White Paper. Nokia Web Services Framework for Devices a Service-oriented Architecture

Size: px
Start display at page:

Download "White Paper. Nokia Web Services Framework for Devices a Service-oriented Architecture"

Transcription

1 Nokia eb ervices Framework for Devices a ervice-oriented Architecture

2 Contents Abstract Abstract 2 Introduction 3 hat is a service-oriented architecture, and why is it good? 3 ervices in the mobile environment 3 Nokia s device eb services implementation 4 ervice example 5 The AOL Radio client 5 Mobile-based services 6 ummary 6 Nokia has a vision of the mobile phone as a full participant in networked serviceoriented architectures. This document describes a new framework for part of the next-generation Nokia mobile software platforms. The framework provides rich support for service-oriented applications design in Java or C++ and a method of abstraction that allows developers to concentrate on application logic, rather than system calls. It also includes support for standards such as HTTP, XML and OAP, as well as a framework for identity management, security, service discovery and session management. Finally, the new framework makes it easier to develop and deploy new services that are offered both to and by mobile phones. 2

3 Introduction Future versions of Nokia mobile phone software will include a unified framework for developing applications for mobile phones, allowing them to become full participants in a networked service-oriented software architecture. This framework should simplify the software development of applications that rely on components based both on the device and on remote systems, via a message-passing architecture that uses open standards such as HTTP, OAP and XML in other words, a service-oriented architecture. hat is a service-oriented architecture, and why is it good? A service-oriented architecture comprises loosely coupled software systems that support direct interactions with other software systems using standardized, XML-based messages exchanged over standard Internet protocols such as HTTP. ervices tend to be autonomous and do not rely on an omnipresent system that has complete control over all parts of the architecture. This creates a style of development that is ideal for mobile phones. A service-oriented architecture makes boundaries irrelevant, meaning that services may be separated by large geographical distances, across multiple business entities and running in distinctly different software environments. Messages between services are standardized so that such distinctions can be ignored by the application developer. ervices in the mobile environment Many service providers currently offer services that allow information to be pushed to a mobile phone, or offered via a restricted web-browser interface, not always suited to mobile phones. ith a service-oriented architecture, it is possible to offer services that fully use the power of the mobile phone, allowing it to become both a full consumer of services, but also a provider of services. eb services promise to provide a way of connecting disparate environments, bridging mobile phone applications, mobile network servers and application servers. This is achieved by passing standardized messages between services. This allows service developers to concentrate on building their service, rather than having to also build networking and security support into the service. It will be possible to download web service applications directly to devices, via another eb service. uch downloaded service may be able to both provide and consume web services. As such services are available via standardized, open interfaces, mobile network operators will be able to offer services used both by applications on the phone, and other networked service and content providers. Enterprises that implement an infrastructure for authentication and security based on open standards will be able to develop vertical applications. The mobile workforce is a self-evident user group, but even external parties such as customers, partners and suppliers can use the applications, since a high level of security can be maintained. Nokia mobile phones will offer services across the network. This would allow, for example, a network calendar service to send a message to a mobile user s phone resident calendar, requesting a meeting be added to the recipient s schedule. Figure 1. A mobile, service-oriented world Operator ervices Authentication Charging Payment eb ervices Location Location eb ervices MMC Messaging eb ervices Other ervices eb ervices Applications eb ervices Applications Mobile, Enterprise, Internet and Personal ervices ervice Providers Content Providers Other Devices Enterprise Applications 3

4 Nokia s device eb services implementation Nokia s eb services framework is based on open standards, and implements a service-oriented architecture that allows the application developer to be largely unaware of the complications involved in passing messages between services, or authentication, service discovery and other details. Both Java and ymbian C++ APIs are provided, allowing programmers to choose the language most appropriate for the application. This enables both Java J2ME and C++ applications to take advantage of the service-oriented architecture and provides a unified model for multiple development environments. Figure 2 shows that the framework comprises several sub-frameworks and components that client applications and other framework components can access through various application programming interface (API) methods. On an architectural level, the service invocation framework is composed of framework providers that offer specific functions to calling applications: The Liberty framework provider offers APIs that allow the client to access services conforming to the various Liberty ID-FF and ID-F specifications. ervice discovery is accessible to client applications, as well as to other parts of the architecture. The Liberty framework provider may need direct access to service discovery facilities to be able to provide service to a calling application. ervice access may also have associated policy requirements, hence the policy services block. ervice discovery allows client applications to ask for a particular service type and be provided with both the information required to find that service (for example a concrete OAP endpoint for the service) and any security tokens required for access by the service provider. The XML services are provided to allow client applications and other parts of the framework to directly parse and manipulate XML. At some point, messages will probably be passed over a communications channel. ith OAP messages, this will most likely use either the standard HTTP binding for OAP, or the Liberty Reverse HTTP Binding for OAP (known informally as PAO). Figure 2. Open eb services Architecture Application Interface Layer Java, ymbian C++ APIs Comms. ervices ervice Invocation Framework Liberty Framework Provider Discovery and Directory ervices Policy ervices XML ervices Liberty ID-F OAP Authn + O ervice Clients ID-F Discovery Authentication Context Liberty ID-F OAP Binding, DT UDDI XML Application ervices Message ecurity AML/ID-FF XML Digital ig XML Encryption OAP DL XML Parsing AX DOM tream OAP/HTTP Binding HTTP/HTTP Reverse HTTP Binding (PAO) TCP, TL, etc. IP 4

5 ervice example The AOL Radio client An early implementation was used for the development of an AOL Radio client. The AOL Radio client is a ymbian application that simply requests a connection to an AOL Radio service using the Liberty framework provider. This component takes care of all the details of service invocation including discovery, authentication, security, session management, OAP processing and message transport. The AOL Radio client only needs to construct and parse the radio service specific messages; it does not need to worry about how this message is sent to the service, or how the message is authenticated. Once the service has been accessed using the framework, radio service audio is streamed to the phone-based client. The client takes care of the AOL Radio service audio the AOL Ultravox streaming protocol and the AAC decoding. The code fragment shown below indicates what is involved in starting up a service client such as the AOL Radio client. Figure 3. AOL Radio Channel Listing The AOL Radio service namespace is accessed via the ERVICE_TYPE constant. The application extends the functionality present in the service invocation framework itself, which discovers the AOL Radio service, and provides an application handle to the service. At that point, the application may, for example, retrieve a list of channels from the radio service, which arrive in an XML document. The application itself does not need to know that the request for a channel listing went out across a network, or that the service required authentication before releasing a channel listing. public class RadioClient extends com.nokia.web_service.baseclient { // the requested service type is for the AOL Radio service private static tring ERVICE_TYPE = ; // other code public RadioClient() throws com.nokia.web_service.remoteexception { super(ervice_type) ; // inherit the base client functionality this.parser = new Parser( this, getxmlreader()) ; // get an XML parser this.interface = new RadioUI(this) ; // create a new user interface this.getradiochannels() ; // get the list of radio channels available from the radio service } } // more code 5

6 ummary Mobile-based services As mentioned above, Nokia sees the mobile phone not only as a eb ervice Consumer (C), but also as a eb ervice Provider (P). Thus, it will be possible for a mobile phone to host services that may be offered to other services on the network. In the example below, the mobile phone is hosting services that offers the device location, and voluntary profile information describing the user of the device. In step 1 of Figure 4, the device requests a portal page, and advertises to the portal that it provides Liberty ID-I location and personal profile services where the user s information is stored. The portal service is is not an identitybased service, just one that can be personalized according to identityrelated information, such as gender, etc. The portal now knows that the device is offering a personal profile service and asks, via a web-service request, for the user s gender and location. In step 3, the profile service hosted by the device provides the location and gender attributes to the portal and in return (step 4), the user is treated to a personalized front page, based on gender and location. Network service providers can now provide privacy-protected, personalized services to mobile phone users. Nokia believes that a service-oriented architecture brings great benefits to mobile phone users, mobile network service providers and software developers. e see the mobile phone as a full participant in a network of services, both as a client for exciting new services such as AOL Radio, and a provider of services hosted on the device itself. All of this will be made possible by the existence of an application development framework that fully supports XML, eb services and the associated standard specifications for running services, such as the ID-FF and ID-F suites specified by the Liberty Alliance, and -ecurity specified by OAI. Figure 4. A Mobile Personal Profi le ervice 1. HTTP GET URL_FOR_FUNKYPLAZA PAO: LOCATION, ID-PP 2. HTTP 200 OK, OAP ENV:PAO:REQUET: LOCATION, ID-PP responseconsumerurl 3. HTTP POT responseconsumerurl, OAP ENV:PAO:REPONE:LOCATION, X, Y, Z ID-PP, Male 4. HTTP REPONE [Provides Location and Profile enhanced content originally requested in step 1] tandard Liberty ervice Provider DK toolkit 6

7 Ultravox is a trademark of America Online Inc. The contents of this document are copyright 2004 Nokia. All rights reserved. A license is hereby granted to download and print a copy of this document for personal use only. No other license to any other intellectual property rights is granted herein. Unless expressly permitted herein, reproduction, transfer, distribution or storage of part or all of the contents in any form without the prior written permission of Nokia is prohibited. The content of this document is provided as is, without warranties of any kind with regards its accuracy or reliability, and specifically excluding all implied warranties, for example of merchantability, fitness for purpose, title and non-infringement. In no event shall Nokia be liable for any special, indirect or consequential damages, or any damages whatsoever resulting form loss of use, data or profits, arising out of or in connection with the use of the document. Nokia reserves the right to revise the document or withdraw it at any time without prior notice. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation. Nokia product names are either trademarks or registered trademarks of Nokia. Other product and company names mentioned herein may be trademarks or trade names of their respective owners. 7

8 0304 Indivisual Copyright 2004 Nokia. All rights reserved. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation. Other product and company names mentioned herein may be trademarks or trade names of their respective owners. Products are subject to change without notice. NOKIA CORPORATION Technology Platforms P.O. Box 100 FIN NOKIA GROUP, Finland Phone: +358 (0)

COPYRIGHTED MATERIAL. Chapter 1: Introduction

COPYRIGHTED MATERIAL. Chapter 1: Introduction Chapter 1: Introduction 1 Chapter 1: Introduction A major industry trend is evident in the deployment of Web services technology to enhance existing services and to create new and innovative services.

More information

9243063 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9243063 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9243063 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Backing up data Nokia 9300i Backing up data Legal Notice Copyright Nokia 2005. All rights

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Legal Notice Copyright Nokia 2006. All rights reserved. Reproduction, transfer, distribution

More information

SUPPORT GUIDE FOR EMAIL SETTINGS IN NOKIA 6600 IMAGING PHONE

SUPPORT GUIDE FOR EMAIL SETTINGS IN NOKIA 6600 IMAGING PHONE SUPPORT GUIDE FOR EMAIL SETTINGS IN NOKIA 6600 IMAGING PHONE Contents 1. INTRODUCTION...1 2. EMAIL ACCOUNT SETTINGS ON PHONE...1 3. EMAIL ACCOUNT SETTINGS WITH PC SUITE...4 Legal Notice Copyright 2003

More information

Nokia E90 Communicator E-mail support

Nokia E90 Communicator E-mail support Nokia E90 Communicator Nokia E90 Communicator Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia Corporation. Other product and company

More information

Application Note. Gemalto s SA Server and OpenLDAP

Application Note. Gemalto s SA Server and OpenLDAP Application Note Gemalto s SA Server and OpenLDAP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Quick Guide to Using your Nokia Phone with Windows 95 Fax - Exchange for Windows 95 or Windows Messaging for Windows 95

Quick Guide to Using your Nokia Phone with Windows 95 Fax - Exchange for Windows 95 or Windows Messaging for Windows 95 Nokia 88xx series and 8210 03.02.00 This Quick Guide is a generic guide for all Nokia 88xx series and 8210 phones. When you are asked to select the modem you will see Nokia ****, please select one of the

More information

Nokia Corporation Nokia Mobile Phones P.O. Box 100 FIN-00045 Nokia Group, Finland Tel. +358 7180 08000 Telefax +358 7180 34016 www.nokia.com/m2m Machine-to-Machine - Real Opportunity in Wireless Data Business

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Service-Oriented Architectures

Service-Oriented Architectures Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems

More information

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Intelligent Application Gateway with SA server using AD password and OTP Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

