Security Infrastructure for Hybrid Clouds and Cloud Federation
|
|
|
- Todd Elliott
- 10 years ago
- Views:
Transcription
1 Security Infrastructure for Hybrid Clouds and Cloud Federation Dinkar Sitaram, H. L. Phalachandra, Anush Vishwanath, Pramod Ramesh, Meghana Prashanth, Akshay G. Joshi, Anoop R. Desai, Harikrishna Prabhu C. R., Prafulla, Shwetha R., Yashaswini A. Center for Cloud Computing and Big Data, Department of Computer Science PES Institute of Technology Bangalore, India Abstract Hybrid clouds are increasingly becoming important in cloud computing. We see a rapid raise in the demand for a secure infrastructure that would enable sharing of computing resources between multiple hybrid cloud deployments to facilitate accommodation of situations where the demand outstrips supply, load balancing, and other such infrastructure constraints. From the end user perspective, this would also mean that the end users can host applications with their choice of federated cloud provider, as opposed to choosing from a host of global cloud providers on the market. The following paper describes a federated infrastructure for hybrid clouds, in particular, federation between Openstack and Openstack and also between Openstack and Amazon. 1. Introduction Cloud computing, has become widespread recently due to its ability to create a datacenter consisting of a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management and time. Though cloud computing was first popularized by companies such as Amazon, security and other concerns have led to wide deployment of private clouds owned by a single enterprise. Such clouds may need to acquire resources from public clouds to accommodate sudden spikes in demand, for experimental access to specialized software, or for outsourcing non-mission critical functions. This has given rise to hybrid clouds, which federate private and public clouds [1]. While our work is general and applicable to all types of clouds, in hybrid clouds there generally is a primary cloud owned by the enterprise, and multiple Remote Clouds owned by service providers or partners [2]. In such cases, it is preferable to extend the capabilities of the primary cloud to allow federation, instead of inventing a completely new infrastructure. Additionally, it is desirable that the solution be general enough to allow federation with any Remote Cloud. The aim of this paper is to address the problem of providing secure architecture for federation between Openstack and other Openstack clouds and also between Openstack and Amazon. The mechanism for federation presented in this paper is to be submitted to Openstack so that it may be incorporated in their subsequent releases. The federation blueprint that we have used in implementing the project has been presented in the Openstack Summit-2013 held in Portland (This work was supported in part by a grant from EMC), Oregon. In addition to this, we have extended the architecture to allow federation with Amazon EC2, and this work is underway. The rest of this paper is structured as follows. Section II presents related works in this domain. Section III describes the federated security for hybrid cloud architecture whilst section IV presents the way in which this architecture is implemented in openstack. Finally, Section V discusses extending this architecture to federate Amazon. 2. Related Work Hybrid cloud support is an active area of research. In this section we survey some of the important work in this area. Many approaches to federated security focus on the use of plug-ins for managing access to different clouds. Examples of this include the built-in EC2 support in Openstack [3]. However, these are low-level APIs that require the user to explicitly manage their credentials on different clouds, unlike our approach. Eucalyptus has a security infrastructure that would facilitate the building of private and hybrid clouds that are compatible with Amazon Web Services [8]. However, this is not generalizable. An alternative model for Openstack federation is in [5]. However, this model, unlike ours, requires significant re-writing of the current Openstack security infrastructure. It also requires the creation of transitory user-ids in the Remote Cloud and is specific to Openstack. Finally, the mechanism described in relies upon Single-Sign- On, which is not required in our system [1]. A number of papers have examined different aspects of the security federation problem. Different models for implementing resource-sharing between tenants have been proposed. We have leveraged the resource sharing model in [4], which specifies the use of a 5-tuple for an authorization database. As described later, we have simplified this to the use of a 4-tuple. The importance of trust in the cloud security paradigm is discussed in [6]. The authors use a risk analysis approach to measure the trust levels. With an increase in risks, there is a reduction in trust. Copyright 2014, Infonomics Society 263
2 In our work, we assume that trust has already been established between the clouds to be federated, since trust establishment involves legal and operational issues beyond the scope of the paper. A Semantic Access Control Policy Language (SACPL) is described in [7]. This is basically a language that would outline access control policies, unlike a model for access control proposed in our paper. However, we could extend our access control with such a mechanism. 3. Federated Security for Hybrid Clouds In the following section, we describe our solution for federated security. Following a description of the requirements, we provide a brief outline of the solution. We first describe the general solution, and then its implementation in Openstack Requirements At a high level, the requirements for the solution are that it be extensible to arbitrary Remote Clouds, and that it extend the capabilities of the primary cloud. After describing these requirements in more detail in this subsection, the next subsection provides a brief outline of our solution. Conceptually, the federation design has to ensure that controlling access to the remote cloud should be easy and secure i.e., it should not be too tedious for the user and at the same time, it should be secure enough to prevent any kind of threats to the applications/data in the clouds. For achieving this, our design uses the well-known concept of Role Based Access Control or RBAC. We extend the notion of role to provide remote access as below. Figure 1. Overall Architecture Conventionally, a role represents a number of privileges or rights a user has or actions they are allowed to perform in their primary cloud. For example, a user who has an 'Admin' role can take administrative actions such as viewing all tenants in their primary cloud. We extend this notion to say that two clouds that have already established a trust relationship with each other will grant certain privileges to certain roles; i.e., if cloud A and cloud B have established a trust relationship, then cloud B may recognize and grant certain privileges to certain roles in cloud A. This is a light-weight mechanism for ensuring remote access, since role definition is an inherent part of the security mechanism in most clouds. Also, since access in cloud B is defined by roles, adding or deleting users in cloud A does not require any synchronization or overhead in cloud B. Another major requirement is that it is desirable that remote access should not imply that a cloud surrender control over part of its resources, as this will complicate security management. For example, if cloud A wants to access resources in cloud B, security policy management and total control over the resources of B should remain in B. In our design, this is achieved by requiring that although B recognizes roles from A, the privileges that a particular role in A has is defined by B. The other requirement is that the implementation of the solution extends the capabilities of the primary cloud, which is Openstack in our case. This would make the federated infrastructure appear as a natural extension of Openstack Implementation In the following, we assume that, as stated earlier, there are two clouds a primary cloud, and a Remote Cloud, and that users of the primary cloud want to access resources in the Remote Cloud (see Figure 1). It is assumed that there are a number of tenants in both clouds. We also assume that trust relationships have already been set up between the primary cloud and the Remote Cloud, since the establishment of a trust relationship involves legal and operational issues that are beyond the scope of the paper. Our implementation relies on gateways that are proxy processors that (i) relay requests from the primary cloud to the Remote Cloud and (ii) translate requests for resources to commands that are understandable by the Remote Cloud. Since a trust relationship has already been set up between the clouds, the gateways in the primary cloud and the Remote Cloud have already established a secure communication channel and are ready to receive requests from each other. It can be seen from the description below that the inter-gateway communication can consist of SAML calls. To acquire resources, users in the primary cloud execute the following protocol. The exact implementation of these steps would depend upon the cloud in question and is discussed in the next subsection. 1. Remote Gateway acquisition: the user obtains a list of remote gateways (clouds) that they can access and then obtains access to any one of them. Copyright 2014, Infonomics Society 264
3 2. Remote Tenant acquisition: for each remote cloud, the user obtains a list of tenants that they can access and obtains a scoped token to one of the tenants. 3. Remote Resource acquisition: the user sends a request for obtaining a particular resource belonging to a particular tenant in the remote cloud that he is trying to access. 4. Openstack Implementation The existing Openstack implementation does not support Federation between two Openstack installations. In Openstack, access control is via tokens that encode the access rights of the users. These tokens and access rights are validated by an access control process called Keystone. In order to acquire resources, users pass these tokens to the appropriate control process. Before granting access to the requested resources, the control process invokes Keystone to validate that the user has access. This mechanism is used to solve the problem of revoking tokens. Since Keystone is the central access control mechanism, we have implemented our federation mechanism as extensions to Keystone, i.e., as separate APIs. This allows our extensions to be compatible with versions of Openstack that do not support federation. In the following, we describe the Openstack components and our extensions in more detail Keystone The policy service in Keystone provides a rulebased authorization engine and the associated rule management interface. The credentials of the person making the access to the resource, the current state of the system and the resource being modified is identified and sent as parameters to the policy engine of Keystone. All the checks to validate the policy against the given rules are made here. The rules in the current Keystone architecture can be expressed in two different ways: 1. List of lists representation: every rule is represented by a list and the lists are concatenated to form of a list of lists. For rules_dict:{abc:{role:[netadmin], tenant_id:[mytenant],def: tenant_id:[mytenant1]} {role:[computeadmin], This says that for the rule abc to be satisfied, the user has to be a netadmin in the tenant mytenant. Similarly, for the rule def to be satisfied, the user has to be a computeadmin in the tenant mytenant1. 2. Policy language representation: In this, every rule is separated by conjunction operators. For e.g.: {abc:{role: admin} or {(project_id :%{ project_id) s and role: projectadmin)}} In this form of implementation, concatenation operators are used to join the rules instead of implementing it using a list of lists. In the above rule, either the user should be an admin or he should be a projectadmin in the projectids that are mentioned in the rule. The service that the user is trying to access determines which rules are to be satisfied.e.g. Consider a service A that has the following match list: match_list : {rule:abc}.this means that any user who is trying to access the service A has to satisfy the rule abc that is mentioned in the rules_dict. The service that has to grant access to the user calls stores the rules that are to be satisfied by him in the form of a dictionary called the target dictionary. This is passed to the policy engine as a parameter along with the user credentials/role in RBAC implementation. The policy engine then checks the validity of the users credentials against the rules specified by the service. A typical call to Keystone by the service looks like this: target_dict={create_vm:[[ role:computeadmin ], [ tenant_id :%( tenantid) s, role: foreignadmin ]], add_network=[ role:nova_netadmin ]} match_list=create_vm Call to Keystone will be of the form: authenticate(match_list,target_dict,user_credentials) This tells Keystone to check the credentials of the user against the rule create_vm in the target dictionary. The rules dictionary is stored in JSON format in the Keystone database. In the list of lists representation, each check inside the innermost lists id combined with an AND conjunction and all the outermost lists are combined with an OR conjunction. This means that any one of the outermost lists should satisfy the rules and that all the innermost checks in that list have to satisfy the checks Keystone Extensions In our implementation, the policy engine is RBAC (Role Based Access Control) enforced. i.e., the user s role is looked into when he is trying to access a service and not his attributes. The rules dictionary is modified accordingly to support RBAC. An example policy in our implementation is as follows: {create_vm: [[ role: computeadmin ], [ tenant_id :%( tenantid) s, role: foreignadmin ]]}. This means that if the user wants to create a VM, then he has to satisfy the rule create_vm i.e. He either has to be a computeadmin or he should be a foreignadmin and has to belong to the tenants listed in the rule. Copyright 2014, Infonomics Society 265
4 The policy engine in our implementation is extended to support RBAC. Every service is extended to support a remote access i.e. every rule in the rules dictionary is modified to support a role of foreignadmin and the filtering is done based on the tenantids in the remote cloud. We have a method called add_policy() which enables the admin user to add a policy to the existing database. We make use of this particular method to enable the remote user authentication. For example to enable the user to create a Virtual Machine in the remote cloud, a rule create_vm (as shown above) is added. For every service the user tries to access, his role in the tenant he belongs to is extracted from his Tenant Acquisition Token (acquired before requesting a resource and described below). This is passed to the policy engine (Keystone), which then authenticates it by checking it against the rules that are to be satisfied for that particular service. The foreignadmin role is one of the roles that is framed to be issued to a user once he chooses to login remotely into a Remote Cloud. The gateway has the right to issue a role to the user based on his requirement in the remote cloud and also based on the trust relationship between the Primary and the Remote cloud. The user uses the role issued by his gateway while accessing the Remote Cloud (in this case foreignadmin) and the policy engines of the services that he is trying to access in the remote cloud authenticate the user based on the foreign role. Instead of passing the user credentials to the policy engine as in the existing implementation, we extract the role of the user and pass it to the policy engine for authentication, which on successful authentication grants the service access to the user. The gateway needs to maintain a list of resources accessible by users. Since the gateway in this case is integrated with Keystone, we have modified the access control list maintained by Keystone to include the rights of remote users. Specifically, Keystone maintains a 3-tuple (Subject, Privilege, Object) which specifies the Privilege a Subject has on an Object. Subject can be a user or a role. However, for a RBAC implementation, it is likely that Subject+ will be the name of a role. We have extended this to a 4-tuple (Cloud, Subject, Privilege, Object) where the Cloud field is non-blank for remote users and specifies the cloud that the user belongs to. The 4-tuple mechanism enables the user to have a remote access to a Remote Cloud since the authentication system uses the cloud field in the credentials to authorize the user access to the remote cloud. Any unique attribute of the cloud can be used; in our case, the URL for the gateway is used. For example, ((Cloud A,admin),Read,\) is interpreted as follows: Anybody who is an admin in cloud A has read access to the root folder of cloud B assuming that cloud B is the remote cloud and there exists a trust relationship between the two clouds. Architecture Figure 2. Existing Openstack Access Control Architecture 4.3. Existing Openstack Access Control Existing Keystone architecture provides authorization by means of tokens. All tokens are dictionaries within Python. 1. At login, the user provides his credentials (username and password) which are sent as a GET request to the Keystone URL (Current IP:5000/v2.0/tokens/). This request returns an unscoped token in JSON format. This token is not associated with any tenant and is temporary. This is represented by the step 1 and 2 of the Figure Using this token, the user may request for a list of tenants that he has access to. This can be accomplished by issuing a GET request to another Keystone URI (Current IP:5000/v2.0/tenants/). 3. He then picks a desired tenant. The credentials and the unscoped token are checked once again for authenticity and the user is issued a scoped token which is tied to the chosen tenant. Keystone also sends a list of services that a user in that tenant may avail of. This is represented by the steps 3 and 4 of Figure2. 4. Once the user obtains a scoped token, he may use it to request creation of a virtual machine at a specific endpoint. Keystone then verifies the validity of the token and whether or not the tenant has access to the specified service. It may also return some additional information to the user. The request is validated against the service s policy framework. If all requirements are satisfied, a virtual machine is created and status is returned to the user. This is represented by the steps 5 and 6 of Figure 2. Copyright 2014, Infonomics Society 266
5 Figure 3. Keystone Architecture 4.4. Openstack Federation Extensions We now describe how the above protocol is executed in Openstack as represented by Figure 4: 1. Remote Gateway Acquisition: as stated above, Openstack access control is via tokens that encode the resources that users are authorized to access. Therefore, it is necessary for users to get a token (referred to as a GAT or Gateway Acquision Token) that allows them to access the gateway in the remote cloud. Since in Openstack, the access tokens are obtained at login, the user obtains the GAT via a background call to the gateway in the primary cloud which in turn contacts the remote gateway so as to verify the user credentials from the NEWROLES table present in its database. Upon successful authentication, it returns a GAT (Gateway Acquisition Token) to the user and at the same time updates the GATS table so that the GAT can be validated at a later time. The authentication and validation process has been organized into different functional components like assignment, auth, catalog, common, contrib, credential, identity, locale, middleware, openstack, policy, tests, token, trust. Each of these except a few like the middleware, locale have routers.py and controllers.py files. Each of these according to the url will match to the actions in its corresponding controllers. For example, if../user/tokens/ is the specified url, then routers.py residing in the token directory will be called and controllers.py inside the token directory will have corresponding matching action. Figure 4. Federation Design - token flow In this step of gateway aquision, identity controller comes to play and also the token controller needs to be invoked for authenticating user credentials and returning an unscoped token. This is accomplished by first calling the auth controller which in turn invokes the identity controller and token controller. The Auth controller is used to match corresponding controller and action from pattern in url.some of the typical examples of how the url would be are.../auth/tokens,../auth/credentials. The auth controller would in turn call the token controller for the former and credentials controller for the latter case. Functionalities involving identity related information such users, groups, and group membership are provided in the Identity controller. Token controller performs functions like authenticating user credentials and returning an unscoped token, returning of scoped token for a particular tenant, validate an existing token, authenticate against an identity backend. Figure 5. Controllers Copyright 2014, Infonomics Society 267
