Software Design Document Logging/Audit

Size: px
Start display at page:

Download "Software Design Document Logging/Audit"

Transcription

1 Software Design Document Logging/Audit FM 7.5 Version 0.2 (Draft) Please send comments to:

2

3 Contents 1 Introduction Document Status Revision History Summary Scope Context Glossary References Overview Design Considerations Assumptions and Dependencies Goals and Guidelines Development Method Architectural Strategies System Architecture Detailed System Architecture Appendices...8 Copyright 2007 Sun Microsystems, Inc. All rights reserved. iii

4

5 1 Introduction 1.1 Document Status Project Name Federation Manager 7.5 Document Title Logging/Audit Date of Issue 02/22/07 Current Version 0.3 Author Burt Fujii Issuing Organization Sun Microsystems, Inc. Feedback 1.2 Revision History Date Version Author Comments 02/22/ Burt Fujii Initial draft 03/06/ Burt Fujii Updates 03/14/ Burt Fujii Added change to DB Date/Time column 1.3 Summary The purpose of this document is to provide a design for the features added in the Logging/Auditing services. The scope of this document details the implementation of the logging/auditing enhancements recently identified. The intended audience is the engineering and support groups, and those who would be in contact with the customers. 1.4 Scope The designs of the additions of the NameID field in the Log Record, and of the Dynamic Logging Level feature are detailed. The Complete Logs and Options To See Detailed XML Messages items mentioned in the Requirements Document are mentioned here, as a reminder for the components that must effect the changes. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 1

6 0, Version 0 Introduction 1.5 Context This document should be read in the context of a Federation Manager administrator and/or developer using the Logging API. 1.6 Glossary Level As defined by java.util.logging.level 1.7 References [1] FM 7.5 Logging/Audit Software Requirement Specification 2 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

7 2 Overview In the area of logging/auditing, several specific requirements have been identified: The Federation log records need to contain (in addition to the already included local userid and ContextID) an opaque handle providing the subject's NameID from the IDP. This field would be used to correlate IDP/SP log entries. Complete logs for all events; e.g., single sign-on, single-logout, etc. Options to see detailed XML messages between SPs and IDPs; e.g., whole assertion XML. Dynamic logging level setting, without having to restart the server. This document details implementation of the additional log record field (opaque handle for NameId) and dynamic logging level setting. The other two requirements are controlled by the components providing the logging information, so they should be covered in other documents. An additional change when specifically logging to a database is also detailed. The current VARCHAR data type definition makes it unnatural for writing SQL reports that query or sort on the Time column. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 3

8 0, Version 0 Design Considerations 3 Design Considerations 3.1 Assumptions and Dependencies Inclusion of the new NameID log record field depends on the logging client providing that property and value. Logging of all events depends upon the components effecting those log records/requests. Options for logging detailed XML messages between SPs and IDPs can be effected by logging at appropriate logging levels (e.g., FINE, FINER, and FINEST corresponding to more detailed levels than the default INFO). Upgrade/Migration Upgrade/migration of the Logging service will be necessary if FM7.5 is applied to an existing OpenSSO (or AM7.1?) installation. Also, existing log files or tables should be saved or moved, then deleted before starting logging with the added NameID field, so that the log files will have consistent log records. 3.2 Goals and Guidelines System performance impacts should be as expected with increased logging load. It should be expected that more logging, particularly by specifying more detailed logging levels, may have an effect on the server's transaction throughput. Also, the change of the data type for the Data column (when logging to a database) from a VARCHAR(255) to a large object (CLOB in Oracle, LONGTEXT in MySQL) may have some effect on the database server's storage requirements. 3.3 Development Method <State development method if it differs from the OpenSSO development method> 4 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

9 Architectural Strategies 0, Version 0 4 Architectural Strategies <State any existing technologies/libraries used.> <State any new strategy introduced.> Copyright 2007 Sun Microsystems, Inc. All rights reserved. 5

10 0, Version 0 System Architecture 5 System Architecture Currently, the log record fields logged are controlled by the "Configurable Log Fields" selections in the Logging Configuration page of the Administration Console. The logging service is dependent on the client creating the LogRecord to provide the values for the log record fields. The server's logging level is defaulted to INFO, though specific log files' logging level can be specified in the AMConfig.properties file. Also, overall logging can be inactivated with an entry in the AMConfig.properties file. 6 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

11 Detailed System Architecture 0, Version 0 6 Detailed System Architecture 6.1 NameID Opaque Handle The attributes in the Administration Console's Logging configuration page reflect what is specified in the Logging service's amlogging.xml file. An addition for the nameid opaque handle must be made. Specifically, the addition will be to the iplanet-am-logging-logfields attribute in the amlogging.xml file. An associated addition to the amlogging.properties file will be made for internationalization purposes. The LogRecord class requires changes to handle the added nameid property. The LogRecord(Level level, String msg, Object token) method extracts properties from the SSOToken included. If the new property is not supplied in that manner, then each component must supply it using the LogRecord's addloginfo(string key, Object value) method. The authentication service utilizes the LogRecord(Level level, String msg, Hashtable properties) method. To provide the nameid property and value, it must be supplied in the Hashtable passed. If the nameid property and value are not supplied, the log record's nameid field will display "Not Available". Sample Log Records with the nameid not supplied (first) and supplied (second): #Fields: time Data ModuleName MessageID Domain ContextID LogLevel LoginID NameID IPAddr LoggedBy HostName " :34:50" "this is the new test log message" MyModule "Not Available" dc=opensso,dc=java,dc=net 786d16c9d25bfbb601 WARNING id=amadmin,ou=user,dc=opensso,dc=java,dc=net "Not Available" id=amadmin,ou=user,dc=opensso,dc=java,dc=net alisun31 " :37:35 "this is the second test log message" MyModule "Not Available" dc=opensso,dc=java,dc=net 6e1d5b606a277b9901 SEVERE id=amadmin,ou=user,dc=opensso,dc=java,dc=net JoseJ id=amadmin,ou=user,dc=opensso,dc=java,dc=net alisun31 Note that the logging level for the first record was specified as "WARNING", and "SEVERE" for the second. The code snippet for specifying the NameID property to the LogRecord uses the LogRecord's addloginfo method: LogRecord logrecord = new LogRecord(logLevel, logargs[messageindex], usertoken); logrecord.addloginfo("modulename", "MyModule"); logrecord.addloginfo("nameid", logargs[nameidindex]); Copyright 2007 Sun Microsystems, Inc. All rights reserved. 7

12 0, Version 0 Detailed System Architecture Logger logger = (Logger)Logger.getLogger(logArgs[LogNameIndex]); logger.log(logrecord, loggedbytoken); In the Administration Console's Logging configuration page, the Configurable Log Fields attribute gets the added NAMEID selection (not accurately depicted): Configurable Log Fields: CONTEXTID DOMAIN HOSTNAME IPADDR LOGGEDBY LOGINID LOGLEVEL MESSAGEID MODULENAME NAMEID 6.2 Dynamic Logging Level To effect dynamic setting of the server's logging level, an addition to the Administration Console's Logging configuration page will be made. Likewise with the nameid opaque handle, an addition to the amlogging.xml and amlogging.properties files are made. An attribute (sun-am-log-level) is added with ChoiceValues corresponding to the java.util.logging.level values (SEVERE, WARNING, INFO, CONFIG, FINE, FINER, FINEST, OFF), with default INFO. The Logging Level setting applies to all logs, except as noted below. Logging levels for individual log files could be provided, but then the Logging configuration page would get very long. Currently, the sms.dtd supports a radio uitype, but a pulldown type would allow for a more compact display. Another drawback of listing individual log names is the difficulty in supporting additional log names. Currently, logging levels for individual logs can be statically set by adding properties to the AMConfig.properties file of the form: iplanet-am-logging.<logname>.level=finer where <logname> is the log's full name, e.g., amsaml.access. Note that the Liberty, SAML, and Federation are the only components that implement any levels other than INFO. In order to observe AMConfig.properties logging level additions, Logging configuration page changes will apply to all logs other than those specified in AMConfig.properties. Also note that the AMConfig.properties entries are only read once, then cached by the SystemProperties class, so adding or changing logging level properties in that file after server startup will have no effect until the next server restart. Example amlogging.xml addition: <AttributeSchema name="sun-am-log-level" type="single_choice" syntax="string" 8 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