Java Web Services Training

Java Web Services Training Java Web Services Training Duration: 5 days Class Overview A comprehensive look at the state of the art in developing interoperable web services on the Java EE 6 platform. Students learn the key standards

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1.6) E14294-06 November 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include:

More information

JVA-561. Developing SOAP Web Services in Java

JVA-561. Developing SOAP Web Services in Java JVA-561. Developing SOAP Web Services in Java Version 2.2 A comprehensive look at the state of the art in developing interoperable web services on the Java EE 6 platform. Students learn the key standards

More information

Internet Protocol Support Profile

Internet Protocol Support Profile Bluetooth Specification Date 2014-Dec-16 Revision Group Prepared By Internet WG Feedback Email int-main@bluetooth.org Abstract: This Profile Specification proposes the support of exchanging IPv6 packets

More information

E-Business Suite Oracle SOA Suite Integration Options

E-Business Suite Oracle SOA Suite Integration Options Specialized. Recognized. Preferred. The right partner makes all the difference. E-Business Suite Oracle SOA Suite Integration Options By: Abhay Kumar AST Corporation March 17, 2014 Applications Software

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

SUPPORT GUIDE FOR. NOKIA MODEM DRIVER AND DIAL-UP for the Nokia 610. Copyright Nokia. All rights reserved Issue 0.4

SUPPORT GUIDE FOR. NOKIA MODEM DRIVER AND DIAL-UP for the Nokia 610. Copyright Nokia. All rights reserved Issue 0.4 SUPPORT GUIDE FOR NOKIA MODEM DRIVER AND DIAL-UP for the Nokia 610 Copyright Nokia. All rights reserved Issue 0.4 Contents 1. INTRODUCTION...1 2. SYSTEM REQUIREMENTS...1 3. INSTALLING THE NOKIA 610 MODEM

More information

WEB SERVICES. Revised 9/29/2015

WEB SERVICES. Revised 9/29/2015 WEB SERVICES Revised 9/29/2015 This Page Intentionally Left Blank Table of Contents Web Services using WebLogic... 1 Developing Web Services on WebSphere... 2 Developing RESTful Services in Java v1.1...

More information

5 things you need to know When choosing a solution for secure radio communications

5 things you need to know When choosing a solution for secure radio communications When choosing a solution for secure radio communications When choosing a solution for secure radio communications 5 things you need to know When choosing a solution for secure radio communications Choosing

More information

LDAP Synchronization Agent Configuration Guide for

LDAP Synchronization Agent Configuration Guide for LDAP Synchronization Agent Configuration Guide for Powerful Authentication Management for Service Providers and Enterprises Version 3.x Authentication Service Delivery Made EASY LDAP Synchronization Agent

More information

An Oracle White Paper August 2010. Oracle OpenSSO Fedlet

An Oracle White Paper August 2010. Oracle OpenSSO Fedlet An Oracle White Paper August 2010 Oracle OpenSSO Fedlet Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

Timing over Packet. Technical Brief

Timing over Packet. Technical Brief Technical Brief 02/08 1. Abstract This paper is designed to help operators understand how to deploy Precision Time Protocol (PTP, or IEEE 1588v2) in mobile networks for the purpose of synchronizing base

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

ORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility

ORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility ORACLE MOBILE SUITE COMPLETE MOBILE DEVELOPMENT AND DEPLOYMENT PLATFORM KEY FEATURES Productivity boosting mobile development framework Cross device/os deployment Lightweight and robust enterprise service

More information

CA CPT CICS Programmers Toolkit for TCP/IP r6.1

CA CPT CICS Programmers Toolkit for TCP/IP r6.1 PRODUCT BRIEF: CA CPT CICS PROGRAMMERS TOOLKIT FOR TCP/IP CA CPT CICS Programmers Toolkit for TCP/IP r6.1 CA CPT CICS PROGRAMMERS' TOOLKIT FOR TCP/IP PROVIDES CICS PROGRAMMERS WITH AN EASY TO USE SET OF

More information

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise

More information

ITS. Java WebService. ITS Data-Solutions Pvt Ltd BENEFITS OF ATTENDANCE:

ITS. Java WebService. ITS Data-Solutions Pvt Ltd BENEFITS OF ATTENDANCE: Java WebService BENEFITS OF ATTENDANCE: PREREQUISITES: Upon completion of this course, students will be able to: Describe the interoperable web services architecture, including the roles of SOAP and WSDL.

