Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

11/22/2006
02:20 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

The End of Password Post-Its

Milliman's new federated identity management architecture protects user IDs, simplifies client interaction

The concept of building a federated identity architecture at Milliman Benefits Resource Center came on the fly, during a harried phone call in June with its client JP Morgan Chase.

A JP Morgan sales rep was meeting with a potential retirement and pension-plan customer, and called Milliman directly from the sales pitch, asking if Milliman could offer a single sign-on for JP Morgan's pension plan services, which Milliman runs for the financial services firm.

The new scheme would let JP Morgan's potential customer's employees access both their retirement plan system -- which JP Morgan runs itself -- as well as the pension plan system with a single log-on and password.

"I got a call from JP Morgan asking us if we could do it in 60 days, and I said 'yeah, I think we can,'" says Craig Burma, a principal with Milliman Benefits Resource Center, a business unit of the $435 million Milliman. "It was a sales-floor decision, made at the eleventh hour with a client in the next room."

Milliman Benefits Resource Center's decision to go with single sign-on for JP Morgan evolved into an overall federated identity architecture for Milliman. "It opened up the possibility of linking our systems to others' in a single sign-on format," he says.

Federated identity is basically a trust relationship among the participating organizations, typically business partners like Milliman and JP Morgan. The technology lets users rely on a single log-on and password or other authentication method to access their applications, typically Web apps.

Federated identity is starting to catch on for e-businesses now that the industry has settled on a standard for it, Secure Assertion Markup Language (SAML) 2.0.

"SAML 2.0 is taking hold, and customers are coming off the sidelines to see if it's a technology they are willing to invest in," says Carlo Cadet, a product marketing manager for RSA Security, the supplier for Milliman's federated identity management system. "We see business drivers kicking in for" federated identity.

Milliman chose RSA's Federated Identity Manager as its platform. Burma says the project cost him about $400,000 in licensing and staff time, including rewriting the login logic in each of its internal apps that will use FIM. That represents about 5 percent of his overall $6 million IT budget for the group, he says. About $100,000 of its costs were professional services from RSA, he adds.

Burma says the biggest security risk the FIM addresses is attackers guessing passwords and user names. Users now have more complex passwords that are less likely to be spoofed, he says. "By simplifying logins and passwords [with FIM], we are [actually] increasing the complexity of the 'single' user name/password internal users use to gain access to their applications."

"But FIM as a solution is less about minimizing threats, and more about increasing compliance with external regulations and client expectations for security," Burma notes.

And in Milliman's business of hosting benefits plans, single sign-on is a strategic feature for its clients. "If [our clients' users] have to log in [multiple times], they feel that disconnection" with their services, he says.

Managing user credentials and rights to specific applications and data is a key element of federated identity. Aside from the requisite SSL-encrypted pipe between federated sites, RSA's Federated Identity Manager (FIM) also connects a user's ID to the site or system's access management infrastructure, RSA's Cadet explains. "The first piece a federation connects to is typically the Web access-management application. This is the policy engine that captures -- for a particular resource -- who has access to it, and what credentials are required to gain access."

Milliman also uses FIM for some of its internal applications, including its call center applications. Call center agents used to spend about 15 minutes each morning logging into the different applications they needed with their separate user names and passwords for each. That became time-consuming, especially when different passwords would expire, Burma says.

Milliman did hit one big technical snag during the JP Morgan FIM implementation, however. Because JP Morgan's applications used a Java-based single sign-on tool that predated SAML, they couldn't speak SAML. "So we wrote a wrapper that unpacks their message with their 'legacy' [single sign-on] tool and turns it into a SAML assertion we feed through RSA's FIM," Burma says.

Meanwhile, Burma says the federated identity system has helped eliminate Post-it notes of passwords on screens or under keyboards. "One of the things we have found is once you unify an application login, then people have less of a need to store it manually" somewhere.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • RSA Security Inc. (Nasdaq: EMC) Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Sodinokibi Ransomware: Where Attackers' Money Goes
    Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
    Data Privacy Protections for the Most Vulnerable -- Children
    Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
    State of SMB Insecurity by the Numbers
    Ericka Chickowski, Contributing Writer,  10/17/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-17424
    PUBLISHED: 2019-10-22
    A stack-based buffer overflow in the processPrivilage() function in IOS/process-general.c in nipper-ng 0.11.10 allows remote attackers (serving firewall configuration files) to achieve Remote Code Execution or Denial Of Service via a crafted file.
    CVE-2019-16404
    PUBLISHED: 2019-10-21
    Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter.
    CVE-2019-17400
    PUBLISHED: 2019-10-21
    The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion.
    CVE-2019-17498
    PUBLISHED: 2019-10-21
    In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a ...
    CVE-2019-16969
    PUBLISHED: 2019-10-21
    In FusionPBX up to 4.5.7, the file app\fifo_list\fifo_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS.