Grid Engine. The EPIKH Project (Exchange Programme to advance e-infrastructure Know-How)
|
|
- Ethel Parks
- 8 years ago
- Views:
Transcription
1 The EPIKH Project (Exchange Programme to advance e-infrastructure Know-How) Grid Engine Riccardo Rotondo Consortium GARR Joint CHAIN/EPIKH School for Application Porting to Science Gateways Beijing,
2 Outline A Simple API for Grid Applications (SAGA): The OGF (Open Grid Forum) Standard; JSAGA: a Java implementation of SAGA; A generic Grid Engine for Science Gateways based on SAGA; Grid Engine based on JSAGA; EGI Portal Policy & Grid Security Traceability; Grid Engine usage example. Beijing, Asia4,
3 A Simple API for Grid Applications (SAGA) SAGA is an API that provides the basic func7onality required to build distributed applica7ons, tools and frameworks; It is independent of the details of the underlying infrastructure (e.g., the middleware); SAGA is an OGF specifica7on: hhp:// Several Implementa7ons are available: A C++ and a Java implementa1on developed at the Louisiana State University / CCT and Vrije Universiteit Amsterdam ( h@p://apidoc.saga.cct.lsu.edu ); A Java implementa1on developed at CCIN2P3 (h@p://grid.in2p3.fr/jsaga/); A Python implementa1on based on those above. Beijing, Asia4,
4 A Simple API for Grid Applications (SAGA) SAGA is made of: SAGA Core Libraries: contain the SAGA base system, the run1me and the API packages (job management, data management, etc.); SAGA Adaptors: provide access to the underlying grid infrastructure (adaptors are available for glite, ARC, Globus, UNICORE and other middleware); SAGA defines a standard We then need an implementa1on! Beijing, Asia4,
5 JSAGA JSAGA is a Java implementa7on of SAGA developed at CCIN2P3; JSAGA: Enables uniform data and job management across different grid infrastructures/middleware; Makes extensions easily: adaptor interfaces are designed to minimize coding effort for integra1ng support of new technologies/middleware; Is OS independent: most of the provided adaptors are wri@en in full Java and they are tested both on Windows and Linux. Beijing, Asia4,
6 JSAGA Adaptors JSAGA supports glite, Globus, ARC, UNICORE, etc. Beijing, Asia4,
7 A Generic Grid Engine for Science Gateways based on JSAGA Liferay Portlets Science GW 1 Science GW 2 Science GW 3 Grid Engine Science GW Interface etoken Server Data Engine Job Engine JSAGA API Users Track & Monit. Users Tracking DB Grid MWs Beijing, Asia4,
8 E- TOKEN In order to strong reduce the risks to have the robot cer1ficate compromised, the INFN CA decided to store this new cer1ficate on board of the SafeNet etoken smart cards [6]; The AeToken smart card can support many cer1ficates; A token PIN is prompted every 1me the user needs to interact with the smart card; Beijing, Asia4,
9 E- TOKEN SERVER Users Client Applica7ons Grid Portals / Science Gateways Host based mutual authentication Beijing, Asia4,
10 EGI Users Tracking DB The Portal, the associated Portal VO and the Portal manager are all individually and collec7vely responsible and accountable for all interac7ons with the Grid; The Portal must be capable of limi7ng the job submission rate; The Portal must keep audit logs for all interac7ons with the Grid as defined in the Traceability and Logging Policy (minimum 90 days); The Portal manager and operators must assist in security incident inves7ga7ons; Where relevant, private keys associated with (proxy) cer7ficates must not be transferred across a network, not even in encrypted form. Beijing, Asia4,
11 Two Tables: one for active Jobs and File Transfers Users Traceability in Science Gateways and one for the finished ones. Example of entry in the Users Tracking DB Common Name IP + Port ID Timestamp 70 Common Grid Name Interaction GRID USAGE TRACEABILITY fpistagna IP + TCP Port :8162 Timestamp :16:29 Portal User Name as stored in LDAP IP address and TCP port used by the requester Identify the grid operation date/time Grid Interaction Identification (Job X submission, file upload/download). The portal MUST classify all the grid operations allowed. This value will allow to identify both applications used and operation performed. Grid Interaction Grid ID 1 Store the actual GRID Interaction ID (Job ID for job submission and some other relevant Grid ID [wms://infn-wms-01.ct.pi2s2.it:7443/ information for data transfer) glite_wms_wmproxy_server]-[ Robot Certificate 9000/7rQ458xozactEEjoXMlxQg] Identify the Robot Certificate used for the Grid Operation Robot Certificate Virtual Organisation /C=IT/O=INFN/OU=Robot/L=COMETA/CN=Robot: ViralGrid Science Gateway - Roberto Barbera cometa Beijing, Asia4,
12 References A Simple API for Grid Applications (SAGA): JSAGA: Other SAGA Implementations: The C++ implementation developed at the Louisiana State University/CCT: ; The Java implementation developed at the Vrije Universiteit Amsterdam: Beijing, Asia4,
13 Hands-on Please follow the instructions on this wiki page: GridEngineStandaloneCode Beijing, Asia4,
14 Questions? Beijing, Asia4,
Widening the number of e- Infrastructure users with Science Gateways and Identity Federations (access for success)
Consorzio COMETA UNIONE EUROPEA Widening the number of e- Infrastructure users with Science Gateways and Identity Federations (access for success) Prof. Roberto Barbera (roberto.barbera@ct.infn.it) Univ.
More informationThe GISELA Science Gateway
The GISELA Science Gateway Roberto Barbera (roberto.barbera@ct.infn.it) University of Catania and INFN - Italy TICAL 2012 Lima, 3 July 2012 Introduction and driving considerations The Catania Science Gateway
More informationTest of cloud federation in CHAIN-REDS project
Test of cloud federation in CHAIN-REDS project Italian National Institute of Nuclear Physics, Division of Catania - Italy E-mail: giuseppe.andronico@ct.infn.it Roberto Barbera Department of Physics and
More informationProcessing big data by WS- PGRADE/gUSE and Data Avenue
Processing big data by WS- PGRADE/gUSE and Data Avenue http://www.sci-bus.eu Peter Kacsuk, Zoltan Farkas, Krisztian Karoczkai, Istvan Marton, Akos Hajnal, Tamas Pinter MTA SZTAKI SCI-BUS is supported by
More informationIGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
More informationIntroduction to the EPIKH/CHAIN projects
The EPIKH Project (Exchange Programme to advance e-infrastructure Know-How) Introduction to the EPIKH/CHAIN projects Riccardo Rotondo (riccardo.rotondo@garr.it) Consortium GARR Joint CHAIN/EPIKH School
More informationRoberto Barbera. Centralized bookkeeping and monitoring in ALICE
Centralized bookkeeping and monitoring in ALICE CHEP INFN 2000, GRID 10.02.2000 WP6, 24.07.2001 Roberto 1 Barbera ALICE and the GRID Phase I: AliRoot production The GRID Powered by ROOT 2 How did we get
More informationThe ENEA-EGEE site: Access to non-standard platforms
V INFNGrid Workshop Padova, Italy December 18-20 2006 The ENEA-EGEE site: Access to non-standard platforms C. Sciò**, G. Bracco, P. D'Angelo, L. Giammarino*, S.Migliori, A. Quintiliani, F. Simoni, S. Podda
More informationStatus and Integration of AP2 Monitoring and Online Steering
Status and Integration of AP2 Monitoring and Online Steering Daniel Lorenz - University of Siegen Stefan Borovac, Markus Mechtel - University of Wuppertal Ralph Müller-Pfefferkorn Technische Universität
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationHow To Write An Airplane Grid Project (Aerogrid)
JavaGAT Adaptor for UNICORE 6 Development and Evaluation in the Project AeroGrid Tobias Schlauch, German Aerospace Center UNICORE Summit 2009, August 25th, 2009, Delft, The Netherlands Folie 1 Outline
More informationAustralian Synchrotron, Storage Gateway
Australian Synchrotron, Storage Gateway User Help Manual Version 1.2 Storage Gateway User Help Manual 2 REVISION HISTORY Date Version Description Author 2 May 2008 1.0 Document creation Chris Myers 13
More informationEsqu Science Experiments For Computer Network
Vangelis Floros, GRNET S.A. 3 rd Open Source Software Conference March 22, 2008 NTUA, Athens Greece Introduction What is a Grid? What is escience? Large Scientific Grids The example of EGEE Building Grid
More informationSecuring ArcGIS Server Services: First Steps
Federal GIS Conference February 9 10, 2015 Washington, DC Securing ArcGIS Server Services: First Steps Michael Sarhan Esri msarhan@esri.com Agenda Review Basic Security Workflow ArcGIS Server Roles and
More informationGRID COMPUTING Techniques and Applications BARRY WILKINSON
GRID COMPUTING Techniques and Applications BARRY WILKINSON Contents Preface About the Author CHAPTER 1 INTRODUCTION TO GRID COMPUTING 1 1.1 Grid Computing Concept 1 1.2 History of Distributed Computing
More informationTwo-Factor Authentication
Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview
More informationGeoff McGregor, Indiana University Integra(ng KC with CAS and LDAP 4/25/2012
2012 User Conference April 22-24, 2012 Atlanta, Georgia Together Toward Tomorrow Geoff McGregor, Indiana University Integra(ng KC with CAS and LDAP 4/25/2012 open source administration software for education!