More information

Log Insight Manager. Deployment Guide

Log Insight Manager. Deployment Guide Log Insight Manager Deployment Guide VERSION: 3.0 UPDATED: OCTOBER 2015 Copyright Notices Copyright 2002-2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott

More information

How Configuration Management Tools Address the Challenges of Configuration Management

How Configuration Management Tools Address the Challenges of Configuration Management Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don

More information

Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer

Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer Installing the BlackBerry Enterprise Server Management Software on an administrator or Introduction Some administrators want to install their administrative tools on their own Windows 2000 computer. This

More information

IT@Intel. Improving Security and Productivity through Federation and Single Sign-on

IT@Intel. Improving Security and Productivity through Federation and Single Sign-on White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing

More information

Application Note. Citrix Presentation Server through a Citrix Web Interface with OTP only

Application Note. Citrix Presentation Server through a Citrix Web Interface with OTP only Application Note Citrix Presentation Server through a Citrix Web Interface with OTP only ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

Developing Java Web Services

Developing Java Web Services Page 1 of 5 Developing Java Web Services Hands On 35 Hours Online 5 Days In-Classroom A comprehensive look at the state of the art in developing interoperable web services on the Java EE platform. Students

More information

Using DeployR to Solve the R Integration Problem

Using DeployR to Solve the R Integration Problem DEPLOYR WHITE PAPER Using DeployR to olve the R Integration Problem By the Revolution Analytics DeployR Team March 2015 Introduction Organizations use analytics to empower decision making, often in real

More information

CA Mobile Device Management 2014 Q1 Getting Started

CA Mobile Device Management 2014 Q1 Getting Started CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

White paper. Mobile broadband with HSPA and LTE capacity and cost aspects

White paper. Mobile broadband with HSPA and LTE capacity and cost aspects White paper Mobile broadband with HSPA and LTE capacity and cost aspects Contents 3 Radio capacity of mobile broadband 7 The cost of mobile broadband capacity 10 Summary 11 Abbreviations The latest generation

More information

Nokia E90 Communicator Backing up data

Nokia E90 Communicator Backing up data Backing up data Nokia E90 Communicator Backing up data Nokia E90 Communicator Backing up data Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Create a single 360 view of data Red Hat JBoss Data Virtualization consolidates master and transactional data

Create a single 360 view of data Red Hat JBoss Data Virtualization consolidates master and transactional data Whitepaper Create a single 360 view of Red Hat JBoss Data Virtualization consolidates master and transactional Red Hat JBoss Data Virtualization can play diverse roles in a master management initiative,

More information

IVR Quick Start Guide. Getting off the ground with IVR

IVR Quick Start Guide. Getting off the ground with IVR IVR Quick Start Guide Getting off the ground with IVR Copyright and Trademarks Copyright 2007-2010 OpenMarket. All rights reserved. No part of this publication may be reproduced, distributed, electronically

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway

The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

RealShot Manager Compression Server software

RealShot Manager Compression Server software RealShot Manager Compression Server software User Guide Software Version 1.0 RealShot Manager 2004 Sony Corporation Copyright Notice 2004 Sony Corporation. All rights reserved. This manual may not be reproduced,

More information

Self Help Guides. Setup Exchange Email with Outlook

Self Help Guides. Setup Exchange Email with Outlook Self Help Guides Setup Exchange Email with Outlook Setting up Exchange Email Connection This document is to be used as a guide to setting up an Exchange Email connection with Outlook; 1. Microsoft Outlook

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

Integrate Cisco IronPort Web Security Appliance (WSA)

Integrate Cisco IronPort Web Security Appliance (WSA) Integrate Cisco IronPort Web Security Appliance (WSA) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Getting started with API testing

Getting started with API testing Technical white paper Getting started with API testing Test all layers of your composite applications, not just the GUI Table of contents Executive summary... 3 Introduction... 3 Who should read this document?...

