Ssss

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Column1 Column2 Column3 Column4 Column5 Column6 Column7 Column8 Column9

The compliance table:


Setup 2FA System
1 The Contractor is to provide system hardware delivery and installation if any.
2 The Contractor is to provide license installation and activation
3 The Contractor is to Implement 2FA for certain users in active directory staff to connect SSL VPN and keep the rest of staff unaffected
4 The Contractor is to configure integration with Active Directory and ensure:

a. The authentication system shall only read the Active Directory Information

b. Active Directory changes are reflected automatically by changes in authentication system for Create, delete, update of user accounts

c. User updates on the Active Directory server to be rapidly reflected in the authentication system
5 The Contractor is to setup and configure policies to be applied to different AD groups
6 The Contractor is to setup hardware, software, and SMS token
7 The Contractor is to configure revoke and recover function
8 The Contractor is to configure Integration with SMS gateway (only if applicable)
9 The Contractor is to configure software token support on various devices including Windows, Mac OSX, iPhone, Windows Mobile, BlackBerry and Android devices
10 The Contractor is to configure automatic user deployment based on AD group membership if needed
11 The Contractor is to test OTP via below platforms:

a. Windows
b. Mac OSX
c. iOS
d. Android
e. Windows phone
12 The Contractor is to test software apps with fingerprint authentication
13 The Contractor is to configure encryptions for all traffics
14 The Contractor is to configure task delegation for Administrator, Helpdesk, auditor, security officer
15 The Contractor is to configure report generations in below format:

a. All users
b. All users by number of failed login attempts
c. All users by creation date and last login
d. All users who have not logged in since a definable date

No RequirementsCompliance
"Yes" = Compliant
"No" = Not Compliant
"P" = Partial Compliant
Blank = Not Compliant
General Requirements
1 The proposed system is to provide 2FA for admin access to IT resources via internet
2 The solution provides at least 30 user licenses and is scalable to support 2,000 users when needed
3 The manufacture of the proposed system has local L2 support engineers
4 The proposed solution supports integration with proposed internet firewall to set 2FA for staff access corporate resources via internet
5 It proposed solution supports integration with Active Directory as external identity source
6 The proposed system provides below data in logs:

a. All users
b. All users by number of failed login attempts
c. All users by creation date and last login
d. All users who have not logged in since a definable date
Minimum Specifications
1 The proposed solution is not writing any data to Active Directory server
2 The proposed solution rapidly reflects the changes in the authentication system for any user updates on the Active Directory server
3 The proposed solution supports sync of AD user groups and apply authentication policies to different AD groups
4 The proposed solution includes revoke and recover function when someone leaves the company or loses the device
5 The proposed solution includes software token supports Windows, Mac OSX, iPhone, and Android devices
6 The proposed solution supports automatic user deployment based on the AD group membership
7 The proposed solution supports different One Time Password for every authentication attempt
8 The proposed solution supports OTP generation via below platforms:

a. Windows
b. Mac OSX
c. iOS
d. Android
9 The proposed solution has software app supporting fingerprint authentication
10 The proposed solution makes all connections encrypted including User Sync, Authentication, Logging
11 The proposed solution supports multiple user roles such as Administrator, Helpdesk, Auditor, Security officer
12 The proposed solution supports below admin features:

a. To view all locked accounts


b. To search the username
c. To revoke a token
d. Tosuspend a token
13 The proposed solution includes below features:

a. User can request new or replacement token


b. Automated workflow for token approval

You might also like