The power of one password

 

Connecting state and local government leaders

Single sign-on systems help IT managers tighten security, cut help-desk costs and keep users happy.

For John Taft, information systems manager at the Nevada Division of Welfare and Supportive Services, password proliferation had become more than annoying: It was slowing information technology modernization. The division was moving from mainframe applications, which users could often access from one log-in, to Web and Windows software.

'We didn't realize they would need a lot more log-ins,' Taft said, noting that some users had as many as 15 IDs and passwords. 'It was unmanageable for those people.'

So the division bought Novell Access Manager ' then called iChain ' a single sign-on (SSO) system. As a result, Taft, who previously dedicated three of his highest-salaried employees to security, has redirected two to other tasks.

A self-service feature has further relieved the help desk. Password calls dropped about 30 percent, users are happy and 'it was one of the few times we ever got thank-you notes in our department,' he said. Security is also enhanced because minimizing the need for users to memorize passwords has allowed more secure, 14-digit ones.

Avoiding labor costs

Perhaps the biggest benefit of SSO comes from avoiding labor costs of help-desk employees, who spend on average 25 percent of their time handling password-reset requests, according to reports collected by Novell. But the potential labor savings for users are also significant. They save time logging in several passwords, and productivity increases because instead of waiting weeks for access to applications, they get almost immediate access through SSO-enabled provisioning systems. Security risks diminish as employees stop posting passwords on sticky notes and choosing passwords that are too short.

'People should move from a concept of single sign-on to reduced sign-on,' said Ivan Hurtt, Novell's director of product marketing. 'If you can reduce 20 log-ins to three, it's still not single sign-on, but then you can still get substantial savings. If you only use an application once a month, does it make sense to have single sign-on for that? At some point, the [return on investment] runs out.'

SSO actually comes in two main flavors. Plain SSO typically operates outside organizational firewalls and usually handles log-ins only for Web sites and applications, often adding self-service password management ' the familiar feature that lets you set up your own password and authentication mechanisms. Often, users go to a Web portal to log in to all their applications, sometimes even legacy software.

Mainframe issues

Enterprise SSO (ESSO) typically operates inside firewalls and adds non-Web legacy applications. Some of the trickier applications to handle are mainframe programs, which often lack graphical front ends for authentication, instead employing scripting and batch processing, so ESSO tools require screen captures and other workarounds. ESSO products typically provide their own log-in boxes that pop up on each application's screen, superseding the original log-in.

Not surprisingly, the leaders in portal-equipped Web platforms ' BEA, IBM, Oracle and Sun Microsystems ' also tend to dominate SSO, although IBM has a strong ESSO offering under its Tivoli brand, and Oracle competes here, too. But both readily state that they get their ESSO features by licensing v-GO technology from PassLogix, which says Sun and network-management vendor BMC have similar arrangements.

Peter Doolan, Oracle's vice president of sales consulting, said many federal agencies first got into Web-centric SSO by adding it to their internal Oracle portals. But they have realized the value of adding ESSO to extend the benefits of simplified log-ins enterprisewide. States and local jurisdictions such as school districts tend to have different needs.

'They have large populations of users, especially where those users are seasonal,' said Doolan. 'There is a tremendous churn of identity that's required.'

Demand also comes from motor vehicle departments, which reacted to the national Real ID mandate by examining its impact on their security infrastructure. Many are planning to offload traffic from traditional locations that issue driver's licenses to ESSO-driven kiosks at shopping malls and other widely dispersed sites, Doolan said.

ESSO is almost always done in software installed on client or server PCs; the only hardware solution to speak of is Imprivata's OneSign appliance.

Imprivata focuses on state and local markets. The company has no federal sales force but says it expects to draw more interest as the feds move to merge their logical IT with physical-access systems such as smart-card readers.

A few other vendors sell simple, client-oriented tools that aren't enterprise quality. And some offerings from top-tier vendors, such as Microsoft Windows Terminal Server and Cisco Systems' security access control lists, have minimal administrative, policy and integration features. They provide only reduced sign-on, said Jeremy Weiss, a network-security engineer at CDW-Government who sells SSO solutions from several vendors.

Appliances can appeal to agencies with small IT departments and network teams accustomed to rack-mounting their solutions. Appliances obviate the need to buy hardware, install software and harden the resulting system's security, said Gerry Gebel, vice president and service director at Burton Group, a research firm.

Easy to roll out

'It's a relatively easy way to roll out the product and then to scale it,' Gebel said.

Nelson Martinez, systems support manager for Miami Beach, Fla., said OneSign unified about 90 percent of log-ins, which helps his part-time help desk avoid password-reset requests, reducing them by nearly 80 percent. Martinez also likes OneSign's ability to store user information securely. 'It takes all that personal information ' that identity information ' out of the loop,' he said.

OneSign, a hardened appliance with a Linux-based operating system, also integrates nicely with the city's Windows applications and minimizes their security risks. 'It's a lot more secure than having a Windows machine out there serving up this kind of functionality,' Martinez said, adding that he is especially concerned about running Web applications on Windows because the platform's Active Directory only allows passwords that are too long and complicated to remember or too short to be secure enough.

Martinez said OneSign is nearly problem-free. Imprivata's service team spent a week on installation, he added, mostly developing the profiles that control sign-ons for each application. 'Every time you try to establish a single log-in profile for an application, it's like starting from scratch,' he said, but after training, his staff found it easy.

Larger IT departments, in contrast, may be better equipped to install ESSO as middleware on their own servers, then extend it with a strong authentication component, such as smart cards, that complies with Homeland Security Presidential Directive 12, Gebel said.

Many ESSO vendors sell the core sign-on component bundled with two closely dependent modules: strong authentication tools and provisioning. Strong authentication tools contain digital certificates along with public-key infrastructure and other technologies for ensuring that users are who they claim to be. Provisioning, also known as identity-management, automates adding new employees and partners to the security system, setting up their rights to resources, and making sure access is revoked when they leave.

Stronger authentication

'As you start granting multisystem access through that one password, you might want to move toward strong authentication,' said Joe Anthony, IBM's program director of identity management.

Proponents say SSO's main vulnerability is that it creates a single point of failure that security threats can exploit. Improving physical-access security through strong authentication then becomes an enabler of SSO, not just an add-on. 'The solution is to have a good security policy, and know who are you letting into the room,' Weiss said.

Integration can be challenging, considering the number of applications that must fit into the SSO scheme ' and many agencies still have a handful of specialized programs that require separate log-ins.

Stephane Fymat, vice president of product management and sales operations at PassLogix, summarized the competitive advantages of software not closely tied to a particular type of hardware or operating system. 'Our software is between everything you want to run,' Fymat said. 'It's like electricity. ESSO does not live, in our opinion, on an island. It really has to live in the fabric of your network.'

Another important category is kiosk software, which is designed to handle the unique challenges of terminals or PCs that must accommodate multiple users without compromising privacy or security. Hospitals were early adopters, because doctors need to quickly access patient data without waiting for boot-ups or for applications to load. Anthony said hospitals often use workers' proximity cards or badges as the second authentication factor, outfitting the kiosks with sensors that know when the devices ' and presumably the people they belong to ' are close by.

Federalism revisited

Federation is perhaps the most important emerging technology in SSO for governments worldwide. It is largely driven, sources say, by the need to make unconnected departments that must nonetheless collaborate, along with their equally divided IT resources, securely accessible via the Web to constituents through a single point of contact. Federation 'gives people the ability to establish multienterprise levels of trust,' said David Ting, Imprivata's chief technology officer.

The main champions of federation are the Liberty Alliance and the Organization for the Advancement of Structured Information Standards (OASIS). They jointly support an Internet language called Secure Access Markup Language (SAML), which was designed to extend single sign-on across organizational boundaries using a federated model. 'Federation itself is about the portability of identity,' said Brian Campbell, a software engineer at Ping Identity, which makes federation software, and co-chairman of the OASIS technical committee that worked on SAML. 'What SAML seeks to do is allow users to carry identities between Web sites. It encodes, in a sort of XML security token, a message about the user's identity, based on trust. There is a [digital] certificate involved in most of the profiles.'

Campbell said the trust is established between the organization that issued the original certificate and the receiving organization, not between individual users.

SAML minimizes the need for custom integration each time an application is added to an SSO system or Web portal, said Roger Sullivan, president of the Liberty Alliance Management Board and an Oracle vice president. 'When you want to add a new resource, you only need to ensure the inbound and outbound identity assertions are SAML-compliant.' For nearly five years, the Alliance has tested products for conformance to the standard. There are no immediate plans for major upgrades to SAML, now in Version 2.0, he said.

In the federal government, the push to integrate homeland security agencies internally is the biggest driver of interest in federation, Sullivan said. 'We actually see the majority of uses as within agencies or between agencies,' Anthony said, adding that most federal customers who use Tivoli Access Manager's federation feature use it internally.

Federation is the key technology in E-Authentication, an effort by the General Services Administration to test and certify product interoperability, and Sullivan said GSA is working on government extensions to SAML.

The certification program was originally based on SAML 1.0, but Campbell said the agency recently updated it for SAML 2.0.

Still, Gebel and Weiss both said federation technology is somewhat immature and agreed with Fymat that adoption will hinge instead on hammering out policies on how to merge business processes.

Microsoft offers a competing standard, WS-Federation, that is now being considered by an OASIS working group. Campbell said that although it is a longer specification, it was originally based on OASIS technology, uses SAML 2.0 tokens and has 'a lot of overlap.' WS-Fed, however, is the basis for a Microsoft federation server that does not fully support SAML, he said, and formation of a working group in no way implies OASIS' blessing. Still, Microsoft's participation in the organization's process is taken as a good sign.

The next major phase of SSO is likely to be extending it to machine-to-machine authentication. 'Web services are seemingly on everyone's agenda,' Gebel said. The Liberty Alliance in October released a standard, the Identity Web Services Framework along with SAML 2.0 that facilitates sensitive, automated financial transactions among Web services.

David Essex is a freelance technology writer based in Antrim, N.H.There are a number of issues to consider when drawing up a request for proposals for a single sign-on system.

The most often-cited advice is to give prospective vendors a list of applications that fully describe your situation. If some are mission-critical, must-have programs, be sure to include them on the list. But go a step further and specify how people access them ' via remote-control software, for example. Also include those that burden your help desk with the most password-reset calls. Don't fall for checklist-ware ' products that only claim to support most of your key applications. You won't know for sure until the vendor proves it with a real demo and tells you how they do it.

Run a couple of detailed workflow scenarios past respondents, and expect detailed answers. It's a great way to detect boilerplate offerings.

When choosing an appliance or central server, devote close scrutiny to availability features such as built-in failover, redundancy and clustering, which can minimize risk.

Ask for references from customers with similar installations, and talk to them. Don't be fooled by claims of units sold; demand to know how many people actually use the product daily.

Evaluate the tool's auditing and reporting features for adherence to your specific regulatory requirements.

Beware of products geared too much to a single platform, such as Windows, if your needs are more heterogeneous. Ample connectors to third-party platforms are a good indicator.

Look for rule-based, distributed administration, which can speed a tedious process without risking security by granting too much access from remote sites. It also sets up a chain of command that boosts accountability by establishing supervision at the top.

Be sure graphical interfaces are easy not only for users, but also for administrators who oversee policies and decide on user privileges.












VendorProductMajor Features
ActivIdentity

(800) 529-9499

www.actividentity.com
SecureLogin SSO Kiosk software; requires SecureLogin SSO,
supports all desktop, Web, terminal and major medical applications, active-proximity badges,
patient-information context
Citrix Systems

(800) 424-8749

www.citrix.com
Citrix Password Manager SSO; password reset, desktop and Citrix
Presentation Manager editions, multifactor
authentication, fast desktop switching, federated SSO (some editions), Common Criteria
CA

(631) 342-6000

www.ca.com
CA Single Sign-On
(formerly eTrust Single Sign-On)
ESSO; support for strong authentication, off-line operation, log-in script wizard, policy-based
access, password management, auditing, load balancing, failover, server watchdog
Courion

(866) 268-7466

www.courion.com
Password Courier ESSO; multiple access and app/system synchronization options, policy enforcement, help-desk integration, telephone access, voice biometrics, workflow, auditing, kiosks
IBM

(800) 426-4968

www.ibm.com
Tivoli Access Manager
for Enterprise Single
Sign-On
ESSO; policy enforcement, Triple DES, AES
encryption, FIPS 140-2 privacy/security, XML
event logging, provisioning, reset and
authentication adapters
Imprivata

(877) 663-7446

www.imprivata.com
OneSign ESSO; network appliance; authentication, SSO and physical/logical convergence versions, smart automated profile generator, business-process extensions, self-service, auditing
Novell

(800) 529-3400

www.novell.com
Novell Access Manager SSO; SAML, Liberty ID-FF, WS-Federation
support, identity authentication server, forms,
federated provisioning, policies/roles in Identity
Manager, SecureLogin, VPN, Java agents
Oracle

(800) 672-2531
www.oracle.com
Oracle Enterprise Single Sign-On Suite ESSO; optional log-on manager, password reset, authentication, provisioning, kiosk modules,
Triple DES, AES encryption, FIPS 140-2 privacy/security
PassLogix

(866) 727-7564

www.passlogix.com
v-GO Self-Service
Password Reset
ESSO; Windows-only log-ins, Web-based user questions and answers, administration, back-end Microsoft or Oracle 9i repository, auditing/reports
X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.