Understanding Single Sign-On for UNIX/Linux-based web applications

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

How to identify intranet, extranet, SAP and other applications that are ripe for SSO – and how to make it happen in 30 minutes

“Enterprise single sign-on” brings to mind complex and expensive IT projects that have such a bad reputation that any SSO project becomes hard to sell internally. But most of your SSO pain probably centers on a few business-critical internal applications.

End-users are often angry about the multiple accounts and passwords they have to manage just do accomplish day-to-day tasks like accessing the corporate sales intranet, or working in SAP.

And helpdesk personnel are weary of doing constant password resets for those angry users. What if we could show you in less than 30 minutes how to enable single sign-on through users’ existing Windows-based credentials – without the need for infrastructure changes and with little or no changes to the web apps themselves?

If that’s appealing, then this webinar is for you.

In this free webinar, SSO expert Professor John Walker of ISACA will help you identify the “low-hanging SSO fruit” in your enterprise and will arm you with the business case you need to justify a lightweight SSO project.

And Corey Williams of Centrify will provide the proof of concept by walking you through the simple steps required to join a UNIX or Linux host system to Microsoft Active Directory and configure the application for SSO using end-users’ existing Windows credentials. This solution works for:

• Any web application running on Apache, Tomcat, WebLogic, WebSphere or JBoss

• Intranet applications leveraging Windows Kerberos and LDAP, and extranet apps leveraging Microsoft Active Directory Federation Services

• SAP ABAP Server 4+ leveraging GSS-API V2

• Other Java and C++ apps leveraging PAM and a simple SDK

 CISSP SSCP logo
CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

 

Speakers

Professor A.IISP,

Member, ISACA

Steve Gold

Infosecurity Magazine

Corey Williams

Director of Product Management, Centrify

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.