Endpoint
6/28/2012
08:41 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Radiant Logic Releases Federated Identity Service Based on Virtualization

RadiantOne VDS 6 Creates a Virtual Identity Hub for SSO, Cloud, and Federation Initiatives

June 21, 2012, Novato, CA—Radiant Logic, the market leader for virtual directories and a Gartner 2012 Cool Vendor, announces the release of RadiantOne VDS 6, the first federated identity service. Designed to provide one logical access point for enterprise identities, VDS 6 enables authentication and authorization across multiple identity sources and authentication protocols. VDS 6 is purpose-built to address the demands of single sign-on (SSO) and authorization for the cloud and federations in high-volume, heterogeneous environments.

“Providing SSO for cloud and federation deployment is a critical initiative and the BYOD (bring your own device) trend is increasingly important. However, the current patchwork of internal identity silos is a roadblock for medium and large enterprises,” says Michel Prompt, CEO of Radiant Logic. “Federation-based protocols like SAML, OpenId, and OAuth establish a secure pipeline to the enterprise, but without the ability to logically gather identities into one place and address the complexity of existing internal authentication systems, you can’t achieve SSO. When the enterprise is the ultimate identity provider, going the last mile into identity silos is a major challenge. The truth is that the other side of a federation or cloud application deployment is a federated identity. Virtualization lets you leverage the identity investments you’ve already made, while building the identity hub you need.”

RadiantOne VDS 6 enables authentication and authorization for a diverse user base—including internal, external, and mobile users—across multiple security protocols, identity stores, and usage patterns. By federating identity from different identity silos—such as AD, LDAP and SQL—VDS 6 keeps the centralized virtual hub up-to-date. The product features a dynamic set of tools, including identity remapping, aggregation, correlation, and automated synchronization code to link the identity sources to the global hub. A collection of wizards simplify the work of creating a global identification system. The newest release features a federated identity wizard based on virtualization technology to guide users through the process of creating an identity hub out of heterogeneous source. It also includes a group builder wizard, a groups migration wizard, and a directory merge tree wizard.

RadiantOne VDS 6 has improved code for defining virtual views, and the virtualization layer radically simplifies the design of a global identity and profile views. The improved automated caching system keeps the image in sync with the underlying identity stores. The cache is a fully-scalable LDAP directory, so the global virtual identity system can be replicated across multiple sites. VDS 6 ships with an open source directory acting as a cache, but any LDAP-compliant directory such as Oracle, Sun, or Red Hat can also be used.

Gartner Analyst Kevin Kampman stated in his report, “The Role of Virtual Directory and Synchronization Services in Large-Scale Identity Deployments” (#G00227151) that “…for larger organizations and in customer-facing environments, the quantity and size of datasets are increasing along with performance expectations and data diversity.” Kampman writes that: “a virtual directory plus a cache is optimal for many high-performance, high-volume situations.”

RadiantOne VDS 6 is available in two versions. VDS Standard Edition advances virtual directory technology from a proxy-driven routing and remapping engine to a model-driven virtualization solution. VDS Context Edition delivers SQL access, enables contextual views for attribute-driven authorization and personalization, and comes with real-time cache refresh for synchronization.

VDS 6 begins begin shipping today. Contact info@radiantlogic.com to schedule a live demo.

About Radiant Logic

Radiant Logic, Inc. is the market-leading provider of identity virtualization solutions. Since pioneering the first virtual directory, Radiant Logic has evolved its groundbreaking technology into a complete federated identity service, enabling Fortune 1000 companies to solve their toughest identity management challenges.

Using model-driven virtualization technology, the RadiantOne federated identity service builds customizable views from disparate data silos, streamlining authentication and authorization for identity management, context-driven applications, and cloud-based infrastructures.

Organizations in a wide range of sectors rely on RadiantOne to deliver quick ROI by reducing administrative effort, simplifying integration tasks, and enabling future identity and data management initiatives.

For more information, visit www.radiantlogic.com. Subscribe to the Radiant Logic blog. Follow Radiant Logic on Twitter and on LinkedIn. Fan us on Facebook.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web