1. Introduction 2. Getting Started 3. Scenario 1 - Non-Replicated Cluster 4. Scenario 2 - Replicated Cluster 5. Conclusion
|
|
- Augustus Manning
- 8 years ago
- Views:
Transcription
1
2
3 1. Introduction Non-Replicated Cluster Replicated Cluster Mixing Both Options Getting Started Scenario 1 - Non-Replicated Cluster JOSSO Agent Configuration Load Balancer Configuration JOSSO Server Configuration Starting the Cluster Scenario 2 - Replicated Cluster JOSSO Agent Configuration Load Balancer Configuration JOSSO Server Configuration Enable HA Support Setup Node Information Identity Appliance Configuration Starting the Cluster Conclusion iii
4 There are multiple alternatives when enabling High Availability in JOSSO. Some are more complex than others, and selecting which is the best for you will depend on your requirements. The main goal is to keep the identity services working even in the event of hardware or software failure in one of the JOSSO servers, but like in any HA solution, ALL components must provide HA capabilities, specially user repositories (DB and Directory servers) and partner applications. Otherwise, a single point of failure will still exist. In all cases it is up to the deployer, to keep SSO Nodes updated with the corresponding configuration and identity appliance defintions. JOSSO will not propagate configuration changes performed to a node. This tutorial focuses on how to configure Clustering support in JOSSO; enabling HA support in external components it s outside the scope of this document. Following is a brief overview of the different alternatives, including pros and cons for each one. Non-replicated clusters provide a highly scalable, and easy to configure alternative. In a nonreplicated cluster you configure two or more server groups or units where each unit contains a JOSSO server and application container instances. An HTTP load balancer will forward incoming traffic to one of the groups, ensuring that any subsequent request from a given user will be always forwarded to the a server in the same group or unit. If any of the servers on a unit fails, the load balancer will consider the group down, and will forward traffic to another group. This approach has the advantage of being easy to setup and maintain, it does not require replication for JOSSO nor the SSO partner applications. The disadvantage is that when a group goes down, users loose the current state, and they need to sign-in again once they are automatically reassigned to a new group, application state is also lost, but the service will still be available. Let s take a look at an example with two SSO clusters, each one contains a JOSSO server and an application server. 1
5 Introduction In a replicated cluster, user state is shared among multiple servers, ensuring that upon node failure state will be maintained in other servers. It requires replication not only on the JOSSO tier, but also at the application level to be effective. Partner applications using JOSSO agents must use a load-balancer to resolve web-service calls targeted to JOSSO servers, allowing for applications to keep working even if one of the SSO servers goes down. This approach requires that partner applications already support replication, it also makes configuration and maintenance of the solution more complex. The advantage is that if any of the servers goes down, users will continue to operate the system without loosing state. Following is a diagram describing an hypothetical clustered deployment with a single partner application. If more applications are involved, they will be added as other application clusters. 2
6 Introduction It is possible to combine both approaches, you can define multiple independent groups or units like in the first example, but in this case each group is actually a replicated cluster (normally two servers of each kind: sso, application, etc.). This ensures that groups will be always available, but also makes scaling simpler. All that is needed to augment the processing capacity is to add an additional group to the solution. This approach requires that a complex setup, combining load-balancers and replication settings for JOSSO and the partner applications, but it permits adding unlimited number of clusteredgroups to the solution. This is an example of such deployment. 3
7 Introduction 4
8 We are going to follow the steps required to configure the two scenarios mentioned above. These are the assumptions and prerequisites. Creating a mixed scenario is just a matter of combining the other two examples. We are also using a single application, but adding more is just a matter of repeating the configuration steps for the new elements. Partner Applications In the examples we use JOSSO Agent based partner applications, but other applications like cloud-services or third party products supporting any SSO protocol (i.e. SAML 2, OpenID Connect 1, Ws-Federation, etc) can be used as well. JDK 7 or 8 JOSSO (Update #25 or above) Load Balancer: Apache Web Server 2.4 (with Proxy support: mod_proxy) Application Server: Apache Tomcat 7 Partner Application: JOSSO Sample application User Repository: JOSSO Built-in Property Cluster 1 Cluster 2 Load Balancer Internal Host sso-lb.local sso-lb.local Load Balancer SSO Host sso.mycompany.com sso.mycompany.com Load Balancer Application Host sso.mycompany.com sso.mycompany.com JOSSO Internal Hosts sso1.local sso2.local Tomcat Server Internal Hosts app1.local app2.local Node ID idbus-001 idbus-002 5
9 When using this type of cluster, there are two configuration steps to perform, first we need to modify the SSO Agent configuration file and point the backchannel endpoint (webservices) to the corresponding internal SSO server. Agents cannot use the public SSO server name and go through the load-balancer to the wrong SSO node when invoking webservices. We may also need to disable SSL for the endpoint, specially if the reverse proxy/load balancer is handling the SSL termination. Let s take a look at the changes made to the agent configuration created by JOSSO, look for the following properties: <property name="endpoint"> <value>sso.mycompany.com:443</value> </property> <property name="transportsecurity"> <value>confidential</value> </property> Remove the transportsecurity property and update the endpoint property s value. The value will vary from application server instance to application server instance. For example for application server node one app1.local, the endpoint to use is sso1.local:8081, but for application server node two app2.local, it will be sso2.local:8081. As you can see you must pair each application node with the corresponding SSO server. <property name="endpoint"> <value>sso1.local:8081</value> </property> The key to get non-replicated clusters to work is to have the proper load-balanbcer configuration. We must ensure that when a user has been assigned to SSO node one, he must also be assigned to corresponding application node one. Let s take a look at a possible configuration using Apache Load Balancer. In this example, a domain cookie generated by Apache is used to keep track of the CLUSTER that a user has been assigned to. Make sure that JOSSO server 1 (sso1.local) and Application server 1 (app1.local) are associated to the the same CLUSTER/ROUTE id, the same applies to sso2.local and app2.local servers. If a domain cookie cannot be used (JOSSO and the applications do not share a common domain), you may consider enabling stickynnes based on the user s IP address. It is also important to enable the ProxyPreserveHost directive for auditing purposes. Bellow is the relevant aspect of the Apache server configuration: ProxyRequests Off ProxyPreserveHost On SSLProxyVerify none 6
10 Scenario 1 - Non- Replicated Cluster SSLProxyProtocol all # Domain-wide cookie to keep track of the Cluster ID (will be available to sso.mycompany.com and app.mycompanny.com) Header add Set-Cookie "CLUSTERID=.%{BALANCER_WORKER_ROUTE}e; Domain=.mycompany.com; path=/" env=balancer_route_changed # app1 and sso1 user route id 1 # app2 and sso2 user route id 2 # JOSSO Load balancer Setup <Proxy balancer://sso> BalancerMember route=1 BalancerMember route=2 ProxySet stickysession=clusterid </Proxy> # JOSSO Proxy rules (no need to specify the host in our case) ProxyPass /IDBUS balancer://sso/idbus ProxyPassReverse /IDBUS balancer://sso/idbus ProxyPass /IDBUS-UI balancer://sso/idbus-ui ProxyPassReverse /IDBUS-UI balancer://sso/idbus-ui # Application Load balancer Setup <Proxy balancer://app> BalancerMember route=1 BalancerMember route=2 ProxySet stickysession=clusterid </Proxy> # Application Proxy rules (no need to specify the host in our case) ProxyPass /partnerapp balancer://app/partnerapp ProxyPassReverse /partnerapp balancer://app/partnerapp Load Balancer Options The provided configuration is for demonstration purposes only, and may not apply to your environment or load-balancer solution. Providing LB specific options is outside the scope of this document. No special configuration is required on the JOSSO side, both nodes will have a copy of the exact same identity appliance. Like in any other proxied scenario, Providers' locations will always use public URLs starting with and application resource definitions will follow the same principle, in this case starting with Let s take a look at our current identity appliance: 7
11 Scenario 1 - Non- Replicated Cluster Now that everything has been configured, you can start all the elements on the cluster. 8
12 In this scenario, applications and JOSSO must have replication enabled, otherwise user state will be lost if any of the resources fail. Enabling replication at the application level is outside the scope of this document, and depends on the application type and container. With a replicated cluster there is no need to match the application servers with SSO servers, allowing for other sticky session support strategies. In this example, wi will use the non-clustered setup as starting point, making the necessary changes to enable JOSSO replication. We want agents to use a load-balancer when issuing web-services requests to JOSSO. This ensures that if an SSO node goes down, another will be able to handle the requests. In our case we will use an internal host to refer to the loadbalancer, but the service will be the same Apache server. This is the endpoint property after making the necessary changes, in this case we also removed the transportsecurity property from the agent configuration file. <property name="endpoint"> <value>sso-lb.local:80</value> </property> Make sure that the load balancer can be contacted by application servers on the required port. You may want to use an internal load-balancer for this purpose, since it does not have to be the same used for user incoming connections from users. In this case, we don t need a domain wide cookie to provide sticky session support. We can mix SSO nodes with application nodes. We do want to use sticky session support for each resource type (SSO, applications). Let s take a look a the new load balancer configuration: ProxyRequests Off ProxyPreserveHost On SSLProxyVerify none SSLProxyProtocol all all # ROUTEID cookie is server specific (not domain wide) Header add Set-Cookie "ROUTEID=.%{BALANCER_WORKER_ROUTE}e; path=/" env=balancer_route_changed # In this example, this balances browser and sso agent requests <Proxy balancer://sso> BalancerMember route=1 BalancerMember route=2 ProxySet stickysession=routeid </Proxy> ProxyPass /IDBUS balancer://sso/idbus ProxyPassReverse /IDBUS balancer://sso/idbus 9
13 Scenario 2 - Replicated Cluster ProxyPass /IDBUS-UI balancer://sso/idbus-ui ProxyPassReverse /IDBUS-UI balancer://sso/idbus-ui <Proxy balancer://app> BalancerMember route=1 BalancerMember route=2 ProxySet stickysession=routeid </Proxy> ProxyPass /partnerapp balancer://app/partnerapp ProxyPassReverse /partnerapp balancer://app/partnerapp JOSSO uses EHCache internally to replicate user information. The replication protocol is based on RMI (Java Remote Method Invocation). By default JOSSO nodes will automatically discover other peers using MULTICAST. This provides an automatic method of nodes discovery, simplifying cluster maintenance significantly. It is possible to manually configure the list of peers, but the process is quite complex due to limitations on the EHCache module. In our example we re using MULTICAST. In this case, every time a node is added to the cluster, the information already contained in the running servers will automatically be propagated to the new node upon startup. In order to enable replication in JOSSO we need to perform the following configuration changes: This requires the activation of the HA feature, we need to edit the file $JOSSO2_HOME/etc/ org.apache.karaf.features.cf and modify the featuresboot property, replacing josso-ee with josso-ee-ha ant the end of the line:: featuresboot=atricore-branding,config,ssh,management,spring,springdm,atricore-monitoring-builtin,atricore-auditing-builtin,josso-ee-ha Now we need to identify each node with its own ID, edit the file $JOSSO2_HOME/etc/ org.atricore.idbus.kernel.main.cfg and set the corresponding value to the idbus.node property, in this case we are using idbus-001 for SSO server one, and idbus-002 for SSO Server two. In the same file, you also need to enable the binding.soap and binding.http properties as shown below. This properties control the number of attempts and retry delays for a node that requires information from another server. idbus.node=idbus # This is useful in cluster environments binding.http.loadstateretrycount=5 binding.http.loadstateretrydelay=100 # This is useful in cluster environments 10
14 Scenario 2 - Replicated Cluster binding.soap.loadstateretrycount=5 binding.soap.loadstateretrydelay=100 No special configuration is required on the JOSSO side, both nodes will have a copy of the exact same identity appliance. Like in any other proxied scenario, Provider locations will always use public URLs starting with and application resource definitions will follow the same principle, in this case starting with Let s take a look at our current identity appliance (it is the same we used in the previous scenario): Now that everything has been configured, you can start all the elements on the cluster. It is recommended to wait for the first SSO Node to get started before starting the others. 11
15 There are other configuration alternatives, this document is intended to provide an initial overview that should help you deploy the solution that better meets your needs. As you can see, one of the critical aspects is to fully understand the HTTP protocol and to know the capabilities that loadbalancers have to offer. 12
EQUELLA. Clustering Configuration Guide. Version 6.2
EQUELLA Clustering Configuration Guide Version 6.2 Document History Document No. Reviewed Finalised Published 1 18/03/2014 18/03/2014 18/03/2014 March 2014 edition. Information in this document may change
More informationSetting Up B2B Data Exchange for High Availability in an Active/Active Configuration
Setting Up B2B Data Exchange for High Availability in an Active/Active Configuration 2010 Informatica Abstract This document explains how to install multiple copies of B2B Data Exchange on a single computer.
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server Table of Contents Table of Contents Deploying the BIG-IP LTM with Tomcat application servers and Apache web
More informationCentraSite SSO with Trusted Reverse Proxy
CentraSite SSO with Trusted Reverse Proxy Introduction Single-sign-on (SSO) via reverse proxy is the preferred SSO method for CentraSite. Due to its flexibility the reverse proxy approach allows to apply
More informationTechnical specification
Technical specification Load balancing configuration Koaly EXP Page : 1 / 8 Table of contents Introduction... 3 I.Overview... 3 II.The Apache load balancer... 3 III.Limitations... 3 Prerequisites... 4
More informationWhite Paper DEPLOYING WDK APPLICATIONS ON WEBLOGIC AND APACHE WEBSERVER CLUSTER CONFIGURED FOR HIGH AVAILABILITY AND LOAD BALANCE
White Paper DEPLOYING WDK APPLICATIONS ON WEBLOGIC AND APACHE WEBSERVER CLUSTER CONFIGURED FOR HIGH AVAILABILITY AND LOAD BALANCE Abstract This White Paper provides information to deploy WDK based applications
More informationApache Tomcat. Load-balancing and Clustering. Mark Thomas, 20 November 2014. 2014 Pivotal Software, Inc. All rights reserved.
2 Apache Tomcat Load-balancing and Clustering Mark Thomas, 20 November 2014 Introduction Apache Tomcat committer since December 2003 markt@apache.org Tomcat 8 release manager Member of the Servlet, WebSocket
More informationApache HTTP Server. Load-Balancing with Apache HTTPD 2.2 and later. Erik Abele www.eatc.de
Apache HTTP Server Load-Balancing with Apache HTTPD 2.2 and later Erik Abele www.eatc.de About Me Working internationally as IT Consultant Areas: Administration & Operations Working on and with Open Source
More informationScalability of web applications. CSCI 470: Web Science Keith Vertanen
Scalability of web applications CSCI 470: Web Science Keith Vertanen Scalability questions Overview What's important in order to build scalable web sites? High availability vs. load balancing Approaches
More informationApache 2.2 and mod_proxy_balancer
Apache 2.2 and mod_proxy_balancer Presented by Paul Weinstein, Kepler Solutions, Inc. ApacheCon EU 2006 June 29, 2006 Paul Weinstein - - 1 Hello World Introduction
More informationApache Tomcat Clustering
Apache Tomcat Clustering Mark Thomas, Staff Engineer 2012 SpringSource, by VMware. All rights reserved Agenda Introductions Terminology When to cluster Components Configuration choices Debugging Questions
More informationEQUELLA. Clustering Configuration Guide. Version 6.0
EQUELLA Clustering Configuration Guide Version 6.0 Document History Document No. Reviewed Finalised Published 1 17/10/2012 17/10/2012 17/10/2012 October 2012 edition. Information in this document may change
More informationSpectrum Technology Platform Version 8.0.0. Tutorial: Load Balancing Spectrum Spatial Services. Contents:
Spectrum Technology Platform Version 8.0.0 Tutorial: Load Balancing Spectrum Spatial Services UNITED STATES www.pb.com/software Technical Support: www.pbinsight.com/support CANADA www.pb.com/software Technical
More informationManaging Virtual Servers
CHAPTER 4 Content Switching Module Device Manager (CVDM-CSM) displays details of existing virtual servers and enables users to perform detailed tasks that include creating or deleting virtual servers,
More informationApache httpd v2.4: Reverse Proxy. (The Hidden Gem) Jim Jagielski
Apache httpd v2.4: Reverse Proxy (The Hidden Gem) Jim Jagielski About me Jim Jagielski Hacker and developer Wearer o many hats at the ASF Director and President: Outercurve Council member: MARSEC-XL Consulting
More informationApache Tomcat & Reverse Proxies
Apache Tomcat & Reverse Proxies Mark Thomas, Staff Engineer 2012 SpringSource, by VMware. All rights reserved Agenda Introductions What is a reverse proxy? Protocol selection httpd module selection Connector
More informationHigh Availability and Clustering
High Availability and Clustering AdvOSS-HA is a software application that enables High Availability and Clustering; a critical requirement for any carrier grade solution. It implements multiple redundancy
More informationContent. Global Delivery Network: Folders
An alternative to using translated domains, is to host your translations in folders. I.e. www.mycompanysite.com/ language When hosting your translation in a sub-folder, the traffic will need to be split
More informationActiveVOS Clustering with JBoss
Clustering with JBoss Technical Note Version 1.2 29 December 2011 2011 Active Endpoints Inc. is a trademark of Active Endpoints, Inc. All other company and product names are the property of their respective
More informationLoad Balancing Web Applications
Mon Jan 26 2004 18:14:15 America/New_York Published on The O'Reilly Network (http://www.oreillynet.com/) http://www.oreillynet.com/pub/a/onjava/2001/09/26/load.html See this if you're having trouble printing
More informationChapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
More informationWeb Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
More informationSetup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
More informationOracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001
Oracle9i Application Server: Options for Running Active Server Pages An Oracle White Paper July 2001 Oracle9i Application Server: Options for Running Active Server Pages PROBLEM SUMMARY...3 INTRODUCTION...3
More informationConfiguring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract
Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite Abstract This white paper outlines the deployment and configuration of a Single Sign-On solution for EMC Documentum
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
More informationApache Tomcat. Tomcat Clustering: Part 2 Load balancing. Mark Thomas, 15 April 2015. 2014 Pivotal Software, Inc. All rights reserved.
2 Apache Tomcat Tomcat Clustering: Part 2 Load balancing Mark Thomas, 15 April 2015 Introduction Apache Tomcat committer since December 2003 markt@apache.org Tomcat 8 release manager Member of the Servlet,
More informationPainless Web Proxying with Apache mod_proxy
Painless Web Proxying with Apache mod_proxy Justin R. Erenkrantz University of California, Irvine and Google, Inc. http://www.erenkrantz.com/oscon/ justin@erenkrantz.com Why should I pay attention? Apache
More informationPROXY SETUP WITH IIS USING URL REWRITE, APPLICATION REQUEST ROUTING AND WEB FARM FRAMEWORK OR APACHE HTTP SERVER FOR EMC DOCUMENTUM EROOM
White Paper PROXY SETUP WITH IIS USING URL REWRITE, APPLICATION REQUEST ROUTING AND WEB FARM FRAMEWORK OR APACHE HTTP SERVER FOR EMC DOCUMENTUM EROOM Abstract This white paper explains how to setup Proxy
More informationSetup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationIntro to Load-Balancing Tomcat with httpd and mod_jk
Intro to Load-Balancing Tomcat with httpd and mod_jk Christopher Schultz Chief Technology Officer Total Child Health, Inc. * Slides available on the Linux Foundation / ApacheCon2015 web site and at http://people.apache.org/~schultz/apachecon
More informationApplication Note. Active Directory Federation Services deployment guide
Application Note Active Directory Federation Services deployment guide Document version: v1.1 Last update: 20th January 2014 Purpose ALOHA Load-Balancer deployment guide for Microsoft ADFS and ADFS proxy
More informationIntroduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
More informationApache Performance Tuning
Apache Performance Tuning Part 2: Scaling Out Sander Temme Agenda Introduction Redundancy in Hardware Building Out: Separate Tiers Building Out: Load Balancing Caching Content Conclusion
More informationDEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1
More informationConfiguring Remote HANA System Connection for SAP Cloud for Analytics via Apache HTTP Server as Reverse Proxy
Configuring Remote HANA System Connection for SAP Cloud for Analytics via Apache HTTP Server as Reverse Proxy Author: Gopal Baddela, Senior BI Architect Archius Copyright Archius 2016 1 Table of Contents
More informationLandscape Design and Integration. SAP Mobile Platform 3.0 SP02
Landscape Design and Integration SAP Mobile Platform 3.0 SP02 DOCUMENT ID: DC01916-01-0302-01 LAST REVISED: February 2014 Copyright 2014 by SAP AG or an SAP affiliate company. All rights reserved. No part
More informationIntroduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
More informationHow To Manage A Netscaler On A Pc Or Mac Or Mac With A Net Scaler On An Ipad Or Ipad With A Goslade On A Ggoslode On A Laptop Or Ipa On A Network With
CNS-205 Citrix NetScaler 10.5 Essentials and Networking The objective of the Citrix NetScaler 10.5 Essentials and Networking course is to provide the foundational concepts and advanced skills necessary
More informationTechnical White Paper - JBoss Security
Technical White Paper - JBoss Security Clustered SSO 1.0 Table of Contents Target Audience... iii Preface...iv 1. Clustered SingleSignOn...1 1.1. Introduction to SingleSignOn...1 1.2. JBoss implementation
More informationImplementing a Weblogic Architecture with High Availability
Implementing a Weblogic Architecture with High Availability Contents 1. Introduction... 3 2. Topology... 3 2.1. Limitations... 3 2.2. Servers diagram... 4 2.3. Weblogic diagram... 4 3. Components... 6
More informationOracle EXAM - 1Z0-102. Oracle Weblogic Server 11g: System Administration I. Buy Full Product. http://www.examskey.com/1z0-102.html
Oracle EXAM - 1Z0-102 Oracle Weblogic Server 11g: System Administration I Buy Full Product http://www.examskey.com/1z0-102.html Examskey Oracle 1Z0-102 exam demo product is here for you to test the quality
More informations@lm@n Oracle Exam 1z0-102 Oracle Weblogic Server 11g: System Administration I Version: 9.0 [ Total Questions: 111 ]
s@lm@n Oracle Exam 1z0-102 Oracle Weblogic Server 11g: System Administration I Version: 9.0 [ Total Questions: 111 ] Oracle 1z0-102 : Practice Test Question No : 1 Which two statements are true about java
More informationCNS-208 Citrix NetScaler 10 Essentials for ACE Migration
KURSBESCHREIBUNG CNS-208 Citrix NetScaler 10 Essentials for ACE Migration The objective of the Citrix NetScaler 10 Essentials for ACE Migration course is to provide the foundational concepts and advanced
More informationOracle Collaboration Suite
Oracle Collaboration Suite Firewall and Load Balancer Architecture Release 2 (9.0.4) Part No. B15609-01 November 2004 This document discusses the use of firewall and load balancer components with Oracle
More informationExploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence
Exploring Oracle E-Business Suite Load Balancing Options Venkat Perumal IT Convergence Objectives Overview of 11i load balancing techniques Load balancing architecture Scenarios to implement Load Balancing
More informationIBM WEBSPHERE LOAD BALANCING SUPPORT FOR EMC DOCUMENTUM WDK/WEBTOP IN A CLUSTERED ENVIRONMENT
White Paper IBM WEBSPHERE LOAD BALANCING SUPPORT FOR EMC DOCUMENTUM WDK/WEBTOP IN A CLUSTERED ENVIRONMENT Abstract This guide outlines the ideal way to successfully install and configure an IBM WebSphere
More informationChapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
More informationDEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0
DEPLOYMENT GUIDE Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0 Introducing the F5 and Microsoft Dynamics CRM configuration Microsoft Dynamics CRM is a full customer relationship
More informationConfiguration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
More informationBy PANKAJ SHARMA. Concepts of Server Load Balancing
Concepts of Server Load Balancing By PANKAJ SHARMA 1 Introduction of Load balancing and clustering with Liferay Load balancing is one of the most popular in the world due to its impressive ease-of-use.
More informationRunning Multiple Shibboleth IdP Instances on a Single Host
CESNET Technical Report 6/2013 Running Multiple Shibboleth IdP Instances on a Single Host IVAN NOVAKOV Received 10.12.2013 Abstract The article describes a way how multiple Shibboleth IdP instances may
More informationMicrosoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS)
Microsoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS) December 25 th, 2015 V.1.0 Prepared by: Manoj Karunarathne MCT, MCSA,
More informationLOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS
LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations
More information1z0-102 Q&A. DEMO Version
Oracle Weblogic Server 11g: System Administration Q&A DEMO Version Copyright (c) 2013 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version
More informationJOSSO 2.4. Ws-Federation Integration Tutorial
JOSSO 2.4 Ws-Federation Integration Tutorial JOSSO 2.4 : Ws-Federation Integration Tutorial 1. Introduction... 1 2. Prerequisites... 2 3. Defining Identity Appliance Elements... 3 3.1. SAML 2 Service Provider
More informationPre-Installation Instructions
Agile Product Lifecycle Management PLM Mobile Release Notes Release 2.0 E49504-02 October 2014 These Release Notes provide technical information about Oracle Product Lifecycle Management (PLM) Mobile 2.0.
More informationLearn Oracle WebLogic Server 12c Administration For Middleware Administrators
Wednesday, November 18,2015 1:15-2:10 pm VT425 Learn Oracle WebLogic Server 12c Administration For Middleware Administrators Raastech, Inc. 2201 Cooperative Way, Suite 600 Herndon, VA 20171 +1-703-884-2223
More informationVMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
More informationRails Application Deployment. July 2007 @ Philly on Rails
Rails Application Deployment July 2007 @ Philly on Rails What Shall We Deploy Tonight? Blogging/publishing system Standard Rails application Ships with gems in vendor directory Easy rake task for database
More informationID205 IBM Lotus inotes High Availability Customer Case Study and Successful Web Deployment Best Practices
ID205 IBM Lotus inotes High Availability Customer Case Study and Successful Web Deployment Best Practices Rahul A. Garg Advisory Software Engineer IBM Fredrik Söderquist Consultant Infoware Solutions Svenska
More informationIM and Presence Service Network Setup
Configuration changes and service restart notifications, page 1 Domain Value Configuration, page 2 Routing Information Configuration on IM and Presence Service, page 3 Configure Proxy Server Settings,
More informationRobert Honeyman Honeyman IT Consulting. http://www.honeymanit.co.uk rob.honeyman@honeymanit.co.uk
Robert Honeyman Honeyman IT Consulting http://www.honeymanit.co.uk rob.honeyman@honeymanit.co.uk Requirement for HA with SSO Centralized access control SPOF for dependent apps SSO failure = no protected
More informationCrawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
More informationJBS-102: Jboss Application Server Administration. Course Length: 4 days
JBS-102: Jboss Application Server Administration Course Length: 4 days Course Description: Course Description: JBoss Application Server Administration focuses on installing, configuring, and tuning the
More informationThis presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
More informationPerceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
More informationCitrix NetScaler 10.5 Essentials for ACE Migration CNS208; 5 Days, Instructor-led
Citrix NetScaler 10.5 Essentials for ACE Migration CNS208; 5 Days, Instructor-led Course Description The objective of the Citrix NetScaler 10.5 Essentials for ACE Migration course is to provide the foundational
More informationGRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationTable of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index
Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...
More informationHow To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip
Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationJeff Schertz MVP, MCITP, MCTS, MCP, MCSE
Jeff Schertz MVP, MCITP, MCTS, MCP, MCSE A comprehensive excerpt from Jeff Schertz s Lync Server MVP Blog Lync Web Services Load Balancing with KEMP VLM This article addresses a standard DNS Load Balanced
More informationRelease Notes Date: September 2013
Release Notes Date: September 2013 All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, or stored in any retrieval system of any nature without the
More informationSSL VPN Server Guide. Access Manager 3.2 SP2. June 2013
SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
More informationLandscape Design and Integration. SAP Mobile Platform 2.3
Landscape Design and Integration SAP Mobile Platform 2.3 DOCUMENT ID: DC01916-01-0230-02 LAST REVISED: July 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains to Sybase
More informationDEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
More informationAA enabling a closed source legacy application
AA enabling a closed source legacy application Jan Du Caju ICT security officer K.U.Leuven Belgium AA enabling a closed source legacy application Introduction: context association K.U.Leuven Case: AA enabling
More informationIdentikey Server Performance and Deployment Guide 3.1
Identikey Server Performance and Deployment Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is'
More informationCNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
More informationCitrix Receiver for Mobile Devices Troubleshooting Guide
Citrix Receiver for Mobile Devices Troubleshooting Guide www.citrix.com Contents REQUIREMENTS...3 KNOWN LIMITATIONS...3 TROUBLESHOOTING QUESTIONS TO ASK...3 TROUBLESHOOTING TOOLS...4 BASIC TROUBLESHOOTING
More information1Z0-102. Oracle Weblogic Server 11g: System Administration I. Version: Demo. Page <<1/7>>
1Z0-102 Oracle Weblogic Server 11g: System Administration I Version: Demo Page 1. Which two statements are true about java EE shared libraries? A. A shared library cannot bedeployed to a cluster.
More informationHigh Availability Low Dollar Load Balancing
High Availability Low Dollar Load Balancing Simon Karpen System Architect, VoiceThread skarpen@voicethread.com Via Karpen Internet Systems skarpen@karpeninternet.com These slides are licensed under the
More informationSITEMINDER SSO FOR EMC DOCUMENTUM REST
SITEMINDER SSO FOR EMC DOCUMENTUM REST ABSTRACT This white paper provides a detailed review of SiteMinder SSO integration with EMC Documentum REST Services by exploring the architecture,consumption workflow,
More informationAdministrator Guide. v 11
Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main
More informationOracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
More informationCitrix NetScaler 10 Essentials and Networking
Citrix NetScaler 10 Essentials and Networking CNS205 Rev 04.13 5 days Description The objective of the Citrix NetScaler 10 Essentials and Networking course is to provide the foundational concepts and advanced
More informationArcGIS for Server Deployment Scenarios An ArcGIS Server s architecture tour
ArcGIS for Server Deployment Scenarios An Arc s architecture tour Ismael Chivite Product Manager at Esri Concepts Single Machine Configurations Basic Basic with Proxy Fail-Over Load Balanced or Siloed
More informationImplementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
More informationhttp://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationGuide to Deploying Microsoft Exchange 2013 with Citrix NetScaler
Deployment Guide Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Extensive guide covering details of NetScaler ADC deployment with Microsoft Exchange 2013. Table of Contents Introduction
More informationWEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES
BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required
More informationCourse Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion
Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,
More informationINCREASE SYSTEM AVAILABILITY BY LEVERAGING APACHE TOMCAT CLUSTERING
INCREASE SYSTEM AVAILABILITY BY LEVERAGING APACHE TOMCAT CLUSTERING Open source is the dominant force in software development today, with over 80 percent of developers now using open source in their software
More informationMagento Search Extension TECHNICAL DOCUMENTATION
CHAPTER 1... 3 1. INSTALLING PREREQUISITES AND THE MODULE (APACHE SOLR)... 3 1.1 Installation of the search server... 3 1.2 Configure the search server for usage with the search module... 7 Deploy the
More informationTable of Contents. This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync.
This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync. Table of Contents Overview... 2 Evaluating Exchange ActiveSync for MailEnable...
More informationHow To Use Netscaler As An Afs Proxy
Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment
More informationLoad Balancing Microsoft AD FS. Deployment Guide
Load Balancing Microsoft AD FS Deployment Guide rev. 1.1.1 Copyright 2002 2015 Loadbalancer.org, Inc. Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org Software
More informationSticky Session Setup and Troubleshooting
1 Sticky Session Setup and Troubleshooting Day, Date, 2004 time p.m. ET Teleconference Access: US & Canada: 888-259-4812 Teleconference Access: North America: xxxx Toll Number: 706-679-4880 International:
More information<Insert Picture Here> Oracle Web Cache 11g Overview
Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content
More information