際際滷

際際滷Share a Scribd company logo
ID-SEC SOLUTIONS LTD Identity and Access Management Solutions
4SO S mart,  S imple,  S ingle  S ign- O n Solution for  Lotus Notes
CURRENT SITUATION  Lotus Notes is a highly secured messaging solution 10%  20% of help-desk calls deals with password problems in Lotus Notes  A user forgot his Notes password won t be able to use his mailbox To reset password takes 4 hours in average and prevents the user to access his Notes account.
4SO  THE PROBLEM IN HELPDESK When user forget his Notes password, The ID file must be replace. Same for losing ID file (when HD corrupted for example). ID file replacement is a process that takes ~4 hour
4SO  SECURITY PROBLEMS By copying the ID file and knowing the password, user can take control of the other s mailbox. Different password policy for Active Directory and Lotus Notes. When there are too many passwords to remember user tend to write the password on the screen, behind the keyboard or any insecure place.
ORDINARY LOTUS NOTES LOGIN ID File ** User Start the Notes client User prompt to enter his password Password uses to open ID file Notes client establish encrypted session
4SO LOGIN PROCESS ID File 4 S O   User Start the Notes client Notes ask 4SO to supply password 4SO user details and provide Notes it long password Password uses to open ID file Notes client establish encrypted session 4SO validate Active Directory login ticket
4SO SOLUTION ADVANTAGES Reduce help desk calls on Notes forgotten password. Improve user experience along with improving Notes security. Quick and simple implementation, less than 30 Seconds installation process. Solution doesn t based on Active Directory password, but Active Directory authentication. Keeps the ID file password non human, 512 bit long.
TECHNOLOGY EDGE Notes login based on user s Active Directory Kerberos ticket. Allow online and offline login to Notes. Offline login use when a portable computer don t have connection to the Active Directory domain and the user login to the computer using cache login.
SUPPORT Lotus Notes client versions 6.x, 7.x, 8.x All Microsoft Windows versions  Remote Desktop, Citrix Active Directory 2000, 2003, 2008 All Active Directory authentication methods include  user/password ,  biometric ,  smart card  etc
COMPOTITORS Lotus Notes Password sync and Shared Login Pistol Star Notes ID File Password Storage - The ID Vault  General SSO solutions (TAM, imprivata)
NOTES SHARED LOGIN (NSL) You cannot use shared login if any of the following conditions is true: you use a computer that does not run Microsoft Windows you use a Smartcard to log in to Lotus Notes your User ID is protected by multiple passwords you are a roaming user that uses a roaming ID you run Notes on a USB drive you use a mandatory Windows profile you are running Notes in a Citrix environment 4SO support it all
4SO NSL General SSO Pistolstar Smart Cards     Notes versions All 8.5 All All Active Directory Multiple passwords     Citrix     Password strength 512 Bits Medium 6-10 Chars (Human base) 6-10 Chars (Human Base)
PISTOLSTAR PistolStar Power Power is a full password synchronized between Notes and Active Directory. In order to synchronize password from Windows to Notes must replace GINA.DLL in every client. Keep a human based password   4SO have a very long password
ID VAULT AND SSO SOLUTIONS Use Servers to store the passwords   Single point of failure. Keep a human based password   4SO have a very long password
SUCCESS STORIES Major bank in Israel  13,000 Users, works since 2008, not even one support call. Ministry of Finance  2,000 users, works since 2009, not even one support call. Ministry of Interior  2,000 users, works since 2009, not even one support call. Civil Services  1,300 users, works since 2009, not even one support call. Governmental Organization  3,500 users, works since 2009, not even one support call.
Ad

Recommended

PDF
Mobile Device Encryption Systems
Peter Teufl
PDF
DefCon 2012 - Gaining Access to User Android Data
Michael Smith
PDF
IOS Encryption Systems
Peter Teufl
PPTX
Android vs iOS encryption systems
Birju Tank
PDF
Psdot 6 web based security analysis of opass authentication schemes using mob...
ZTech Proje
PDF
Discover the 5 New Windows 8 Security Features You Should Know - by Denver IT...
North Star. Inc.
PDF
Red Office Documents Security Proposal
Zhi Guan
PDF
NWSLTR_Volume12_Issue1
Charles Klondike
PDF
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
PDF
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
PDF
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
PDF
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
ScyllaDB
PDF
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
PPTX
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
PDF
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
PPTX
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
PDF
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
PDF
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
PDF
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
PDF
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
PDF
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
PPTX
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
PDF
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
PDF
2024 Trend Updates: What Really Works In SEO & Content Marketing
Search Engine Journal
PDF
Storytelling For The Web: Integrate Storytelling in your Design Process
Chiara Aliotta

More Related Content

Recently uploaded (20)

PDF
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
PDF
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
PDF
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
PDF
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
ScyllaDB
PDF
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
PPTX
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
PDF
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
PPTX
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
PDF
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
PDF
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
PDF
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
PDF
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
PDF
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
PPTX
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
PDF
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
ScyllaDB
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software

Featured (20)

PDF
2024 Trend Updates: What Really Works In SEO & Content Marketing
Search Engine Journal
PDF
Storytelling For The Web: Integrate Storytelling in your Design Process
Chiara Aliotta
PDF
Artificial Intelligence, Data and Competition SCHREPEL June 2024 OECD dis...
OECD Directorate for Financial and Enterprise Affairs
PDF
How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...
SocialHRCamp
PDF
2024 State of Marketing Report by Hubspot
Marius Sescu
PDF
Everything You Need To Know About ChatGPT
Expeed Software
PDF
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
PDF
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
PDF
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
PDF
Skeleton Culture Code
Skeleton Technologies
PDF
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
PDF
Content Methodology: A Best Practices Report (Webinar)
contently
PPTX
How to Prepare For a Successful Job Search for 2024
Albert Qian
PDF
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
PDF
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
PDF
5 Public speaking tips from TED - Visualized summary
SpeakerHub
PDF
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
PDF
Getting into the tech field. what next
Tessa Mero
PDF
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
PDF
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
2024 Trend Updates: What Really Works In SEO & Content Marketing
Search Engine Journal
Storytelling For The Web: Integrate Storytelling in your Design Process
Chiara Aliotta
Artificial Intelligence, Data and Competition SCHREPEL June 2024 OECD dis...
OECD Directorate for Financial and Enterprise Affairs
How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...
SocialHRCamp
2024 State of Marketing Report by Hubspot
Marius Sescu
Everything You Need To Know About ChatGPT
Expeed Software
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
Skeleton Culture Code
Skeleton Technologies
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
Content Methodology: A Best Practices Report (Webinar)
contently
How to Prepare For a Successful Job Search for 2024
Albert Qian
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
5 Public speaking tips from TED - Visualized summary
SpeakerHub
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
Getting into the tech field. what next
Tessa Mero
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
Ad

4SO customer presentation

  • 1. ID-SEC SOLUTIONS LTD Identity and Access Management Solutions
  • 2. 4SO S mart, S imple, S ingle S ign- O n Solution for Lotus Notes
  • 3. CURRENT SITUATION Lotus Notes is a highly secured messaging solution 10% 20% of help-desk calls deals with password problems in Lotus Notes A user forgot his Notes password won t be able to use his mailbox To reset password takes 4 hours in average and prevents the user to access his Notes account.
  • 4. 4SO THE PROBLEM IN HELPDESK When user forget his Notes password, The ID file must be replace. Same for losing ID file (when HD corrupted for example). ID file replacement is a process that takes ~4 hour
  • 5. 4SO SECURITY PROBLEMS By copying the ID file and knowing the password, user can take control of the other s mailbox. Different password policy for Active Directory and Lotus Notes. When there are too many passwords to remember user tend to write the password on the screen, behind the keyboard or any insecure place.
  • 6. ORDINARY LOTUS NOTES LOGIN ID File ** User Start the Notes client User prompt to enter his password Password uses to open ID file Notes client establish encrypted session
  • 7. 4SO LOGIN PROCESS ID File 4 S O User Start the Notes client Notes ask 4SO to supply password 4SO user details and provide Notes it long password Password uses to open ID file Notes client establish encrypted session 4SO validate Active Directory login ticket
  • 8. 4SO SOLUTION ADVANTAGES Reduce help desk calls on Notes forgotten password. Improve user experience along with improving Notes security. Quick and simple implementation, less than 30 Seconds installation process. Solution doesn t based on Active Directory password, but Active Directory authentication. Keeps the ID file password non human, 512 bit long.
  • 9. TECHNOLOGY EDGE Notes login based on user s Active Directory Kerberos ticket. Allow online and offline login to Notes. Offline login use when a portable computer don t have connection to the Active Directory domain and the user login to the computer using cache login.
  • 10. SUPPORT Lotus Notes client versions 6.x, 7.x, 8.x All Microsoft Windows versions Remote Desktop, Citrix Active Directory 2000, 2003, 2008 All Active Directory authentication methods include user/password , biometric , smart card etc
  • 11. COMPOTITORS Lotus Notes Password sync and Shared Login Pistol Star Notes ID File Password Storage - The ID Vault General SSO solutions (TAM, imprivata)
  • 12. NOTES SHARED LOGIN (NSL) You cannot use shared login if any of the following conditions is true: you use a computer that does not run Microsoft Windows you use a Smartcard to log in to Lotus Notes your User ID is protected by multiple passwords you are a roaming user that uses a roaming ID you run Notes on a USB drive you use a mandatory Windows profile you are running Notes in a Citrix environment 4SO support it all
  • 13. 4SO NSL General SSO Pistolstar Smart Cards Notes versions All 8.5 All All Active Directory Multiple passwords Citrix Password strength 512 Bits Medium 6-10 Chars (Human base) 6-10 Chars (Human Base)
  • 14. PISTOLSTAR PistolStar Power Power is a full password synchronized between Notes and Active Directory. In order to synchronize password from Windows to Notes must replace GINA.DLL in every client. Keep a human based password 4SO have a very long password
  • 15. ID VAULT AND SSO SOLUTIONS Use Servers to store the passwords Single point of failure. Keep a human based password 4SO have a very long password
  • 16. SUCCESS STORIES Major bank in Israel 13,000 Users, works since 2008, not even one support call. Ministry of Finance 2,000 users, works since 2009, not even one support call. Ministry of Interior 2,000 users, works since 2009, not even one support call. Civil Services 1,300 users, works since 2009, not even one support call. Governmental Organization 3,500 users, works since 2009, not even one support call.