6 2. Remote Tenant Acquisition: once the user has the GAT, they need to obtain a token that specifies the list of tenants they can access in each remote cloud. This could also be accomplished via background calls at login. However, for efficiency and security, in our design, these tokens are acquired when the user wishes to access a remote tenant. At that point, the user sends the GAT to the foreign gateway. The foreign gateway validates the GAT from the GATS database, then generates a list of tenants that the user can access. Once, the user has chosen a particular tenant, the gateway returns the TAT or Tenant Acquisition Token for that particular tenant after making the background calls to Keystone of the remote cloud. This phase involves validation of existing token, to be performed by the token controller. As mentioned previously, this is achieved by a call to the auth controller which then calls the token controller. The function of listing all the tenants that a user could belong to, associating user with a particular tenant, assigning a particular role to user is done through a call to the assignment controller via the auth controller. Assignment controller deals with getting valid tenants for a token, granting a role to user or a group on either domain or project, revocation of role granted to user/group on domain/project, adding a user to tenant, removing a user from a tenant or deleting the contents of a domain. 3. Remote Resource Acquisition: the user then sends the TAT with a request for resources to the Remote Cloud. Before granting the request, as before, the appropriate Openstack process invokes Keystone to validate that the user has access. The modified Keystone recognizes that this is a remote request, and invokes the gateway to validate the request. The Gateway validates the user credentials obtained from the TAT and uses RBAC to authenticate the same for the resource requested. Upon successful validation, the gateway grants the resource access to the user. Once the access is granted, the user can access the resources directly without having to go through the authentication processes. This requires a call to token controller to validate an existing token, and a call to policy controller. Policy controller is the Controller for enforcing policy engine, also an interface for getting, updating and deleting policy. The rules are defined here Gateway and Gateway API We have the Gateway as the main component of our model, since all the communication between the clouds as well as the authentication is done by the gateway. Figure 6. Existing Keystone database It also makes the necessary calls to the other API s and Keystone to generate the required tokens, invokes the required controllerss. The authentication process is done at three levels namely Remote Gateway Acquisition, Remote Tenant Acquisition and Remote Resource Acquisition (Described in IV [D]). Figure 7. New database design for the validation of a user from remote cloud We have used the following API s in our implementation of the federation model: 1. Gateway: This is the main component in our model. Its function is to communicate with the remote cloud and to authenticate the user based on various factors. 2. Prq: This API is used to process the requests that the client makes to the gateway and call the concerned APIs. It can also forward the requests to the remote gateways. 3. GATlist: This API is used to get a list of clouds which have a trust relationship with the primary cloud and hence can be accessed from the primary cloud. 4. Remoteauth: This API is used to grant the Gateway Acquisition Token (henceforth known as the GAT) to Copyright 2014, Infonomics Society 268
7 the user by verifying his credentials. It also updates the GATS table with the appropriate values so that the GAT verification can be done as and when required. 5. TATcreate: This has two functions namely TATlist and TAT_create. TATlist returns the list of accessible tenants for the given user after verifying the GAT and TAT_Create generates the Tenant Acquisition Token(henceforth known as the TAT) for the chosen Tenant. belongs to a particular tenant in the primary cloud and has some pre-defined role. Based on this, he is given a list of tenants that he can access in the remote cloud and is provided with a new role (Foreign Role). 3. GATS: This database, present in the remote cloud is used to verify the GAT that has been issued to the remote user. This contains the fields GATID and STOKEN. The GATID is unique for every GAT and hence it acts as the primary key. This field is used for authenticating the GAT Description of APIs The following provides a description of the APIS that were introduced in the previous section: 1. Gateway: This API is called in the phase 1 which is Remote Gateway Acquision phase where the user acquires the GAT through a call to the gateway in the primary cloud which in turn contacts the remote gateway and upon successful authentication returns GAT. 2. Prq: This API is called whenever the client makes requests to the gateway in order to obtain the list of accessible gateways, acquire GAT from a particular choice of gateway, procure the list of tenants, and obtain TAT for the chosen tenant. Prq then forwards the request by calling the appropriate APIs. Hence this API is called in all the three phases, Remote Gateway Acquisition, Remote Tenant Acquisition, and Remote Resource Acquisition. 3. GATlist: This API is called during Remote Gateway Acquision phase by the Prq API, when the user wishes to get a list of clouds that are accessible from the primary cloud. 