATEILANTUS Customer Case Study -- iGATE
ILANTUS Customer Case Study -- iGATE
 
Sign- On Express- Data Sheet
Sign- On Express-  Data SheetSign- On Express-  Data Sheet
Sign- On Express- Data Sheet
 
Password Express - Data Sheet
Password Express - Data SheetPassword Express - Data Sheet
Password Express - Data Sheet
 
ILANTUS Password Express FAQs
ILANTUS Password Express FAQsILANTUS Password Express FAQs
ILANTUS Password Express FAQs
 
Case Study
Case StudyCase Study
Case Study
 

Kürzlich hochgeladen

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 

Kürzlich hochgeladen (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 

Sign On Express (SXP)

  • 1. Technical Note Sign-On Express Security – A technical note Sign-On Express is a next generation Web Single Sign On solution that provides users with seamless and secured access to any web based onpremise or cloud application from any device, anytime and anywhere. With Sign-On Express, users have to sign-in once and they don’t have to type their userid/password again and again. Security in Sign-On Express Sign On Express benefits Increase user convenience and productivity SSO to any web based on-premise or cloud application. Secured cloud applications with standard SSO protocols Reduce password related help-desk calls Achieve compliance with extensive auditing and reporting Over 1500 SSO connectors out-of-the-box and Do-It-Yourself wizards to onboard other web based applications for SSO without any technical skill-set SIMPLE With ILANTUS’s deep domain experience in IAM and security since year 2000, Sign-On Express has been architected ground up considering security best practices to meet industry standard compliance norms. Sign-On Express deals with lot of sensitive data that makes it imperative to secure data either at rest or in motion. Sign-On Express Development Right from the development of the tool, the engineering team follows strict security development lifecycle program based on AGILE SCRUM methodologies. Before any version release is done, there are dedicated SPRINTS on peer code review, vulnerability and penetration testing. Security while data is in motion Communication between all Sign-On Express components is over a secured channel as depicted in the diagram. SECURE SWIFT
  • 2. The following are the interactions between various components as indicated in the diagram: 1. User’s browser to Sign-On Express Server – This communication is over secured HTTP(S) channel and is encrypted. Depending on Sign-On Express deployment architecture, firewall, intrusion detection system, proxy or reverse proxy could be some of the components that may be involved as well. 2. Sign-On Express Server to LDAP – This communication is over secured LDAP(S) channel and is encrypted. 3. Sign-On Express Server to Database – This communication is over secured channel and is encrypted. Security while data is at rest Static data resides in Database. All tables that have sensitive information are encrypted using industry standard AES 256-bit block cipher encryption with unique key per customer. Below table highlights the various additional security parameters of Sign-On Express Security Parameter Remarks  Multi-Factor Authentication   Password Vault Security  Integrated Windows Authentication (IWA) advanced security policies   In addition to regular userid/password based authentication, Sign-On Express also supports multi-factor authentication built on HMAC-SHA1 algorithm. The second level of authentication adds additional layer of security for user authentication. For SSO to non-federated web-applications, Sign-On Express replays userid/password to give users SSO experience. Sign-On Express leverages a secured Password Vault designed within the database to securely store userid/password of the user. Passwords are encrypted with industry standard AES 256-bit block cipher encryption with unique key per customer. Passwords are not cached on the users workstation or browser at any point of time. Only at run-time the userid/password is retrieved from the database and is injected to an application on the browser. Sign On Express supports IWA Authentication. With advanced security policy, IWA can be restricted to multiple IP ranges. The feature adds additional check for systems accessing the Sign On Express. Vulnerability and Penetration Testing  Every Sign-On Express release undergoes thorough vulnerability and penetration testing to ensure strict security standard is followed. Extensive Auditing & Logging  All events on Sign-On Express are audited and log levels can be configured. SIEM integration for co-relations and analytics  SIEM solutions could be integrated with Sign-On Express audit tables for co-relations to detect anomalies at the enterprise level. ILANTUS is a pioneer in identity and access management for more than a decade in industry delivering the most comprehensive identity solution through its unique Hosting Express (HXP). The HXP is built on a unique framework that enables components from multiple vendors of your choice to be integrated into a unified solution, delivered in cloud or on-premise, and managed by you or ILANTUS. All major Identity & Access Management components - Identity & Access Governance, User Administration & Provisioning and Identity & Access intelligence are incorporated in the HXP framework. HOSTING