PowerCenter Real-Time Development
|
|
- Elvin Collins
- 7 years ago
- Views:
Transcription
1 PowerCenter Real-Time Development Brian Bunn, Project Manager Serco Jay Moles, Sr. Informatica Designer Serco Tom Bennett, Sr. Consultant Informatica 1
2 Agenda Overview of PowerCenter Web Services Error Handling Performance Tuning Web Services Security Implementation Case Study SERCO 2
3 Overview of Informatica PowerCenter Web Services 3
4 PowerCenter Web Services Hub Application Service Client application gateway to PowerCenter Domain Batch Web Services Integration Service Access Repository Metadata Access Real-Time Web Services Exposes Workflows as Web Services PowerCenter Web Services Provider 4
5 Informatica PowerCenter Web Services Provider Architecture 5
6 Informatica PowerCenter Web Service Consumer Allow Integration with Web Services 3rd Party Provider Integration Sources URL to Web Service WSDL File UDDI 6
7 Error Handling 7
8 SOAP Fault Messages FaultCode FaultString Describes the error FaultFactor (Optional) URI of the host generating the error Detail (Optional) Describes the cause of the error 8
9 Error Handling No SOAP Faults: Capture Source 9
10 Performance Tuning/Scalability 10
11 Performance Tuning Parameters to tune at the Workflow 11
12 Web Services Performance Tuning Parameters to tune at the Session level Idle Time Message Count Reader Time Limit 12
13 Web Services Scalability Load Balancer Associate multiple repositories with a Web Services Hub Associate a repository with multiple Web Services Hubs Run multiple instances of a web service workflow Run web service sessions or workflows on a grid 13
14 Web Services Security 14
15 Security Use Cases Protect a web service from unauthorized usage (by requiring username and password) Manage web services as part of overall security policies and integrating with LDAP Prevent a web service from DOS attacks or authentication attacks Allowing a secured web service to be load balanced across multiple WSHs for performance and scalability 15
16 Web Service Hub Security Encryption Encrypts repository information in the configuration file and in responses to Web service clients for login requests Authentication Authenticates Web service clients user name and password Authorization Checks Web service client has execute permission on a folder to run the service 3 16
17 Informatica WS-Security Support for Standard Oasis WS-Security UsernameToken Profile 1.1 Single pass authentication user specifies the appropriate security headers in the actual request to the service Supports multiple WSHs load balancing scenario Username Tokens are associated with a repository within a specific domain and should be applicable to all WSHs associated to that repository Advanced support for encoded passwords Hashed Passwords Digested Passwords Prevent repeated DOS/login attack Support for NONCE values 17
18 WS-Security Feature Details (Part 1) UsernameToken Format: 18
19 WS-Security Feature Details (Part 2) Password Format Supported Clear Text Hashed Same as clear text, but the password is encoded into a base64 20 bit hash value. Two hash algorithms supported: SHA-1 or MD5 Digested A generated password that is of the following formula: BASE64( SHA1_HASH (USERNAME + NONCE + CREATED) ) NONCE random generated value that s valid only once for that specific username token, it s provided to allow someone to specify a one-time only authentication token CREATED timestamp of when the UsernameToken was made in UTC timezone format Example: 2008/08/11T18:06:32.425Z (yyyy/mm/dd T HH:mm:ss.SSS Z) 19
20 WS-Security Feature Details (Part 3) Custom Property for NONCE and CREATED NonceExpirationTime custom property that can be set at the WSH to determine how long the hub should hold down to a specific NONCE value of a UsernameToken. By default this value is set to 300 seconds (5 minutes) If a request is made containing the same NONCE value outside of this timeframe, the request will fail. CreatedFreshnessPeriod custom property that determines how long a user has between the time the first request is made using the CREATED value and the next. By default this value is set to 300 seconds (5 minutes) If a request is made before this timestamp or after the expiration time following the timestamp, the request will fail. These two customer properties can be used independently of each other or together to ensure greater security. 20
21 Case Study : Implementation Architecture 21
22 Case Study: Architecture 22
