Secure access to Office 365 cloud-based web applications
Posted on 08 November 2011.
Bookmark and Share
RSA SecurID can now be integrated with the Windows Active Directory Federation Services 2.0 (AD FS 2.0). This integration can enable organizations to provide secure user access to Office 365 cloud-based web applications such as Microsoft Exchange technology.

Secure, federated access control enables an organization to extend the protection for remote users to applications deployed outside an organization's network.

Many of the world's largest and most demanding organizations have deployed critical services on the Windows Azure cloud platform.

Microsoft AD FS 2.0 is a security token service (STS) that enables identity federation across multiple IT systems and across organizations by centralizing user authentication, authorization and single sign-on to Web applications and services located virtually anywhere – including perimeter networks, partner networks, and the cloud.

"AD FS 2.0 allows our customers to extend their identity capabilities across organizations, as well as connecting their on-premises identities to cloud services," said Samuel Devasahayam, Principal Program Manager Lead, Active Directory, at Microsoft. "Identity federation is strategic to Microsoft, and we are excited to work with RSA to give customers supplemental levels of security for identity federation with AD FS 2.0."

By integrating RSA SecurID technology with Microsoft AD FS 2.0, both solutions work together to help provide secure and non-repudiable access to cloud-based or remote services with identities provisioned and administered by enterprise IT.

RSA SecurID technology solves the "weak link" issue of poorly chosen passwords by enforcing strong, multi-factor authentication. Designed to provide secure access to corporate applications and VPNs, RSA SecurID technology also helps simplify the user experience resulting in greater efficiency of identity and access management and support which can ultimately result in lower costs.





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //