Propose and describe an identity federation technology that will address the threats that can be identifed in the scenior , describing the business and security benefits and explaining how it will mitigate the threats. Describe the solution topology that will deliver a federated identity solution using the technology you have chosen and meeting the requirements of the use cases specified

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Please refer to the attachment for the scenario 

- Please answer following questions in dot points or paragraph- 

    1. Propose and describe an identity federation technology that will address the threats that can be identifed in the scenior , describing the business and security benefits and explaining how it will mitigate the threats. Describe the solution topology that will deliver a federated identity solution using the technology you have chosen and meeting the requirements of the use cases specified.

You are a security consultant who has been engaged by ABC Pty Ltd, a medium-sized financial
services company with approximately 1000 staff. The general manager of ABC wants to migrate
their existing CRM (Customer Resource ...agement) solution to a cloud-based product that is
delivered as Software-as-a-Service (SaaS) and is accessed via the Internet.
ABC staff use Windows 10 desktops and laptops in their offices, all of which are built to an
established SOE (Standard Operating Environment). Users log into an Active Directory (AD) domain
hosted on-premises (there are AD controllers in each of the ABC office buildings connected via the
WAN).
There are two use cases for staff accessing the CRM system:
• Access via the office Internet connection from their corporate SOE machines (using the
Chrome browser).
• Access via personal devices outside the office (mobile or home computer) also using a web
browser.
Transcribed Image Text:You are a security consultant who has been engaged by ABC Pty Ltd, a medium-sized financial services company with approximately 1000 staff. The general manager of ABC wants to migrate their existing CRM (Customer Resource ...agement) solution to a cloud-based product that is delivered as Software-as-a-Service (SaaS) and is accessed via the Internet. ABC staff use Windows 10 desktops and laptops in their offices, all of which are built to an established SOE (Standard Operating Environment). Users log into an Active Directory (AD) domain hosted on-premises (there are AD controllers in each of the ABC office buildings connected via the WAN). There are two use cases for staff accessing the CRM system: • Access via the office Internet connection from their corporate SOE machines (using the Chrome browser). • Access via personal devices outside the office (mobile or home computer) also using a web browser.
Expert Solution
Step 1 Introduction

Federated identity management (FIM) which refers to an arrangement that are between multiple enterprises or domains that enables their users to use the same identification data which means the digital identity in order to access all their networks. These partners are also known as trust domains. A trust domain which can be an organization, a business unit, a smaller subsidiary of a larger organization.

steps

Step by step

Solved in 3 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY