Find Answers

Filter Search Results
All Operating Systems:
All Products:
All Solution Types:
Source:
 
Ask a Question
Example: "Database could not be verified"  
Tips | Start Over | Solutions | Alerts | Patches | Defects  
  Results
HTML Solutions Business Manager 11.7.1 Security Bulletin
Summary Added FIPS 140-2 Compliance (EPIC 105170) For systems that require compliance with the U.S. federal government security standard FIPS 140-2, you can now enable FIPS 140-2 compliance directly in SBM This ensures that all encryption within SBM uses FIPS 140-2 certified encryption libraries and FIPS 140-2 certified algorithms.
PDF Solutions Business Manager 11.8 Web Application Security Assessment White Paper
FIPS 140-2 compliance was enabled during all tests as well. This ensured that all encryption within SBM used FIPS 140-2 certified encryption libraries and FIPS 140-2 certified algorithms.
PDF SolutionsBusinessManager 11.7.1WebApplication SecurityAssessment
FIPS 140-2 compliance was enabled during all tests as well. This ensured that all encryption within SBM used FIPS 140-2 certified encryption libraries and FIPS 140-2 certified algorithms.
PDF ScalingfortheEnterprise
IdentityandAccessManagement SBMprovidessinglesign-on(SSO)authenticationoutoftheboxwhileinteractingwith componentsatruntimeanddesigntime.Italsoprovidesacompleteaudittrailofallinteractions andchangesthatareperformedbyeitherhumansorapplicationsduringasession. UserAuthentication RequeststotheSBMServerareauthenticatedusingoneofthefollowingschemes: – InternalPasswords UsercredentialscanbevalidatedagainstthosestoredwithinSBM.Passwordswithinthe SBMServerarestoredusingahashingalgorithm(SHA-256).Formoreinformation,see: http://csrc.nist.gov/publications/ fips / fips 180-2/ fips 180-2withchangenotice.pdf – WindowsDomainAuthentication TheWindowssecuritysystemintegratedintoIIScanbeusedtoauthenticateuseraccess. Inthiscase,IISverifiesloginnamesandpasswordsagainstWindowsuseraccounts.
PDF Scaling for the Enterprise
Passwords within the SBM Server are stored using a hashing algorithm (SHA-256). For more information, see http://csrc.nist.gov/publications/ fips / fips 180-2/ fips180-2withchangenotice.pdf.

Welcome kb sso

My Recent Searches

Search Feedback

Are we answering your questions?

Additional Assistance

  • Submit a Case Online
  • FAQs