Support

Value-Added Modules

A Simple Way to Adapt the SecureAuth Cybersecurity Solution

Value-Added Modules (VAMs) are software components that are developed by SecureAuth’s Tailoring Services to fit the needs of customers seeking a simple way to adapt their SecureAuth solution. Think of VAMs as adapters or connectors that enable you to link SecureAuth IdP to your system without additional development.

VAM RELEASE LISTING

SecureAuth Health Analyzer VAM Best Practices Guide

The SecureAuth Health Analyzer tests SecureAuth Realms to gather the following information and generate an HTML report based on the results. This is followed by a list of all realms with a hyperlink to drill down into specifics for each realm. Each link is summarized with the title, authentication mode, purpose, and audit score. This testing applies to the IdM, SSO, and Network Realm.

DOWNLOAD

SecureAuth Access Gateway VAM Best Practices Guide

The SecureAuth Access Gateway Value-Added Module (VAM) is a breakthrough secure data access solution. Based on SecureAuth’s secure reverse-access technology, Access Gateway overcomes the challenges of today’s DMZ networks and network segmentation, prevents criminal application access, and protects classified networks within the enterprise infrastructure. SecureAuth’s secure front-end solution eliminates the need to store sensitive data in the DMZ, thereby reducing exposure to data breaches.

DOWNLOAD

RSA Migration Module Best Practices Guide

The RSA Migration Module provides a migration path for our customers leading away from RSA security tokens and toward more advanced 2-factor authentication methods. Customers can continue to use their existing RSA tokens when authenticating to SecureAuth IdP, allowing a phased retirement of the legacy hard token technology. This gives SecureAuth IdPs the ability to validate RSA soft and hard tokens by using the RSA RADIUS Validation client.

DOWNLOAD

ADFS 2-Factor Adapter Module Best Practices Guide

This guide contains information on how to install the SecureAuth ADFS 2-Factor Adapter and how to configure it for use in an ADFS 3.0 environment. The SecureAuth ADFS Two-Factor Adapter is a Multi-Factor Authentication Provider that uses the SecureAuth Authentication APIs to send One Time Passwords (OTPs) for use in authentication by an ADFS Federated application.

DOWNLOAD

Active Directory Best Practices Guide

Creating a new Active Directory-based infrastructure in an existing organization can pose its own special challenges, but nothing that involves great risk. Download to access recommended best practices.

DOWNLOAD

CAS Installer VAM Best Practices Guide

SecureAuth Central Authentication Service (CAS) Installer provides robust two-factor authentication for CAS clients. After successful primary authentication through the CAS Server, users must successfully complete a secondary authentication through SecureAuth IdP.

DOWNLOAD

Epic EPCS VAM Best Practices Guide

SecureAuth’s Epic EPCS Value-Added Module (VAM) enables seamless integration between SecureAuth IdP’s multi-factor authentication (MFA) and Epic’s Hyperspace platform for the EPrescribing of Controlled Substances (EPCS) system. Using this integrated package, qualified physicians can write prescriptions quickly and securely while meeting DEA requirements for eprescribing.

DOWNLOAD

GFIPM Best Practices Guide

The Global Federated Identity and Privilege Management (GFIPM) program seeks to develop secure, scalable, and cost-effective technologies for information-sharing within the law enforcement and criminal justice communities. SecureAuth seeks to increase the security of GFIPM by using its SecureAuth IdP appliance as the authentication agent, thereby enabling SSO with up to twenty-five multi-factor authentication (MFA) solutions.

DOWNLOAD

HID Prox Card to SecureAuth VAM Best Practices Guide

This proximity card detection and provisioning system offers an integration solution that enables the SecureAuth appliance to use an HID proximity card as part of the SecureAuth authentication flow. The card in this scenario is used as the first-factor authentication with a PIN entry required for the second factor.

DOWNLOAD

Java SAML Consumer Deployment Guide

This document details the method used for deploying the Java version of the SAML consumer using the Java-compliant open source web environment Tomcat. The SAML Consumer Java version consists of three components: SecureAuth Authenticator (Tomcat valve – JAR file), SAML Handler (Tomcat plugin – JAR file) and SAML Admin (Web application – WAR file).

DOWNLOAD

.NET SAML Consumer Deployment Guide

This document details the method for enabling SecureAuth customers to integrate the SAML Service Provider into their current Internet Information Services (IIS) environment.

DOWNLOAD