ServerFiles.com is a server software & hardware directory for Network administrators & IT professionals, listing networking & server software for Windows 2003, Windows 2000, NT and Linux; and now also listing networking hardware solutions focused on server based computing.
PointSharp ID is one product with many methods of strong identification based on One-Time Passwords (OTP). OTP methods provided are SMS, hardware tokens, software tokens with easy distribution and all OATH compatible tokens. PointSharp ID integrates with one or more Active Directories (AD) or similar catalogs. PointSharp ID is built on .NET and certified by Microsoft.
Microsoft ISA 2006 Edition of PointSharp ID adds extra features. Secure ActiveSync, the mobile phone is locked to the users AD profile enabling strong authentication for ActiveSync. VPN L2TP/IPSEC with strong identification with challenge-response for XP/Vista, using for example OTP via SMS. Microsoft IAG 2007 Edition of PointSharp ID adds in addition to ISA Edition a self learning Single Sign-On support for Microsoft IAG 2007 as well as a virtual keyboard.
ActivIdentity 4TRESS AAA Server for Remote Access integrates with Microsoft ISA Server to provide strong two-factor user authentication with one-time passwords. 4TRESS AAA Server and ISA Server provide secure remote access to network resources through the web or VPN where static passwords are not secure enough. 4TRESS AAA Server is a full RADIUS compliant Authentication, Authorization and Accounting server and supports a variety of authentication devices such as hardware and software tokens, USB tokens, and smart cards. 4TRESS AAA Server is the only one-time password authentication server on the market that features native WLAN security and fully leverages your existing corporate directory (Active Directory or LDAP).
Provides Single Sign On features to published web sites in ISA 2004. Customize your Forms-Based-Authentication (FBA) pages. Use one set of credentials across many web listeners without re-authentication. ActiveSync/Exchange-OMA and other simple clients automatically use Basic Authentication (without splitting listeners!) Supports LDAP/LDAP-SSL for authentication. Use Windows groups/users in your access rules, even if ISA is not in your domain. No-cost evaluation provided.
RSA SecurID two-factor authentication complements the Microsoft ISA Server to allow organizations to secure enterprise network resources. By deploying RSA SecurID strong authentication solution with the Microsoft ISA Server, organizations can implement secure reliable means of verifying a user’s identity before granting access to network resources.
FlexForm from Collective Software augments the capabilities of ISA 2006, allowing it to interact with your internal back-end web login forms and sign in the user (provided they can use the same credentials).
Features: Configure FlexForm with normal ISA publishing rules. You “publish” each form page with separate settings for interaction; Select a form on the page by name attribute or by number (e.g. find the third <form> tag on the page); Fill in username and password values automatically; Automatically scans the page to learn the form's POST URL and all default values to send; Set specific field values or override defaults on the page.
FileWay enables remote users to access files over a secure web connection without having to establish a VPN. Employees can remotely access files on the corporate file servers as well as on their desktop computers using a browser and without the need for client software. Using standards-based access and authentication protocols, FileWay is compatible with Microsoft ISA Server 2000, 2004 and thus benefits from all its major security and performance added value like protecting networks from unauthorized access, inspecting traffic, and alerting administrators to threats.
FileWay integrates with ISA Server. FileWay has a web filter that forwards basic authentication from ISA Server to FileWay Server. Therefore only authenticated users passes from ISA Server Firewall and this provides a more secure environment for FileWay to run in. The following are some of the major benefits of integrating FileWay with ISA Server:
FileWay out of the box integration with ISA Server enables remote users to leverage the ISA Server secure reverse proxy functionality to access files securely from any browser; Integrating Fileway with OWA and securing them with ISA Server delivers 90% of VPN functionality without having to deploy client software; ISA Server Secure Publishing protects the Fileway servers published behind the firewall from external attacks, allowing only authorized traffic.
LockoutGuard from Collective Software augments the capabilities of ISA 2006 to allow a “soft lockout”.
LockoutGuard can be configured to start denying authentication attempts before the AD lockout limit is reached. This acts as an additional tier of “lockout security”, safely locking the account out of the extranet. During soft lockout of a user's account, password guessing on the extranet will fail since LockoutGuard is blocking authentication attempts for that account. Even during this soft lockout, the user account can still be logged in from inside your LAN, or over a VPN. Thus, the DoS potential is substantially controlled, with a minimum inconvenience.
Captivate for ISA Server from Collective Software is a filter for ISA 2006 and 2004 that adds captive portal functionality to your proxied networks.
Features include: Display a “Terms of Service” screen or policy page which the user must read and acknowledge; On a wireless network segment, always direct the user to a custom start page first, before allowing other browsing. This could be a home page, or an external web app that collects information or payment; On a wireless network segment, track and log new users by IP and MAC address; Require users to authenticate to ISA with a web form before allowing browsing. This is useful when you cannot control the browser proxy settings, but your users will still have accounts that are known to ISA; Block access to other protocols (such as FTP, SSH, etc.) until a user passes the authorization process, then allow those protocols.