It would be nice if the products included a configurable SSO interface.

There are several different approaches to SSO:
- *Agent Based*: Generally uses an http header to pass information from the
agent to the web server and has it's own standalone infrastructure for
handling authentication, password resets, etc.  This includes Oracle's SSO
solution, SiteMinder, Kerberos, etc.
- *IdP/SP based*: Generally a SAML assertion.  This most commonly used by
your SaaS providers.  This typically requires a framework be implemented
within the application that can speak SAML
-* Others*: WS-Federation/WS-Trust, US eAuth, OpenID, OAuth, etc.

Each of these have a different architecture and address the needs of
different types of organizations.

*Agent Based*: The agent based is probably the most common among the Remedy
community.  The agent based approach typically has an agent that sits on a
web server.  This agent handles protecting certain resources on the website
and handles the access/authentication to those resources by directing users
to the appropriate interface for authentication.  The agents generally pass
information to the application server, either in the form of an HTTP header,
java session attribute, or some other mechanism.

To give a simple interface to consume the authentication information, the
Remedy products could allow for the consumption of the values passed by the
agent to the mid-tier using common methods of transport (i.e., HTTP header,
Session Attribute).  This could be accompanied by an AREA plugin that knows
the information is coming from a trusted source (shared secret).

This could be opened up for people to write more elaborate plugins if the
mid-tier configuration interface provided a pluggable interface so that
people could write/package modules for the mid-tier that exposed the
configuration through the mid-tier configuration interface.  This is
implemented in other popular applications like Trac, Joomla, etc. and is not
a new concept.

*IdP/SP based*: These are generally used by SaaS providers and consumers.
 As either a provider or a consumer of SaaS application, SAML assertions can
be used to allow seamless authentication with both your internally hosted
COTS applications or your externally hosted SaaS applications.  The
applications generally have to be aware of SAML to allow for the
configuration specifics.  There are some ways to mitigate this by installing
web server modules that you can configure with the SAML specifics, which in
turn expose the appropriate data using the same means as the agent based
solutions.

The trick with the BMC application stack is getting them all configured to
play together.  The stack consists of various components from different
vendors, each of which has it's own set of capabilities.

Axton Grams

The opinions, statements, and/or suggested courses of action expressed in
this E-mail do not necessarily reflect those of BMC Software, Inc.  My
voluntary participation in this forum is not intended to convey a role as a
spokesperson, liaison or public relations representative for BMC Software,
Inc.

On Fri, Apr 1, 2011 at 2:39 AM, John Baker
<[email protected]>wrote:

> David,
>
> The vast majority of BMC AR System users are working in corporate
> environments where they wish to open a browser, navigate to the Midtier,
> and silently login.
>
> Some corporates will be using enterprise solutions such as Siteminder or
> RSA Access Manager, and that's precisely the reason that users and/or
> security teams will not want to install Atrium(Open)SSO. OpenSSO was
> designed to compete with these products, not compliment them.
>
> Users don't want to find a separate server on which to install
> Atrium(Open)SSO, and they don't want to manage an 'enterprise' solution
> which even SSO trained consultants can't figure out how, or don't want,
> to use.
>
> Users want something that they can easily install, is well supported,
> was designed to integrate with AR System and "just works". I believe JSS
> & SSO Plugin ticks all of those boxes, as confirmed by some of BMC's
> largest clients who asked BMC for a solution, waited patiently, and then
> approached JSS (and in some cases, found the solution delivered within
> hours of contacting us).
>
>
> John
>
> --
> Single Sign On for AR System
> http://www.javasystemsolutions.com/jss/ssoplugin
>
>
> _______________________________________________________________________________
> UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
> attend wwrug11 www.wwrug.com ARSList: "Where the Answers Are"
>

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug11 www.wwrug.com ARSList: "Where the Answers Are"

Reply via email to