More information

DLNA Guidelines March 2014

DLNA Guidelines March 2014 DLNA Guidelines March 2014 Part 7: Authentication An Industry Guide for Building Interoperable Platforms, Devices, and Applications Fulfilling the promise of the digital home requires a cross-industry

More information

SUPPORT GUIDE FOR USING WLAN AND UPNP

SUPPORT GUIDE FOR USING WLAN AND UPNP SUPPORT GUIDE FOR USING WLAN AND UPNP Contents 1. INTRODUCTION...1 2. WLAN ACCOUNT SETTINGS ON PHONE...1 2.1 WLAN ACCESS POINT SETTINGS (NON SECURE WLAN NETWORKS)...1 2.2 WLAN ACCESS POINT SETTINGS (SECURE

More information

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned

More information

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Configuring connection settings Nokia E50 Configuring connection settings Legal Notice Copyright

More information

Fundamentals of Web Programming a

Fundamentals of Web Programming a Fundamentals of Web Programming a Universal Description, Discovery, and Integration Teodor Rus rus@cs.uiowa.edu The University of Iowa, Department of Computer Science a Copyright 2009 Teodor Rus. These

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition

WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition WhatsUpGold v14.2 Getting Started with WhatsUp Gold MSP Edition Getting Started with MSP Edition In This Guide About WhatsUp Gold MSP Edition... 1 User interfaces... 2 About the MSP Edition reporting capabilities...

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?

More information

Self Help Guides. Create a New User in a Domain

Self Help Guides. Create a New User in a Domain Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,

More information

Installing the IPSecuritas IPSec Client

Installing the IPSecuritas IPSec Client Mac Install Installing the IPSecuritas IPSec Client IPSecuritasMac201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

Getting Started with Apple Pay on the Authorize.Net Platform

Getting Started with Apple Pay on the Authorize.Net Platform Title Page Getting Started with Apple Pay on the Authorize.Net Platform September 2014 Authorize.Net Developer Support http://developer.authorize.net Authorize.Net LLC 082007 Ver.2.0 Authorize.Net LLC

More information

An Oracle White Paper November 2009. Oracle Primavera P6 EPPM Integrations with Web Services and Events

An Oracle White Paper November 2009. Oracle Primavera P6 EPPM Integrations with Web Services and Events An Oracle White Paper November 2009 Oracle Primavera P6 EPPM Integrations with Web Services and Events 1 INTRODUCTION Primavera Web Services is an integration technology that extends P6 functionality and

More information

docs.rackspace.com/api

docs.rackspace.com/api docs.rackspace.com/api Rackspace Cloud Backup Release (2015-09-09) 2015 Rackspace US, Inc. This document is intended for software developers who are interested in developing applications using the Rackspace

More information

XML Processing and Web Services. Chapter 17

XML Processing and Web Services. Chapter 17 XML Processing and Web Services Chapter 17 Textbook to be published by Pearson Ed 2015 in early Pearson 2014 Fundamentals of http://www.funwebdev.com Web Development Objectives 1 XML Overview 2 XML Processing

More information

Orchestrate IT Process with an Integrated Workflow Management

Orchestrate IT Process with an Integrated Workflow Management Orchestrate IT Process with an Integrated Workflow Management Table of Contents Introduction...3 What is Workload Automation?...4 Workflow...4 Workload...5 Combining Workflow and Workload...5 CA Workload

More information

EMC DOCUMENT SCIENCES XPRESSION ENTERPRISE INTEGRATION

EMC DOCUMENT SCIENCES XPRESSION ENTERPRISE INTEGRATION White Paper EMC DOCUMENT SCIENCES XPRESSION ENTERPRISE INTEGRATION How xpression integrates with applications, content, data, web, and distribution systems Abstract This white paper describes the EMC Document

More information

SA Server 2.0. Application Note : Evidian SafeKit 7.0.4, Failover

SA Server 2.0. Application Note : Evidian SafeKit 7.0.4, Failover SA Server 2.0 Application Note : Evidian SafeKit 7.0.4, Failover ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries

More information

Configuring Microsoft Internet Information Service (IIS6 & IIS7)

Configuring Microsoft Internet Information Service (IIS6 & IIS7) Configuring Microsoft Internet Information Service (IIS6 & IIS7) Configuring Microsoft Internet Information Service (IIS6 & IIS7) Guide Last revised: June 25, 2012 Copyright 2012 Nexent Innovations Inc.

