22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

282 Lotus Security Handbook<br />

► A single sign-on for each user into the SSO domain, typically only once per<br />

day.<br />

The benefits to security administrators include:<br />

► A single common registry of user information to manage and secure.<br />

► The ability to enforce common enterprise-wide password and security policies<br />

enables end-to-end security, possibly across application and system<br />

boundaries. Avoids the issues with inconsistent password complexity and<br />

change requirements on different systems.<br />

► It is easier to verify user security information and update when necessary,<br />

rather than tracking down all individual systems the user has access to. This<br />

is particularly valuable when users move to new roles with different access<br />

levels.<br />

The potential drawbacks of SSO are:<br />

► The effort for initial implementation can be significant based on the number of<br />

existing disparate systems.<br />

► A compromised user credential can provide access to a large number of<br />

applications.<br />

► Open standard mechanisms are either non-existent or vendor support for<br />

standards may be inconsistent and incompatible with other products.<br />

The challenge to provide SSO is working with independent security<br />

architectures, directories, and so forth, for each different existing application<br />

platform. To facilitate SSO, we need to make all our applications somehow use a<br />

common security infrastructure for authentication that can be passed seamlessly<br />

between applications. This requires some common format for representing<br />

authentication information or credentials that all the applications can understand<br />

and accept. And we need to be able to ensure the credentials are trustworthy.<br />

From a technical perspective, there are several different methods or tools that<br />

can be used to provide an SSO user experience with WebSphere and Lotus<br />

applications. The following SSO enablement methods that <strong>IBM</strong> Software<br />

products support are described in this chapter:<br />

► HTTP headers<br />

► Lightweight Third Party Authentication (LTPA)<br />

► X.509 certificates<br />

► DSAPI

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!