13 Detailed System Architecture 0, Version 0 i18nkey="a130"> <ChoiceValues> <ChoiceValue i18nkey="choicelogsevere">severe</choicevalue> <ChoiceValue i18nkey="choicelogwarning">warning</choicevalue> <ChoiceValue i18nkey="choiceloginfo">info</choicevalue> <ChoiceValue i18nkey="choicelogconfig">config</choicevalue> <ChoiceValue i18nkey="choicelogfine">fine</choicevalue> <ChoiceValue i18nkey="choicelogfiner">finer</choicevalue> <ChoiceValue i18nkey="choicelogfinest">finest</choicevalue> <ChoiceValue i18nkey="choicelogoff">off</choicevalue> </ChoiceValues> <DefaultValues> <Value>INFO</Value> </DefaultValues> </AttributeSchema> and associated amlogging.properties additions: a130=logging Level choicelogsevere=severe choicelogwarning=warning choiceloginfo=info choicelogconfig=config choicelogfine=fine choicelogfiner=finer choicelogfinest=finest choicelogoff=off The resulting Logging service configuration addition would look like (not accurately depicted): Logging Level: CONFIG FINE FINER FINEST INFO OFF SEVERE WARNING Copyright 2007 Sun Microsystems, Inc. All rights reserved. 9

14 0, Version 0 Detailed System Architecture 6.3 Detailed XML Messages When logging to flatfiles, there should be no issue with the log record's Data field ( column in database parlance) having a massive (e.g., something like up to 10KBytes) amount of characters. There may be some issue trying to read the records with a simple utility such as vi, but that is not addressed here. When logging to a database (supported ones are Oracle and MySQL), the Data column has been defined as a VARCHAR(255), or a character data type of up to 255 bytes. The maximum for (the now deprecated) Oracle VARCHAR type is 4KBytes, and for the MySQL VARCHAR type is 65,532 bytes (or 255 bytes for MySQL 3.x/4.0/4.1). In order to support a Data column of up to 10KBytes, the Oracle CLOB (Character Large Object) data type should be used; and for MySQL, the LONGTEXT data type, with its 4GB ( ) maximum should be used. The maximum size for LONGTEXT is 4GB for MySQL 3.x through 5.0, so using it rather than VARCHAR would allow for more universal support for the large Data column, even if there is a statement of support for MySQL 4.2 and later. There may be some issue with using a larger data type for the Data column for all logging. The bulk of logging by the server does not need more than the currently allotted 255 bytes. The database's storage requirements may be affected by the change to the larger data type. A not-so-attractive alternative is to have the data type switchable between VARCHAR2/VARCHAR(255) and CLOB/LONGTEXT, but the existing tables would all have to be deleted, and the opensso server restarted. Incidentally, the VARCHAR2 data type will replace the VARCHAR type when defining the other columns when logging to an Oracle database. The new large object type for the Data column makes existing AM log tables incompatible with the new log tables. Existing tables would need to be archived and deleted. 6.4 Time Column The current data type for the Time (actually containing date and time) column is VARCHAR for both Oracle and MySQL tables. To use the appropriate data type for the respective databases, the DATE type should be used in Oracle and DATETIME type in MySQL. Changing the Time column from a VARCHAR to DATE/DATETIME type makes existing AM log tables incompatible with the new log tables. Existing tables would need to be archived and deleted. 10 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

15 0, Version 0 Copyright 2007 Sun Microsystems, Inc. All rights reserved. 11

Software Design Document SAMLv2 IDP Proxying

Software Design Document SAMLv2 IDP Proxying Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: [email protected] This document is subject to the following license: COMMON DEVELOPMENT AND

More information

PHP Integration Kit. Version 2.5.1. User Guide

PHP Integration Kit. Version 2.5.1. User Guide PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001

More information

OpenSSO: Cross Domain Single Sign On

OpenSSO: Cross Domain Single Sign On OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2

More information

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications

More information

How to create a SP and a IDP which are visible across tenant space via Config files in IS

How to create a SP and a IDP which are visible across tenant space via Config files in IS How to create a SP and a IDP which are visible across tenant space via Config files in IS This Documentation is explaining the way to create a SP and IDP which works are visible to all the tenant domains.