More information

Organized, Hybridized Network Monitoring

Organized, Hybridized Network Monitoring Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically

More information

Novell Identity Manager

Novell Identity Manager AUTHORIZED DOCUMENTATION Manual Task Service Driver Implementation Guide Novell Identity Manager 4.0.1 April 15, 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with

More information

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All

More information

Steps to Migrating to a Private Cloud

Steps to Migrating to a Private Cloud Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime

More information

Nokia 9210i/9290 Communicators and PersonalJava TM Application Development

Nokia 9210i/9290 Communicators and PersonalJava TM Application Development Nokia 9210i/9290 Communicators and Personal TM Application Development 05-03-2002 Nokia 9210i/9290 Communicators and PersonalTM Application Development Table of contents 1. DIFFERENT JAVA TECHNOLOGIES...

More information

PHP Integration Kit. Version 2.5.1. User Guide

PHP Integration Kit. Version 2.5.1. User Guide PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001

More information

CompleteView Admin Console User s Manual. Version 3.8

CompleteView Admin Console User s Manual. Version 3.8 CompleteView Admin Console User s Manual Version 3.8 Table Of Contents Introduction... 1 End User License Agreement... 1 Overview... 2 Configuration... 3 Starting the Admin Console... 3 Adding a Server...

More information

Cisco TelePresence VCR Converter 1.0(1.8)

Cisco TelePresence VCR Converter 1.0(1.8) Cisco TelePresence VCR Converter 1.0(1.8) Software release notes D14725.02 February 2011 Contents Contents Document revision history... 3 Introduction... 4 New features in version 1.0(1.8)... 5 Convert

More information

Directory Integration in LANDesk Management Suite

Directory Integration in LANDesk Management Suite Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer

More information

Nokia E65 Internet calls

Nokia E65 Internet calls Nokia E65 Internet calls Nokia E65 Internet calls Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document

More information

ORACLE ADF MOBILE DATA SHEET

ORACLE ADF MOBILE DATA SHEET ORACLE ADF MOBILE DATA SHEET PRODUCTIVE ENTERPRISE MOBILE APPLICATIONS DEVELOPMENT KEY FEATURES Visual and declarative development Java technology enables cross-platform business logic Mobile optimized

More information

Administration Challenges

Administration Challenges The Essentials Series: Enterprise Identity and Access Management Administration Challenges sponsored by by Richard Siddaway Administration Challenges...1 Heterogeneous Environments...1 Multiple Directories...1

More information

Placing the BlackBerry Enterprise Server for Microsoft Exchange in a demilitarized zone

Placing the BlackBerry Enterprise Server for Microsoft Exchange in a demilitarized zone Placing the for Originally posted: June 2002 Affected software versions BlackBerry Enterprise version 2.0 for Microsoft Exchange version 2.1 for Microsoft Exchange version 3.5 for Microsoft Exchange Summary

More information

Exchange 2013 Server Architecture: Part 1. Jeff Mealiffe Senior Program Manager Exchange Product Group

Exchange 2013 Server Architecture: Part 1. Jeff Mealiffe Senior Program Manager Exchange Product Group Exchange 2013 Server Architecture: Part 1 Jeff Mealiffe Senior Program Manager Exchange Product Group Agenda Part 1 Overview of the new Architecture The Client Access server role Part 2 The Mailbox server

More information

How To Build A Connector On A Website (For A Nonprogrammer)

How To Build A Connector On A Website (For A Nonprogrammer) Index Data's MasterKey Connect Product Description MasterKey Connect is an innovative technology that makes it easy to automate access to services on the web. It allows nonprogrammers to create 'connectors'

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

Lab 05: Deploying Microsoft Office Web Apps Server

Lab 05: Deploying Microsoft Office Web Apps Server Lab 05: Deploying Microsoft Office Web Apps Server DISCLAIMER 2013 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Hyper-V, Internet Explorer, Lync, PowerPoint, Silverlight, SQL

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have

More information

Microsoft and Novell - A Case Study in Identity Federation

Microsoft and Novell - A Case Study in Identity Federation Boosting interoperability and collaboration across mixedtechnology environments Standards-based identity federation solutions from Microsoft and Novell May 2009 Executive summary Despite remarkable gains

More information