More informationIntegration Guide. SafeNet Authentication Client. Using SAC with Putty-CAC
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
More informationCertificates in a Nutshell. Jens Jensen, STFC Leader of EUDAT AAI TF
Certificates in a Nutshell Jens Jensen, STFC Leader of EUDAT AAI TF In a nutshell... Mature, Robust, Ubiquitous Have been around for decades Interoperable supported by every OS, every language Used everywhere
More informationBuilding Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
More informationMassey University Wireless Network - Client
Massey University Wireless Network - Client Configuration Windows Mobile 5/6 Windows Mobile wireless network Requirements Information Technology Services You must have an active Massey network account,
More informationSEE-GRID-SCI. www.see-grid-sci.eu. SEE-GRID-SCI USER FORUM 2009 Turkey, Istanbul 09-10 December, 2009
SEE-GRID-SCI Grid Site Monitoring tools developed and used at SCL www.see-grid-sci.eu SEE-GRID-SCI USER FORUM 2009 Turkey, Istanbul 09-10 December, 2009 V. Slavnić, B. Acković, D. Vudragović, A. Balaž,
More informationBusiness applications:
Consorzio COMETA - Progetto PI2S2 UNIONE EUROPEA Business applications: the COMETA approach Prof. Antonio Puliafito University of Messina Open Grid Forum (OGF25) Catania, 2-6.03.2009 www.consorzio-cometa.it
More informationEntrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
More informationGRIP:Creating Interoperability between Grids
GRIP:Creating Interoperability between Grids Philipp Wieder, Dietmar Erwin, Roger Menday Research Centre Jülich EuroGrid Workshop Cracow, October 29, 2003 Contents Motivation Software Base at a Glance
More informationGrids Computing and Collaboration
Grids Computing and Collaboration Arto Teräs CSC, the Finnish IT center for science University of Pune, India, March 12 th 2007 Grids Computing and Collaboration / Arto Teräs 2007-03-12 Slide
More informationThe EGI pan-european Federation of Clouds
The EGI pan-european Federation of Clouds CGW12 Cracow, 22-24 Oct 2012 Matteo Turilli Senior Research Associate Chair EGI Federated Clouds Task Force Oxford e-research Centre University of Oxford matteo.turilli@oerc.ox.ac.uk
More informationglobus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory
globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory Types of integration Resource integration Connect campus, project,
More informationThe EDGeS project receives Community research funding
Desktop Grids EDGeS project Delegation for access to trusted resources The EDGeS project receives Community research funding 1 DG = Desktop Grid = Loose grid scavenging idle resources Unit of Work = Application
More informationAgenda. How to configure
dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
More informationA Web-based Portal to Access and Manage WNoDeS Virtualized Cloud Resources
A Web-based Portal to Access and Manage WNoDeS Virtualized Cloud Resources Davide Salomoni 1, Daniele Andreotti 1, Luca Cestari 2, Guido Potena 2, Peter Solagna 3 1 INFN-CNAF, Bologna, Italy 2 University
More informationEnabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal
Guideline Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal Product(s): IBM Cognos ReportNet Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
More informationExperiences of an academic CSIRT
Setting up a Grid-CERT Experiences of an academic CSIRT 19 th Annual FIRST Conference 2007 June 18-22, Seville, Spain Klaus Möller DFN-CERT Services GmbH Agenda Introduction Organisational Challenges Making
More informationLiferay Portal 4.0 - User Guide. Joseph Shum Alexander Chow
Liferay Portal 4.0 - User Guide Joseph Shum Alexander Chow Liferay Portal 4.0 - User Guide Joseph Shum Alexander Chow Table of Contents Preface... viii User Administration... 1 Overview... 1 Administration
More informationU 09 Remote Access Policy
Dartmoor National Park Authority U 09 Remote Access Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement
More informationThis presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
More informationSafeNet KMIP and Google Cloud Storage Integration Guide
SafeNet KMIP and Google Cloud Storage Integration Guide Documentation Version: 20130719 Table of Contents CHAPTER 1 GOOGLE CLOUD STORAGE................................. 2 Introduction...............................................................
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationEnabling Collaboration Using the Biomedical Informatics Research Network (BIRN)
Enabling Collaboration Using the Biomedical Informatics Research Network (BIRN) Carl Kesselman, Ph.D. Information Sciences Institute, University of Southern California March 21, 2012 BIRN Capabilities
More informationDragonframe License Manager User Guide Version 1.2.2
Dragonframe License Manager User Guide Version 1.2.2 The Dragonframe License Manager (DFLM) provides floating license management for Dragonframe 3.0 and above. You must contact support (support@dragonframe.com)
More informationIntegration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
More informationAlliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
More informationInteroperability in Grid Computing
Anette Weisbecker, Fraunhofer IAO, Stuttgart 18 th April 2007 Special Interest Session III Outline: Interoperability in Grid Computing Grid Computing for Medicine and Life Science Interoperability Architecture
More informationCSA SDP Working Group
CSA SDP Working Group An Open Source Code Project for a Software Defined Perimeter to Defend Cloud Applications from DDoS CSA Conference - Berlin November 2015 DHS Problem Addressing the Changing Perimeter
More informationMIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper
Migrating Desktop and Roaming Access Whitepaper Poznan Supercomputing and Networking Center Noskowskiego 12/14 61-704 Poznan, POLAND 2004, April white-paper-md-ras.doc 1/11 1 Product overview In this whitepaper
More informationHunk & Elas=c MapReduce: Big Data Analy=cs on AWS
Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements
More informationThe Italian Grid Infrastructure (IGI) CGW08 Cracow. Mirco Mazzucato Italian Grid Infrastructure Coordinator INFN CNAF Director
The Italian Grid Infrastructure (IGI) CGW08 Cracow Mirco Mazzucato Italian Grid Infrastructure Coordinator INFN CNAF Director IGI -> National Grid Initiative Applications: Archeology Astronomy Astrophysics
More informationM2M: EE Connectivity. 22 July 2015 2015, EE LIMITED 1
M2M: EE Connectivity 22 July 2015 2015, EE LIMITED 1 EE network and service access Our M2M service gives you access to our mobile network, to facilitate communication between devices and application servers,
More informationDell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy
Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
More informationDirect Issuance of Proxy Certificate on P-GRADE Grid Portal Without Using MyProxy
Direct Issuance of Proxy Certificate on P-GRADE Grid Portal Without Using MyProxy by Ng Kang Siong (ksng@mimos.my) Galoh Rashidah Haron (rashidah@mimos.my) MIMOS Berhad, Malaysia www.eu-egee.org EGEE and
More informationEnabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal
Guideline Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal Product: IBM Cognos 8 BI Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
More informationWHMCS LUXCLOUD MODULE
èè WHMCS LUXCLOUD MODULE Update: 02.02.2015 Version 2.0 This information is only valid for partners who use the WHMCS module (v2.0 and higher). 1.1 General overview 1.2 Installing the plugin Go to your
More informationFIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
More informationEMI Storage meets EMI security
EMI Storage meets EMI security Component/ Middleware glite (LFC,FTS,DPM,GFAL) ARC UNICORE StoRM dcache Staff With kind contributions by Oliver Keeble, Jean- Philippe Baud Jon Kerr Nilsen Ralph Müller-
More informationAdvanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
More informationIntegrating the Google Search Appliance with WebSphere Portal and Lotus Web Content Management
Integrating the Google Search Appliance with WebSphere Portal and Lotus Web Content Management Dave Hay Portal and Collaboration Architect IBM Software Services for Lotus (ISSL) david_hay@uk.ibm.com +44
More informationThales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.
ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright
More informationMingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
More information2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
More informationDIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
More informationIntegration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationUse Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
More informationLetsVi: A Collaborative Video Editing Tool Based on Cloud Storage
LetsVi: A Collaborative Video Editing Tool Based on Cloud Storage Hyeong-Bae An Department of Electrical/Electronic and Computer Engineering, University of Ulsan, Nam-gu, Ulsan, South Korea. E-mail: ahb910306@gmail.com
More informationCluster, Grid, Cloud Concepts
Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of
More informationElluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
More informationMicrosoft IAS and NPS Agent Configuration Guide
Microsoft IAS and NPS Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Agent IAS and NPS (Microsoft) Configuration
More informationipad Classroom Installation & Deployment Important information
ipad Classroom Installation & Deployment Important information Our aim is to carry out your installation as quickly and efficiently as possible whilst utilising Apple s recommended procedures for the deployment
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationSalesforce Opportunities Portlet Documentation v2
Salesforce Opportunities Portlet Documentation v2 From ACA IT-Solutions Ilgatlaan 5C 3500 Hasselt liferay@aca-it.be Date 29.04.2014 This document will describe how the Salesforce Opportunities portlet
More informationA new Secure Remote Access Platform from Giritech. Page 1
A new Secure Remote Access Platform from Giritech Page 1 Remote users have preferences G/On 5 works for Windows, Mac and Linux The G/On Client user experience is specific to the operating system Users
More informationScience Gateway Security Recommendations
Science Gateway Security Recommendations Jim Basney jbasney@illinois.edu Von Welch vwelch@indiana.edu This material is based upon work supported by the National Science Foundation under grant numbers 1127210
More informationVorgangsname 28.02. 30.04. 02.01. 29.02. 30.04. 01.11. 31.12. 28.02. M30 M30 M14 M20
1 APPENDIX (SECTION 6) - GANTT Work plan 2 3 EMI Project 4 Project Duration (M1-M36) 5 EMI 1 Release Candidates/Code Freeze (M10) 6 EMI 1 Release (M12) 7 EMI 2 Feature Freeze () 8 EMI 2 Release Candidates/Code
More informationSafeNet Authentication Client
SafeNet Authentication Client QUICK STRAT GUIDE Using Certificate-based Authentication with SafeNet Authentication Client for Citrix XenApp 6.5 Contents Description... 2 The Multi-Factor Authentication
More information2sms SMS API Overview
2sms SMS API Overview Do you, or your customers, use any of the following software solutions in your business? If the answer is Yes, then 2sms provides the extensive SMS API Library that gives your software
More informationThe syslog-ng Store Box 3 F2
The syslog-ng Store Box 3 F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance
More informationPoS(EGICF12-EMITC2)091
Performance testing of distributed computational resources in the software development phase, Eva Cernakova and Marek Kocan P. J. Safarik University in Kosice, Kosice, Slovak Republic E-mail: jcernak@upjs.sk
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
More informationNUS InfoComm Security Landscape
NUS InfoComm Security Landscape Yong Fong Lian, Manager (IT Security), NUSCERT, NUS, Computer Centre 1 NUS Security Strategy People Process Technology 2 NUS Security Framework NUS InfoComm Security Framework
More informationNetwork Performance Tools
Network Performance Tools Jeff Boote Internet2/R&D June 1, 2008 NANOG 43/ Brooklyn, NY Overview BWCTL OWAMP NDT/NPAD BWCTL: What is it? A resource alloca=on and scheduling daemon for arbitra=on of iperf
More informationSafeNet Authentication Client (Windows)
SafeNet Authentication Client (Windows) Version 8.1 SP1 Revision A User s Guide Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
More informationBell Mobile Device Management (MDM)
Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool
More informationSCI-BUS gateways for grid and cloud infrastructures
SCI-BUS gateways for grid and cloud infrastructures Tamas Kiss University of Westminster Peter Kacsuk, Zoltan Farkas MTA SZTAKI VERCE project meeting 1 st February 2013, Edinburgh SCI-BUS is supported
More informationTesting and Deploying IBM Rational HATS 8.5 Applications on Apache Geronimo Server 3.1
Testing and Deploying IBM Rational HATS 8.5 Applications on Apache Geronimo Server 3.1 Royal Cyber Inc. Modernized e-business solutions Overview This white paper explains how to run, test and deploy IBM
More informationSelf-Service Portal Registering, downloading & activating a soft token
Self-Service Portal Registering, downloading & activating a soft token Document issue: 3.2 Date of issue: September 2014 Contents Introduction... 3 About two-factor authentication... 3 About egrid authentication...