4. Remoteauth: This API is invoked in the Remote Gateway Acquision phase, in order to grant the Gateway Acquisition Token (GAT) 5. TATcreate: The call to this API is during the Remote Tenant Acquisition phase. When the gateway receives a request to either return the list of accessible tenants for the given user or request for the Tenant Acquisition Token for the chosen Tenant, the Prq API invokes the TATcreate API. In addition to the APIs and the existing Keystone database illustrated in Figure 6, we have a separate database which contains the following tables that enables us to validate the user access in the remote cloud as shown in Figure ABLECLDS: This stores the list of the gateways that have a trust relationship with the primary cloud. It contains of the fields, Tenant_ID and GatewayIP. TenantID is used so as to provide a tenant filtered access control to the remote clouds. GatewayIP contains the IPs of the remote clouds that are accessible for the given tenant. 2. NEWROLES: This database is present in the remote cloud. This contains Issuer, Tenantid, role, NewTenantID and ForeignRole. The issuer,tenantid and role fields are used to validate that the user Figure 6. Amazon federation Amazon Web Services has seen a large number of customers that is constantly on the rise, typically Amazon is estimated to have 80% of the cloud market, and hence is a major player. In the current scenario, with support for OpenStack gaining more impetus, it would be useful to design a system where OpenStack and Amazon coexist. A customer may have an account in Amazon and another with an OpenStack deployment and may find it worthwhile to link the two. In this section, we propose a system that supports federation between Openstack and Amazon. Amazon federation can be integrated into our federation model using the Amazon Web Services Security Token Service (AWS STS). It is a web service that enables a cloud service to request temporary, limited-privilege credentials for federated users. Federation with Amazon requires the extension of the current implementation of the gateway. The credentials of the user in the primary cloud are authenticated. When the user requests access to Amazon, he is directed to the gateway. The gateway then authenticates with Keystone and returns an SAML assertion. The user contacts STS with this SAML assertion. STS returns a set of temporary credentials to the user using which he can access AWS resources. The protocol described above is represented in Figure 6.The gateway returning an SAML assertion is similar to obtaining Gateway Access Token (GAT) in Copyright 2014, Infonomics Society 269
8 the Openstack-Openstack federation model. AWS STS returning temporary credentials is similar to obtaining Resource Acquisition Token (RAT). The access rules supported by Amazon are very similar to but different from Keystone policies (described in IV.A). Access rules2 here refer to a JSON document that specifies the access rights for federating users. It contains the following fields Action, Resource, Effect and Principal [13]. Effect specifies whether to allow or deny an Action on a Resource by a Principal. The Principal is generally a user. These access rules are used along with the API calls to enforce access control. This is similar to the model used for Openstack - Openstack federation. Action can be mapped on to a Privilege, Resource is analogous to Object, Effect is analogous to Rule and Principal maps to Subject. Since OpenStack is written in Python, we are using the Python SDK for Amazon called boto. This has modules for various services provided by Amazon like EC2 and S3. There is similarly also a module for AWS STS which provides the necessary APIs namely get_federation_token, assume_role and assume_role_with_saml.4similar to the policy engine of Openstack.s 6. Conclusion We have proposed a secure infrastructure which allows secure sharing of resources between Openstack and Openstack and also between Openstack and Amazon. This showcases the generality of the proposed scheme. In addition, our architecture also has the desired property of having the control of resources in the remote cloud. The federation design also ensures that controlling access to the remote cloud is easy and secure. 7. References [1] Moreno-Vozmediano, Rafael, Rubén Montero, and Ignacio Llorente. "IaaS cloud architecture: from virtualized data centers to federated cloud infrastructures." IEEE Computer (2012): 1-1. (Access date: 10 July 2013) [2] Celesti, Antonio, Francesco Tusa, Massimo Villari, and Antonio Puliafito. "Security and cloud computing: Intercloud identity management infrastructure." In Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), th IEEE International Workshop on, pp IEEE, (Access date: 21 June 2013) [3] API Endpoint, developer/nova/devref/api.html retrieved on (Access date: 31 August 2013). [4] Calero, Jose M. Alcaraz, Nigel Edwards, Johannes Kirschnick, Lawrence Wilcock, and Mike Wray. "Toward a multi-tenancy sauthorization system for cloud services." Security & Privacy, IEEE 8, no. 6 (2010): (Access date: 15 June 2013). [5] Chadwick, David W., and Matteo Casenove. "Security APIs for My private cloud-granting access to anyone, from anywhere at any time." In Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on, pp IEEE, (Access date: 25 August 2013) [6] J. D. Amit Sangroya, Saurabh Kumar and V. Varma, Towards analyzing data security risks in cloud computing environments, in Proceeding at International Conference on Information Systems, Technology, and Management (ICISTM 2010), 2010, p (Access date: 3 September 2013). [7] Luokai Hu et al., Towards an Approach of Semantic Access Control for Cloud Computing, Proc. 1st Int l Conf. Cloud Computing, LNCS 5931,Springer-Verlag, 2009, pp (Access date: 5 August 2013) [8] D. Nurmi et al., The Eucalyptus Open-Source Cloud-Computing Sys- tem,proc. 9th IEEE/ACM Int l Symp. Cluster Computing and the Grid, IEEE CS Press, 2009, pp (Access date: 8 May 2013) [9] Openstack Keystone workflow and Token scoping from gs/e93514d3- c4f0-4aa f370090f5/ entry/openstack_keystone_workflow_token_scoping?l ang =ens(accessdate:15may2013) [10] GetFederationToken API API_GetFederati ontoken.html (Access date: 1st March, 2014). [11] Assume RoleAPI, STS/latest/APIReference/API_AssumeRole.html (Access date: 1st March, 2014). [12] Assume Role With SAML API API_AssumeRole WithSAML.html (Access date: 1st March, 2014) [13] Policy document specification Copyright 2014, Infonomics Society 270
Access Control Framework of Personal Cloud based on XACML
Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
ABFAB and OpenStack(in the Cloud)
ABFAB and OpenStack(in the Cloud) David W Chadwick University of Kent 1 Authentication in OpenStack Keystone User Trust Relationship Swift/Glance etc. 2 Federated Authnwith External IdPs External IdP User
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
ACaaS: Access Control as a Service for IaaS Cloud
ACaaS: Access Control as a Service for IaaS Cloud Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haiyong Xie Arizona State University, Tempe, AZ 85287, USA Email: {ruoyu.wu, gahn, hsharif1}@asu.edu
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
Leveraging Cloud Storage Through Mobile Applications Using Mezeo Cloud Storage Platform REST API. John Eastman Mezeo
Leveraging Cloud Storage Through Mobile Applications Using Mezeo Cloud Storage Platform REST API John Eastman Mezeo Cloud Storage On-demand, API-based access to storage Storage accessed through REST Web
IBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
Foundations and Concepts
vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Cloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
Scyld Cloud Manager User Guide
Scyld Cloud Manager User Guide Preface This guide describes how to use the Scyld Cloud Manager (SCM) web portal application. Contacting Penguin Computing 45800 Northport Loop West Fremont, CA 94538 1-888-PENGUIN
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems
Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center
Threat Modeling Cloud Applications
Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant [email protected] Software Confidence. Achieved. www.cigital.com [email protected] +1.703.404.9293
CLEVER: a CLoud-Enabled Virtual EnviRonment
CLEVER: a CLoud-Enabled Virtual EnviRonment Francesco Tusa Maurizio Paone Massimo Villari Antonio Puliafito {ftusa,mpaone,mvillari,apuliafito}@unime.it Università degli Studi di Messina, Dipartimento di
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
Migration of virtual machine to cloud using Openstack Python API Clients
Migration of virtual machine to cloud using Openstack Python API Clients Jyoti Joshi 1, Manasi Thakur 2, Saurabh Mhatre 3, Pradnya Usatkar 4, Afrin Parmar 5 1 Assistant Professor Computer, R.A.I.T., University
vcloud Air Platform Programmer's Guide
vcloud Air Platform Programmer's Guide vcloud Air OnDemand 5.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
IBM Cloud Manager with OpenStack. REST API Reference, version 4.1
IBM Cloud Manager with OpenStack REST API Reference, version 4.1 IBM Cloud Manager with OpenStack REST API Reference, version 4.1 Note Before using this information and the product it supports, read the
Migrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.
Application Note Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.0 Page 1 Controlling Access to Large Numbers of Networks Devices to
FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO ([email protected]) FULVIO VALENZA (fulvio.valenza@polito.
+ FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO ([email protected]) FULVIO VALENZA ([email protected]) + OUTLINE INTRODUCTION OF CLOUD DEFINITION OF CLOUD BASIC CLOUD COMPONENTS
Third Party Cloud Services Its Adoption in the New Age
Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals
Authentication in OpenStack
Draft Draft entication in OpenStack Jorge L Williams Khaled Hussein Ziad N Sawalha Abstract The purpose of this
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
THE EUCALYPTUS OPEN-SOURCE PRIVATE CLOUD
THE EUCALYPTUS OPEN-SOURCE PRIVATE CLOUD By Yohan Wadia ucalyptus is a Linux-based opensource software architecture that implements efficiencyenhancing private and hybrid clouds within an enterprise s
IaaS Configuration for Cloud Platforms
vrealize Automation 6.2.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
NetworkingPS Federated Identity Solution Solutions Overview
NetworkingPS Federated Identity Solution Solutions Overview OVERVIEW As the global marketplace continues to expand, new and innovating ways of conducting business are becoming a necessity in order for
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
Introduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
THE CC1 PROJECT SYSTEM FOR PRIVATE CLOUD COMPUTING
Computer Science 13 (2) 2012 http://dx.doi.org/10.7494/csci.2012.13.2.103 J. Chwastowski R. Grzymkowski M. Kruk M. Nabożny Z. Natkaniec A. Olszewski H. Pa lka Z. Sobocińska T. Sośnicki M. Szostak P. Syktus
Lync SHIELD Product Suite
Lync SHIELD Product Suite The Natural Solution For Securing Lync Connectivity For today s mobile enterprise, the need to connect smartphones to the corporate network has become a vital business requirement.
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
Mirantis OpenStack Express: Security White Paper
Mirantis OpenStack Express: Security White Paper Version 1.0 2005 2014 All Rights Reserved www.mirantis.com 1 Introduction While the vast majority IT professionals are now familiar with the cost-saving
Cloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Infrastructure Management of Hybrid Cloud for Enterprise Users
Infrastructure Management of Hybrid Cloud for Enterprise Users Shixing Yan *, Bu Sung Lee *^, Guopeng Zhao *, Ding Ma *, Peer Mohamed * * HP Labs Singapore 1 Fusionopolis Way Singapore 138632 ^School of
Shavlik Patch for Microsoft System Center
Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This
Gladinet Cloud Access Solution Simple, Secure Access to Online Storage
A Gladinet White Paper http://www.gladinet.com Gladinet Cloud Access Solution Simple, Secure Access to Online Storage October 12 Contents Introduction 2 Problem Statement 2 Previous Options Error! Bookmark
How To Use Kiteworks On A Microsoft Webmail Account On A Pc Or Macbook Or Ipad (For A Webmail Password) On A Webcomposer (For An Ipad) On An Ipa Or Ipa (For
GETTING STARTED WITH KITEWORKS DEVELOPER GUIDE Version 1.0 Version 1.0 Copyright 2014 Accellion, Inc. All rights reserved. These products, documents, and materials are protected by copyright law and distributed
LSKA 2010 Survey Report I Device Drivers & Cloud Computing
LSKA 2010 Survey Report I Device Drivers & Cloud Computing Yu Huang and Hao-Chung Yang {r98922015, r98944016}@csie.ntu.edu.tw Department of Computer Science and Information Engineering March 31, 2010 Abstract
Inter-cloud Introduction. Yisheng Wang
Inter-cloud Introduction Yisheng Wang Agenda Introduction Summer Updates Future Work Introduction Cloud Introduction Cloud Federation Researches on Cloud Federation Conclusion Cloud Introduction Definition
SQUEEZE SERVER. Operation Guide Version 3.0
SQUEEZE SERVER Operation Guide Version 3.0 CONTENTS Introduction to Squeeze Server... 1 Features... 2 Squeeze Server Components... 3 How Squeeze Server Works... 4 Running Squeeze Server... 5 Priority Job
Architecture Overview
Qubell Adaptive Platform-as-a-Service, Enterprise Edition Architecture Overview 4600 Bohannon Drive, Menlo Park, CA 94025 T 888 855-8940 http://qubell.com Introduction Introduction Qubell Adaptive Platform-as-a-Service
Apigee Gateway Specifications
Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption
Advanced Service Design
vcloud Automation Center 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
OpenStack Introduction. November 4, 2015
OpenStack Introduction November 4, 2015 Application Platforms Undergoing A Major Shift What is OpenStack Open Source Cloud Software Launched by NASA and Rackspace in 2010 Massively scalable Managed by
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION
APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION 1 PRIYANKA DUKLE, 2 TRISHALA PAWAR, 3 SNEH BHAT 1,2,3 Computer, Amrutvahini College of Engineering, Sangamner Email: [email protected] 1, [email protected]
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
VMware vcloud Director for Service Providers
Architecture Overview TECHNICAL WHITE PAPER Table of Contents Scope of Document....3 About VMware vcloud Director....3 Platform for Infrastructure Cloud...3 Architecture Overview....3 Constructs of vcloud
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform
An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform A B M Moniruzzaman 1, Kawser Wazed Nafi 2, Prof. Syed Akhter Hossain 1 and Prof. M. M. A. Hashem 1 Department
Rights Management Services
www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
CLAIMS-BASED IDENTITY FOR WINDOWS
CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract
Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite Abstract This white paper outlines the deployment and configuration of a Single Sign-On solution for EMC Documentum
Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida
Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.
Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics
Identity, Privacy, and Data Protection in the Cloud XACML David Brossard Product Manager, Axiomatics 1 What you will learn The issue with authorization in the cloud Quick background on XACML 3 strategies
Amazon WorkDocs. Administration Guide Version 1.0
Amazon WorkDocs Administration Guide Amazon WorkDocs: Administration Guide Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
1 What is Cloud Computing?... 2 2 Cloud Infrastructures... 2 2.1 OpenStack... 2 2.2 Amazon EC2... 4 3 CAMF... 5 3.1 Cloud Application Management
1 What is Cloud Computing?... 2 2 Cloud Infrastructures... 2 2.1 OpenStack... 2 2.2 Amazon EC2... 4 3 CAMF... 5 3.1 Cloud Application Management Frameworks... 5 3.2 CAMF Framework for Eclipse... 5 3.2.1
Configuring Keystone in OpenStack (Essex)
WHITE PAPER Configuring Keystone in OpenStack (Essex) Joshua Tobin April 2012 Copyright Canonical 2012 www.canonical.com Executive introduction Keystone is an identity service written in Python that provides
Managing trust relationships with multiple business identity providers (basics) 55091A; 3 Days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Managing trust relationships with multiple business identity providers (basics)
www.basho.com Technical Overview Simple, Scalable, Object Storage Software
www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...
