410 likes | 622 Views
Extend SSO and Federation for Your SiteMinder Portal—for Less Time, Hassle, and Money. Elle Griffin, Radiant Logic June 28, 2012. Business Demands Evolution. Your portal has to grow and changes as business needs evolve. This means integrating: NEW INITIATIVES NEW APPLICATIONS
E N D
Extend SSO and Federation for Your SiteMinder Portal—for Less Time, Hassle, and Money Elle Griffin, Radiant Logic June 28, 2012
Business Demands Evolution • Your portal has to grow and changes as business needs evolve. This means integrating: • NEW INITIATIVES • NEW APPLICATIONS • NEW USER POPULATIONS SiteMinder is not designed to navigate and manage this heterogeneous identity layer.
SiteMinder’s Growing Pains SiteMinder Runs Into Trouble When It Comes to Identity Integration or Identity Federation: 1. Adding a New User Repository without Custom Configurations 2. Enabling Cross-Application SSO 3. Routing Authentication Across Multiple Sources 4. Rationalizing User Collision Across Disparate Sources
Ideal SiteMinder Deployment:Portal Hosting Multiple Applications
Adding Multiple Authentication Sources Slows Your System and Hinders Authentication
A Typical SiteMinder Deployment: Portal in Federation Mode
Adding Multiple Authentication Sources is a Challenge for the Identity Provider
Adding Multiple IdPs Could be a Solution--- But Could Jeopardizes SSO
The Solution: A Federated Identity Service Based on Virtualization
Building a Federated Identity Service • Enable Authentication and SSO Across Multiple Sources • Build a union list with no duplicates • Support Attribute-Driven Authorization • Extend profiles with join • Connect to Siteminder • Provide a single access point for web access management
STEP 1: Inventory Your Identity Sources and Remap Data to Create a Common Namespace
STEP 4: Gather Attributes to Build a Virtualized Global Profile
The Result: A SiteMinder That is Easier to Use, Costs Less Money, and Provides SSO
Your SiteMinder in Less Time, Hassle and Money • One Secure Access Point for SiteMinder • Enable New Applications, Functionality, and User Populations • Does not Disrupt Current Deployments • Intuitive, Wizard-Driven Work Process • Reusable for Any Initiative Beyond SiteMinder: Directory Migration, Cloud Integration, Federation, the list goes on!
Thank you Continue the conversation… Twitter: @RadiantLogic @RadiantElle Facebook.com/radiantlogic
Extending SiteMinder With Federated Identities Todd Clayton, Co-Founder todd.clayton@coreblox.com @tclayton
The IAM System Improving the Solution Unify auth sources and provide custom auth w/o code Extend authorization with profile enrichment Provide an unified point of access for audit information Leverage caching to improve system performance and access for HA
SiteMinder Challenges • Environments with a high number of user repositories • Enriching your policies for fine-grained authorization • Adding new identity stores and user populations to SiteMinder • Extending SiteMinder to enable cross-application SSO, even if you don’t have a global user identifier • Simplifying the management of users and policies • Addressing custom data requirements • Making the data available beyond SiteMinder
Adding a New Directory to SiteMinder • Create a new user directory • Add the user directory to each domain • Configure the authorized users in each relevant policy in the domains • Define the Directory Mapping configurations • Add the Directory Mapping to each relevant realm or advanced application configuration How Do You Handle This With 500 Applications???
Directory Mapping What happens with no common attribute in 12.5 or attributes are in different cases Only option pre 12.5 What about multiple mappings of the same type? Only legacy mappings for Applications
Where Directory Mapping Doesn’t Work • Federation has no mapping capabilities to retrieve attributes from other user repositories without coding for legacy federation • Disparate name identifiers or attributes across repositories for partnership federation • Systems which require a common GUID to map to disparate directories or databases where none exists • Application of multiple mappings to a single resource (realm) that depend upon the context of the request • There must be an attribute that have a unique value for each user (if 2 are found, then mapping fails)
Adding a New Directory VDS • Add the new user directory to VDS • Incorporate the user directory into the existing hierarchy With No SiteMinder Changes!!!
Aggregate and Disambiguate Identities One view of the identity across systems tclayton@co.com CID: tclayton@co.com 1470233 toddclay
SiteMinder Integration Opportunities • Password Policies across multiple repositories • Advanced attribute handling • SharePoint Agent dynamic groups • Creation of a repeatable deployment methodology through infrastructure blocks • Dynamic attributes and policies without coding • SiteMinder Policy Store
Disparate Password Policies • Underlying user repositories have different password policies • Need common model across all applications regardless of user source • Requirement to prevent invalid “strikes” when authenticating against multiple directories • Need to store password data for LDAP users in a database
Advanced Attribute Management • Modify attribute values • Combine attributes into a single response • Implement business logic when determining attribute values • Integrate data from “chained” objects • Map users to NT Domain for Integrated Windows Authentication • Create internal dynamic groups
Key Technical Benefits • Packaged Solution • Federated Identity Driven • Map Users Across Disparate User Stores • Enable Fine-Grained Authorization • Common Data Abstraction Layer
Questions CoreBlox 877-879-2569 info@coreblox.com www.coreblox.com www.ssohelp.com @coreblox or @ssohelp