Security Journal on Ulitzer
The need for an easy single, yet secure, login procedure has always been an
elusive issue for many big organizations. Multiple user names and passwords,
multiple logins, and the ensuing confusion and frustration consume much of a
user's productivity in terms of time and energy.
Secure Login provides secure Single Sign-On and total landscape encryption
for SAP supporting a variety of different authentication mechanisms including
Active Directory, LDAP, SAP-ID, RADIUS, RSA SecurID®, SQL DB, and even smart
Secure Login is tightly integrated into SAP by making use of its Secure
Network Communications (SNC) framework and by fully supporting SAP's
Cryptographic Library (SAPCryptolib) which means that no third party or
SECUDE components need to be installed on the SAP server. However, SECUDE
also provides its own cryptograph... (more)
SECUDE's hybrid full disk encryption solution, FinallySecure Enterprise, has
received the FIPS 140-2 Level 1 certification.
Commenting on the certification, Michael Kummer, Product Manager, SECUDE IT
Security LLC, says, "SECUDE has been providing IT security solutions to large
enterprises for more than 12 years. Our customers have always appreciated the
quality and level of security SECUDE provides and this certification is a
further continuation of that effort".
The Federal Information Processing Standard 140-2 (FIPS 140-2) is a standard
that describes US Federal government requ... (more)
Recently had a problem where Import/Export was not working. I kept getting
an interesting Error Message:
What was really interesting about this was the user that was referenced,
mxmc_admin. Now this is interesting, because during the Identity Store
creation process, you are prompted to use mxmc_rt as the user and there is no
time during the install that you are asked to create a JAVA based connection
string using mxmc_admin.
This started a great deal of troubleshooting and conversations with people
who have a great deal of knowledge with IDM's moving parts. Ultimately we
Based on what I’ve been hearing from the SAP NetWeaverIdentity Management
Community there have been some grumbles about the Complexityand Functionality
in NW IDM. This is not going to be a slam on SAP, sincealmost everybody
recognizes that IDM has improved immeasurably since therelease of NetWeaver
Identity Management 7.0.
I’d like to address some of the most common questions/ comments
I’veheard. Hopefully we’ll be able to start a little bit of a
Q1. Why doesn’t IDM just work out of the box?
A1. Why doesn’t any Enterprise System just work out of thebox? Folks, ... (more)
Recently I've been thinking about what happens to an identity through its
life cycle and how the identity data is treated during this process. I
think you will also see that the Enterprise itself has differing methods of
dealing with it as well. I am considering this to be the beginning of a
framework and nomenclature that one can use for expressing how people relate
to their Identity data on a number of different levels. I think we can pretty
much consider this to be a "work in progress," and I would greatly appreciate
So why do we need this, anyway? I have observed ... (more)