More information

Liberty Alliance. CSRF Review. .NET Passport Review. Kerberos Review. CPSC 328 Spring 2009

Liberty Alliance. CSRF Review. .NET Passport Review. Kerberos Review. CPSC 328 Spring 2009 CSRF Review Liberty Alliance CPSC 328 Spring 2009 Quite similar, yet different from XSS Malicious script or link involved Exploits trust XSS - exploit user s trust in the site CSRF - exploit site s trust

More information

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents

More information

Configuring SAML2 for Single Sign On to Smartsheet (Enterprise Only)

Configuring SAML2 for Single Sign On to Smartsheet (Enterprise Only) Configuring SAML2 for Single Sign On to Smartsheet (Enterprise Only) This document is intended for technical professionals who are familiar with SAML and have access to the Identity Provider that will

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

How To Use Saml 2.0 Single Sign On With Qualysguard

How To Use Saml 2.0 Single Sign On With Qualysguard QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,

More information

Security Assertion Markup Language (SAML) Site Manager Setup

Security Assertion Markup Language (SAML) Site Manager Setup Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

Failover Support. DataDirect Connect for ODBC Drivers. Introduction. Connection Failover

Failover Support. DataDirect Connect for ODBC Drivers. Introduction. Connection Failover Failover Support DataDirect Connect for ODBC Drivers Introduction Connection failover and connection retry are two useful features that are available in the following DataDirect Connect for ODBC drivers:

More information

Database Administration with MySQL

Database Administration with MySQL Database Administration with MySQL Suitable For: Database administrators and system administrators who need to manage MySQL based services. Prerequisites: Practical knowledge of SQL Some knowledge of relational

More information

GUIDE. Web Client Application. Model: ER 4.0. Release 4.0.00 / Version No.: 1.01

GUIDE. Web Client Application. Model: ER 4.0. Release 4.0.00 / Version No.: 1.01 8e6R Enterprise Reporter USER GUIDE Web Client Application Model: ER 4.0 Release 4.0.00 / Version No.: 1.01 ii 8E6 TECHNOLOGIES, ENTERPRISE REPORTER WEB CLIENT USER GUIDE 8E6 ENTERPRISE REPORTER WEB CLIENT

More information

Installation and Administration Guide

Installation and Administration Guide Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features

More information

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0 Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Software Requirement Specification Web Services Security

Software Requirement Specification Web Services Security Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: [email protected] This document is subject to the following license:

More information

WinCollect User Guide

WinCollect User Guide Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice Copyright 2014 Juniper

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

CA Nimsoft Monitor. Probe Guide for NT Event Log Monitor. ntevl v3.8 series

CA Nimsoft Monitor. Probe Guide for NT Event Log Monitor. ntevl v3.8 series CA Nimsoft Monitor Probe Guide for NT Event Log Monitor ntevl v3.8 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and

More information

Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO

Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Configuring Apache Derby for Performance and Durability Olav Sandstå

Configuring Apache Derby for Performance and Durability Olav Sandstå Configuring Apache Derby for Performance and Durability Olav Sandstå Database Technology Group Sun Microsystems Trondheim, Norway Overview Background > Transactions, Failure Classes, Derby Architecture

More information

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them. This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and

More information

Upgrade Guide BES12. Version 12.1

Upgrade Guide BES12. Version 12.1 Upgrade Guide BES12 Version 12.1 Published: 2015-02-25 SWD-20150413111718083 Contents Supported upgrade environments...4 Upgrading from BES12 version 12.0 to BES12 version 12.1...5 Preupgrade tasks...5

More information

FileMaker 13. ODBC and JDBC Guide

FileMaker 13. ODBC and JDBC Guide FileMaker 13 ODBC and JDBC Guide 2004 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

Logging in Java Applications

Logging in Java Applications Logging in Java Applications Logging provides a way to capture information about the operation of an application. Once captured, the information can be used for many purposes, but it is particularly useful

More information

Spring Security SAML module

Spring Security SAML module Spring Security SAML module Author: Vladimir Schäfer E-mail: [email protected] Copyright 2009 The package contains the implementation of SAML v2.0 support for Spring Security framework. Following

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

Lifecycle Manager Installation and Configuration Guide

Lifecycle Manager Installation and Configuration Guide Lifecycle Manager Installation and Configuration Guide vcenter Lifecycle Manager 1.2 This document supports the version of each product listed and supports all subsequent versions until the document is

More information

Alert Logic Log Manager

Alert Logic Log Manager whitepaper Alert Logic Log Manager Configuring Log Sources for Best Practice Reports CONTENTS Introduction 1 Best Practice Reports in Log Manager 2 Active Directory 2 Databases 2 Network Devices 2 Windows

More information

Secure the Web: OpenSSO

Secure the Web: OpenSSO Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

Copyright Pivotal Software Inc, 2013-2015 1 of 10

Copyright Pivotal Software Inc, 2013-2015 1 of 10 Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10

More information

Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i

Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i $Q2UDFOH7HFKQLFDO:KLWHSDSHU 0DUFK Secure Web.Show_Document() calls to Oracle Reports Server 6i Introduction...3 solution

More information

MySQL for Beginners Ed 3

MySQL for Beginners Ed 3 Oracle University Contact Us: 1.800.529.0165 MySQL for Beginners Ed 3 Duration: 4 Days What you will learn The MySQL for Beginners course helps you learn about the world's most popular open source database.