23 Web Services Throughput (examples) Production Environment (Multiple Servers) RowsPerSecond Overall numbers range between 100 and 1000 rps If a request results in >10K rows, some customers have timed-out. RequestsPerMinute Overall numbers range between 10 and 100. If a request takes over 20 minutes, some customers have timed-out. 23
24 The ETL Behind-the-Scene Production Web-Service Broadcast ing Data Filtered Data SOAP request has parameters for result set SQL Transformation the data source can be dynamic [access/name] Sequence Generator Transformation XML output has multiple rows! 24
25 Web Services Latency (examples) Single Server Web-Service Initialization it takes the WSH from 3 to 11 seconds to prepare the ETL. Processing it then takes the WSH about 1 second to start processing the ETL. At this point, the response time depends on the processing. Multiple Server Web-Service Initialization it takes the WSH from 3 to 11 seconds to prepare the ETL Invocation it takes the WSH about 3 seconds to prepare the SOAP Request and invoke the internal web-service. Processing it then takes the internal WSH from 3 to 11 seconds to prepare the ETL, then the response time will depend on the internal processing. 25
26 Timeout/Fault Handling (examples) Input Web-Services Source Validation ETL tests/verifies content of the request Output Web-Services Target Response ETL always sends same formatted output, either a status message or a pre-determined value Processing depends on WSConsumer Application Connection Timeout property set for internal WSH call Will wait for a connection to internal WSH indefinitely. Will wait for a response from internal WSH indefinitely. These two properties prevent a forced timeout from the WSH. 26
27 Example Our Hello! Simple Web-Service No input fields in SOAP Request, static text in SOAP response Validates customer s connection via SSL Hello! 27
28 Example Our Addition Two-Step Web-Service Two input fields in SOAP Request, sum returned in SOAP response Validates customer s request will invoke internal web-service(s) 28
29 SSL Configuration 29
30 SSL Configuration Setting Up SSL Keystore for Web Services Hub Use the keytool utility. You generate a keystore, generate a signature request from it, have it signed by an authority, then install the signed file into your keystore. Default keystore generated by the PowerCenter installation process can be used for WSH, but be aware it is self-signed. Truststore for Web Services Hub Add customers certificates to the ca-bundle.crt files. Use openssl utilities to convert format if necessary. PEM format is required to add certificate to the ca-bundle.crt files. 30
31 SSL Configuration (examples) Creating the Keystore for Web Services Hub Example of the keytool utility. Prompts in black text, inputs in red. 31
32 SSL Configuration (examples) Creating the Signature Request File Example of the keytool utility using the created keystore. Have request signed by your Authority Independent firms: VeriSign. Install the Signed Response File Example of the keytool utility for the keystore and response. 32
33 SSL Configuration (examples) Installing the Customer Certificate Customer certificates need to be in PEM format. If certificate is not PEM, convert it using openssl utility. If customer s certificate file is in a binary format, DER for example, convert it. Add customer certificate text to the end of the ca-bundle.crt files. Add PEM Data: line before certificate text. Entry will look like this: File in PowerCenter Installation Directory, sub-folders server/bin and services/shared/bin both! 33
34 SSL Configuration (examples) Using the Keystore in the Web Services Hub Define the WSH service to use your signed-keystore. URLScheme must be set to either HTTPS or HTTPandHTTPS for the Web Services Hub to utilize SSL and access the keystore. Enter the keystore name and password used to create your keystore. 34
35 Tips, Best-Practices, etc. SOAP Request/Response: WSDL or Manual? Inputs XML of the in-bound request: one or multiple rows? Outputs XML of the out-bound response: one or multiple rows? Processing Initially, set up a pass-thru with an exp transformation and just the fields coming in and going out of the web-service. Basic static test version. Then, add bits and pieces. TESTING your Web-Services WSH and TryIt! ability to run web-service, but limited. soapui open-source tool (FREE!) that expands testing capabilities. Basically a SOAP Client GUI. 35
36 Informatica Velocity Methodology Velocity is the blueprint for delivering efficient and successful Informatica solutions that solve business problems. New Website New search capability Filtering/viewing content by project type project phase or other tags New accelerator tools Hot links between the articles Access at: mysupport.informatica.com Visit the Informatica Pavilion at the Technology and Solutions Fair for more details. Check out more than 100 new articles! 36
37 Questions? 37
38 Stay In Touch! LinkedIn Informatica Power Center Real-Time 38
39 Thank You 39
How to Implement Transport Layer Security in PowerCenter Web Services
How to Implement Transport Layer Security in PowerCenter Web Services 2008 Informatica Corporation Table of Contents Introduction... 2 Security in PowerCenter Web Services... 3 Step 1. Create the Keystore
More informationHow to Create Keystore and Truststore Files for Secure Communication in the Informatica Domain
How to Create Keystore and Truststore Files for Secure Communication in the Informatica Domain 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any
More informatione-filing Secure Web Service User Manual
e-filing Secure Web Service User Manual Page1 CONTENTS 1 BULK ITR... 6 2 BULK PAN VERIFICATION... 9 3 GET ITR-V BY TOKEN NUMBER... 13 4 GET ITR-V BY ACKNOWLEDGMENT NUMBER... 16 5 GET RETURN STATUS... 19
More informationCICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282
Web Service Security Anthony Papageorgiou IBM Development March 13, 2012 Session: 10282 Agenda Web Service Support Overview Security Basics and Terminology Pipeline Security Overview Identity Encryption
More informationSecure Communication Requirements
Secure Communication Requirements 1993-2016 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationSecure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
More informationWebService Security. A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol
WebService Security A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol Jam Hamidi Senior Technical Analyst BCcampus, Victoria, British Columbia,
More informationWeb Services Provider Guide
Web Services Provider Guide Informatica PowerCenter (Version 8.6.1) Informatica PowerCenter Web Services Provider Guide Version 8.6.1 May 2009 Copyright (c) 1998 2009 Informatica Corporation. All rights
More information17 March 2013 NIEM Web Services API Version 1.0 URI: http://reference.niem.gov/niem/specification/web-services-api/1.0/
17 March 2013 NIEM Web Serv vices API Version 1.0 URI: http://reference.niem.gov/niem/specification/web-services-api/1.0/ i Change History No. Date Reference: All, Page, Table, Figure, Paragraph A = Add.
More informationConfiguring ADFS 3.0 to Communicate with WhosOnLocation SAML
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML --------------------------------------------------------------------------------------------------------------------------- Contents Overview...
More informationvcommander will use SSL and session-based authentication to secure REST web services.
vcommander REST API Draft Proposal v1.1 1. Client Authentication vcommander will use SSL and session-based authentication to secure REST web services. 1. All REST API calls must take place over HTTPS 2.
More informationEnabling SSO between Cognos 8 and WebSphere Portal
Guideline Enabling SSO between Cognos 8 and WebSphere Portal Product(s): Cognos 8 Area of Interest: Security Enabling SSO between Cognos 8 and WebSphere Portal 2 Copyright Your use of this document is
More informationSmart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
More informationSecure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements
More informationEnabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal
Guideline Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal Product(s): IBM Cognos 8 BI Area of Interest: Security Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
More informationUse Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
More informationReal-Time Connectivity Specifications For. 270/271 and 276/277 Inquiry Transactions. United Concordia Dental (UCD)
Real-Time Connectivity Specifications For 270/271 and 276/277 Inquiry Transactions United Concordia Dental (UCD) May 15, 2015 1 Contents 1. Overview 2. Trading Partner Requirements 3. Model SOAP Messages
More informationCreating a Secure Web Service In Informatica Data Services
Creating a Secure Web Service In Informatica Data Services 2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording
More informationFile Transfer Service (Batch SOAP) User Guide. A Guide to Submitting batches through emedny FTS
File Transfer Service (Batch SOAP) User Guide A Guide to Submitting batches through emedny FTS June 1, 2013 TABLE OF CONTENTS TABLE OF CONTENTS 1 Introduction... 4 2 Requirements... 5 2.1 Exchange mailboxes...
More informationWeb Service Facade for PHP5. Andreas Meyer, Sebastian Böttner, Stefan Marr
Web Service Facade for PHP5 Andreas Meyer, Sebastian Böttner, Stefan Marr Agenda Objectives and Status Architecture Framework Features WSD Generator PHP5 eflection API Security Aspects used approach planned
More informationHow to Implement Two-Way SSL Authentication in a Web Service
How to Implement Two-Way SSL Authentication in a Web Service 2011 Informatica Abstract You can configure two-way SSL authentication between a web service client and a web service provider. This article
More informationAuthentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
More informationContents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
Post Installation Guide for Primavera Contract Management 14.1 July 2014 Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
More informationA Signing Proxy for Web Services Security. Dr. Ingo Melzer RIC/ED
A Signing Proxy for Web Services Security Dr. Ingo Melzer RIC/ED What is a Web Service? Infrastructure Web Service I. Melzer -- A Signing Proxy for Web Services Security 2 What is a Web Service? basic
More informationAquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
More informationUnited Concordia (UCD) Real Time Claim Submission & Adjudication Connectivity Specifications
United Concordia (UCD) Real Time Claim Submission & Adjudication Connectivity Specifications May 15, 2015 Contents 1. Real Time Overview 2. Requirements 3. SOAP Messages 4. SOAP Faults 5. CORE-Compliant
More informationKentico CMS security facts
Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the
More informationEnabling Single-Sign-On on WebSphere Portal in IBM Cognos ReportNet
Guideline Enabling Single-Sign-On on WebSphere Portal in IBM Cognos ReportNet Product(s): IBM Cognos ReportNet Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
More informationUsing Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
More informationAxway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
More informationSOA Software: Troubleshooting Guide for Policy Manager for DataPower
SOA Software: Troubleshooting Guide for Policy Manager for DataPower Troubleshooting Guide for Policy Manager for DataPower 1 SOA Software Policy Manager Troubleshooting Guide for Policy Manager for DataPower
More informationOpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.
OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
More informationDesign Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
More informationCONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7
CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2 Author: Foster Moore Date: 20 September 2011 Document Version: 1.7 Level 6, Durham House, 22 Durham Street West PO Box 106857, Auckland City Post Shop, Auckland
More information000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0
Easy CramBible Lab 000-284 Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 ** Single-user License ** This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationUsing web service technologies for incremental, real-time data transfers from EDC to SAS
Paper AD08 Using web service technologies for incremental, real-time data transfers from EDC to SAS Andrew Newbigging, Medidata Solutions Worldwide, London, UK ABSTRACT Data collected in EDC systems is
More informationChapter 7 Managing Users, Authentication, and Certificates
Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,
More informationCertificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More information(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING a Class IIIc SSL Certificate using BEA Weblogic V ERSION 1.0 Page 1 of 8 Procedure for
More informationInstalling Digital Certificates for Server Authentication SSL on. BEA WebLogic 8.1
Installing Digital Certificates for Server Authentication SSL on BEA WebLogic 8.1 Installing Digital Certificates for Server Authentication SSL You use utilities provided with the BEA WebLogic server software
More informationSmart Card Authentication Client. Administrator's Guide
Smart Card Authentication Client Administrator's Guide April 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Smart Card Authentication Client...4 Configuring printer settings for use
More informationKMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon
KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon KMx Enterprise includes two api s for integrating user accounts with an external directory of employee or other
More informationSSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service
Paper SAS1541-2015 SSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service Heesun Park and Jerome Hughes, SAS Institute Inc., Cary, NC ABSTRACT
More informationConfiguring IBM WebSphere Application Server 7 for Secure Sockets Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Web
Configuring IBM WebSphere Application Server 7 for Secure Sockets Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Web Applications Configuring IBM WebSphere 7 for SSL and Client-Certificate
More informationConfiguring Email Notification for Business Glossary
Configuring Email Notification for Business Glossary 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording
More informationApplication Note AN1502
Application Note AN1502 Generate SSL Certificates PowerPanel Business Edition User s Manual Rev. 1 2015/08/21 Rev. 13 2013/07/26 Content Generating SSL Certificates Overview... 3 Obtain a SSL Certificate
More informationCriteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
More informationCache Configuration Reference
Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...
More informationTechnik und Informatik. SOAP Security. Prof. Dr. Eric Dubuis Berner Fachhochschule Biel. Version April 11, 2012
SOAP Security Prof. Dr. Eric Dubuis Berner Fachhochschule Biel Version April 11, 2012 Overview Motivation Transport security versus SOAP Security WS-Security stack overview Structure of secured SOAP messages
More informationSnapLogic Sidekick Guide
SnapLogic Sidekick Guide Document Release: October 2013 SnapLogic, Inc. 2 West 5th Avenue, Fourth Floor San Mateo, California 94402 U.S.A. www.snaplogic.com Copyright Information 2011-2013 SnapLogic, Inc.
More informationJVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
More informationImageNow Message Agent
ImageNow Message Agent Installation and Setup Guide ImageNow Version: 6.7.x Written by: Product Documentation, R&D Date: November 2013 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow,
More informationNEMSIS v3 Web Services Guide
NEMSIS TAC Whitepaper NEMSIS v3 Web Services Guide Date November 2, 2011 November 14, 2011 (FINAL) April 24, 2012 (Updated) May 09, 2012 (Updated) August 27, 2012 (updated) September 13, 2012 (updated)
More informationCertificate technology on Pulse Secure Access
Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client
More informationCLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
More informationUsing Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
More informationExamples with.net & PHP. Martin Haagen, QlikTech, Systems Manager; CRM @sehaagen
Integrations using Web Services Examples with.net & PHP Martin Haagen, QlikTech, Systems Manager; CRM @sehaagen Martin Haagen Systems Manager; CRM @sehaagen Introduction Martin Haagen, QlikTech What We
More informationCertificate technology on Junos Pulse Secure Access
Certificate technology on Junos Pulse Secure Access How-to Introduction:... 1 Creating a Certificate signing request (CSR):... 1 Import Intermediate CAs: 3 Using Trusted Client CA on Juno Pulse Secure
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject
More informationSpectrum Technology Platform. Version 9.0. Administration Guide
Spectrum Technology Platform Version 9.0 Administration Guide Contents Chapter 1: Getting Started...7 Starting and Stopping the Server...8 Installing the Client Tools...8 Starting the Client Tools...9
More informationWebSphere Application Server security auditing
Copyright IBM Corporation 2008 All rights reserved IBM WebSphere Application Server V7 LAB EXERCISE WebSphere Application Server security auditing What this exercise is about... 1 Lab requirements... 1
More informationAgenda. How to configure
dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
More informationConfiguring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.
Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.3 Table of Contents Overview... 1 Configuring One-Way Secure Socket
More informationUsing LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
More informationHireRight Integration Platform and API: HireRight Connect. Third Party Developer Guide
HireRight Integration Platform and API: HireRight Connect Third Party Developer Guide Table of Contents INTRODUCTION... 3 SECURITY... 3 LOGICAL VIEW OF API ARCHITECTURE... 5 NETWORK VIEW OF API ARCHITECTURE...
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationHow To Secure An Emr-Link System Architecture
EMR-Link Security Administration Guide Introduction This guide provides an overview of the security measures built into EMR-Link, and how your organization s security policies can be implemented with these
More informationGroup Management Server User Guide
Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring
More informationSolarWinds Technical Reference
SolarWinds Technical Reference Using SSL Certificates in Web Help Desk Introduction... 1 How WHD Uses SSL... 1 Setting WHD to use HTTPS... 1 Enabling HTTPS and Initializing the Java Keystore... 1 Keys
More informationSoapUI NG Pro and Ready! API Platform Two-Day Training Course Syllabus
SoapUI NG Pro and Ready! API Platform Two-Day Training Course Syllabus Platform architecture Major components o SoapUI NG Pro o LoadUI o Secure o ServiceV Technological foundations o Protocols o Jetty
More informationHTTPS Configuration for SAP Connector
HTTPS Configuration for SAP Connector 1993-2015 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without
More informationAmeritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
More informationIBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
More informationSetup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
More informationIowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup. Version 1.1 Last Updated: April 14, 2014
Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup Version 1.1 Last Updated: April 14, 2014 Table of Contents SSL Certificate Creation... 3 Option 1: Complete the Provider
More informationWeb Services Security with SOAP Security Proxies
Web Services Security with Security Proxies Gerald Brose, PhD Technical Product Manager Xtradyne Technologies AG OMG Web Services Workshop USA 22 April 2003, Philadelphia Web Services Security Risks! Exposure
More informationOracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its
More informationSSL Certificate Generation
SSL Certificate Generation Last updated: 2/09/2014 Table of contents 1 INTRODUCTION...3 2 PROCEDURES...4 2.1 Creation and Installation...4 2.2 Conversion of an existing certificate chain available in a
More informationSonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
More informationStreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
More informationUser Management Interfaces for Earth Observation Services Abstract Test Suite
User Management Interfaces for Earth Observation Services Abstract Test Suite Primary Author Andrew Woolf, STFC Rutherford Appleton Laboratory Revision history Version Contributors Date Changes 0.1 Andrew
More informationUsing EMC Documentum with Adobe LiveCycle ES
Technical Guide Using EMC Documentum with Adobe LiveCycle ES Table of contents 1 Deployment 3 Managing LiveCycle ES development assets in Documentum 5 Developing LiveCycle applications with contents in
More informationWEB SERVICES CERTIFICATE GUIDE
WEB SERVICES CERTIFICATE GUIDE 1. Purpose The purpose of this document is to provide information to internal and external users who want to access an era Web Service using the certificate based authentication
More informationUser's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
More informationPerformance Analysis of webmethods Integrations using Apache JMeter Information Guide for JMeter Adoption
TORRY HARRIS BUSINESS SOLUTIONS Performance Analysis of webmethods Integrations using Apache JMeter Information Guide for JMeter Adoption Ganapathi Nanjappa 4/28/2010 2010 Torry Harris Business Solutions.
More informationActiveVOS Server Architecture. March 2009
ActiveVOS Server Architecture March 2009 Topics ActiveVOS Server Architecture Core Engine, Managers, Expression Languages BPEL4People People Activity WS HT Human Tasks Other Services JMS, REST, POJO,...
More informationSalesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationATWD XML Web Service Handbook
ATWD XML Web Service Version 2.0 This handbook provides technical information to those organisations wishing to utilise the HMRC ATWD XML Web Service. Version 2.0 Issued Page 1 of 41 July 2010 Template
More informationSIP Trunking Manual. For Samsung OfficeServ. Sep 18, 2006 doc v.1.0.2. Sungwoo Lee Senior Engineer
SIP Trunking Manual For Samsung OfficeServ Sep 18, 2006 doc v.1.0.2 Sungwoo Lee Senior Engineer sungwoo1769.lee@samsung.com OfficeServ Network Lab. Telecommunication Systems Division Samsung Electronics
More informationTheater Key Retrieval (TKR)
Theater Key Retrieval (TKR) A System for Automated KDM Delivery 1 Introduction In Digital Cinema, the generation of KDMs is typically a highly automated process. However the delivery of those KDMs to the
More informationOPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
More informationADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
More informationDashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
More informationConfiguring TLS Security for Cloudera Manager
Configuring TLS Security for Cloudera Manager Cloudera, Inc. 220 Portage Avenue Palo Alto, CA 94306 info@cloudera.com US: 1-888-789-1488 Intl: 1-650-362-0488 www.cloudera.com Notice 2010-2012 Cloudera,
More informationSSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014]
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014] Table of Contents 1. CONFIGURING SSL ON ORACLE WEBLOGIC... 1-1 1.1 INTRODUCTION... 1-1 1.2 SETTING UP
More informationDigital Signature Web Service Interface
1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized
More informationPre-configured AS2 Host Quick-Start Guide
Pre-configured AS2 Host Quick-Start Guide Document Version 2.2, October 19, 2004 Copyright 2004 Cleo Communications Refer to the Cleo website at http://www.cleo.com/products/lexihubs.asp for the current
More information