Security is an absolute necessity in enterprise business solutions, but it also involves a delicate balancing act. Enterprise data and processes must be protected, but often this has to happen within an open Bring Your Own Device (BYOD) environment while still maintaining flexibility for users through features like Single Sign-On (SSO). And, of course, all of this has to happen in the most cost-effective manner possible.
Exadel has been refining security solutions for quite some time. Our breadth of experience includes enterprises in many different industries, giving us the insight to implement the very best security approach at any given time for the current state of technology.
Here is a sketch of our current approach in implementing security based on some of our more recent projects, describing the technologies we use and what we integrate them with.
Common Security Pain Points
To solve these problems, we are using this technology stack currently.
The core of our preferred technology stack for security is currently based on three ForgeRock products:
- OpenAM manages authentication (including Single Sign-On), authorization, entitlement, and federation.
- OpenDJ provides a directory server that is highly performant, highly scalable, and highly secure.
- OpenIDM provides a completely customizable and automatable identity management system.
For future use, we are also researching another open source product from ForgeRock:
- OpenIG is a reverse proxy server that works seamlessly with OpenAM.
Also, taking advantage of their open source nature, we customize the ForgeRock products based on customer requirements.
Common Additional Technologies
Besides these ForgeRock products, we are actively using these standards on projects:
- LDAP (Lightweight Directory Access Protocol)
- WS-Security (Web Services Security) extension to SOAP (Simple Object Access Protocol)
- Federated security
- SAML (Security Assertion Markup Language)
- STS (Secure Token Service)
- OAuth open standard for authorization
Current Typical Integration Targets
A security stack has to be integrated into something to secure it, of course. Here are our current typical integration targets for our solutions:
- Lotus Domino
- IBM Cognos BI Reporting
- InContact IVR
- Database servers: Oracle
- Application servers: IIS and Java-based (Tomcat, JBoss, etc.)
Remember, this is just a snapshot of how we’re solving enterprise security solutions now. Exadel’s developers are always on the lookout for better solutions, so we can always implement the very best practices in enterprise security for our customers.