More informationLiving in a mixed world -Interoperability in Windows HPC Server 2008. Steven Newhouse stevenn@microsoft.com
Living in a mixed world -Interoperability in Windows HPC Server 2008 Steven Newhouse stevenn@microsoft.com Overview Scenarios: Mixed Environments Authentication & Authorization File Systems Application
More informationThe saga of WebFTS and Federated Identity
The saga of WebFTS and Federated Identity Andrey Kiryanov IT/SDC 15/12/2014 The Reason: 2 What is a Federated Identity? It is the means of linking a person's electronic identity and attributes, stored
More informationGemalto SafeNet Minidriver 9.0
SafeNet Authentication Client Gemalto SafeNet Minidriver 9.0 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document
More informationTrust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager (olaf.stullich@oracle.com) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
More informationThe standards landscape in cloud
The standards landscape in cloud PRESENTATION computing TITLE GOES HERE Vincent Franceschini CTO Distributed Architectures, Hitachi Data System Chairman Emeritus, SNIA Governing Board Member, SNIA Cloud
More informationTo install the SMTP service:
To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click
More informationCisco Extended Care 1.0
Cisco Extended Care 1.0 Enabling Patient Engagement and Wellness Cisco Extended Care 1.0, as shown in Figure 1, is a browser based personal health and wellness collaboration platform that enables patient
More informationGRIDSEED: A Virtual Training Grid Infrastructure
GRIDSEED: A Virtual Training Grid Infrastructure Iztok Gregori CNR-IOM DEMOCRITOS Trieste, Italy iztok@democritos.it Stefano Cozzini CNR-IOM DEMOCRITOS Trieste, Italy cozzini@democritos.it Tyanko Aleksiev
More informationPoS(EGICF12-EMITC2)110
User-centric monitoring of the analysis and production activities within the ATLAS and CMS Virtual Organisations using the Experiment Dashboard system Julia Andreeva E-mail: Julia.Andreeva@cern.ch Mattia
More informationModern Approach for User and Service Management. Michal Procházka CESNET Czech Republic
Modern Approach for User and Service Management Michal Procházka CESNET Czech Republic Motivation Users want to access valuable services Ideally using one digital identity vs. Service providers need to
More informationFuture Developments in UniGrids and NextGRID
Future Developments in UniGrids and NextGRID Dr. David Snelling Fujitsu Laboratories of Europe Unicore Summit Nice, France - October 2005 Overview Status Report New Gateway Architecture Parallel HTTP based
More informationAPI-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
More informationCopyright Giritech A/S. Secure Mobile Access
Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary
More informationSummary from CA coordination and Security working group meeting
Summary from CA coordination and Security working group meeting WP4 workshop 2001.06.07 davidg@nikhef.nl Security related meetings summary Certification Authorities coordination Organizationally a working
More informationClientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
More informationRCS Liferay Google Analytics Portlet Installation Guide
RCS Liferay Google Analytics Portlet Installation Guide Document Revisions Date Revision By 07/02/12 1 Pablo Rendón 2 Table of Contents RCS Liferay-Google Analytics...1 Document Revisions...2 General Description...4
More information