More information

IBM Tivoli Storage Manager for Databases Version 7.1.3. Data Protection for Microsoft SQL Server Messages IBM

IBM Tivoli Storage Manager for Databases Version 7.1.3. Data Protection for Microsoft SQL Server Messages IBM IBM Tivoli Storage Manager for Databases Version 7.1.3 Data Protection for Microsoft SQL Server Messages IBM IBM Tivoli Storage Manager for Databases Version 7.1.3 Data Protection for Microsoft SQL Server

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Log Sources User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 108. Copyright

More information

Determine the process of extracting monitoring information in Sun ONE Application Server

Determine the process of extracting monitoring information in Sun ONE Application Server Table of Contents AboutMonitoring1 Sun ONE Application Server 7 Statistics 2 What Can Be Monitored? 2 Extracting Monitored Information. 3 SNMPMonitoring..3 Quality of Service 4 Setting QoS Parameters..

More information

Software Design Document Securing Web Service with Proxy

Software Design Document Securing Web Service with Proxy Software Design Document Securing Web Service with Proxy Federated Access Manager 8.0 Version 0.3 Please send comments to: [email protected] This document is subject to the following license: COMMON

More information

Using SQL Server Management Studio

Using SQL Server Management Studio Using SQL Server Management Studio Microsoft SQL Server Management Studio 2005 is a graphical tool for database designer or programmer. With SQL Server Management Studio 2005 you can: Create databases

More information

DBA Tutorial Kai Voigt Senior MySQL Instructor Sun Microsystems [email protected] Santa Clara, April 12, 2010

DBA Tutorial Kai Voigt Senior MySQL Instructor Sun Microsystems kai@sun.com Santa Clara, April 12, 2010 DBA Tutorial Kai Voigt Senior MySQL Instructor Sun Microsystems [email protected] Santa Clara, April 12, 2010 Certification Details http://www.mysql.com/certification/ Registration at Conference Closed Book

More information

McAfee Network Threat Response (NTR) 4.0

McAfee Network Threat Response (NTR) 4.0 McAfee Network Threat Response (NTR) 4.0 Configuring Automated Reporting and Alerting Automated reporting is supported with introduction of NTR 4.0 and designed to send automated reports via existing SMTP

More information

Enterprise Vault Whitepaper Move Archive Feature Overview

Enterprise Vault Whitepaper Move Archive Feature Overview Enterprise Vault Whitepaper Move Archive Feature Overview This document provides an overview of the Enterprise Vault Move Archive feature This document applies to the following version(s) of :

More information

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1 The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)

More information

System Administration and Log Management

System Administration and Log Management CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

Symantec Endpoint Encryption Full Disk

Symantec Endpoint Encryption Full Disk Symantec Endpoint Encryption Full Disk Policy Administrator Guide Version 8.0.1 Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks

More information

FileMaker 12. ODBC and JDBC Guide

FileMaker 12. ODBC and JDBC Guide FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.

More information

English ETERNUS CS800 S3. Backup Exec OST Guide

English ETERNUS CS800 S3. Backup Exec OST Guide English ETERNUS CS800 S3 Backup Exec OST Guide Edition April 2012 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual. Your feedback helps

More information

How To Use The Jobscheduler On A Linux Box 2.5.2.2 (Jid) On A Pcode (Jio) Or Macbook 2.2 On A Microsoft Powerbook 2 (For A Freebie

How To Use The Jobscheduler On A Linux Box 2.5.2.2 (Jid) On A Pcode (Jio) Or Macbook 2.2 On A Microsoft Powerbook 2 (For A Freebie JobScheduler - Job Execution and Scheduling System JobScheduler Information Dashboard Work Plan and History March 2015 March 2015 JobScheduler page: 1 JobScheduler - Contact Information Contact Information

More information

VMware vcenter Log Insight User's Guide

VMware vcenter Log Insight User's Guide VMware vcenter Log Insight User's Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

OpenSSO Monitoring Euro User Groups Winter 2010

OpenSSO Monitoring Euro User Groups Winter 2010 OpenSSO Monitoring Euro User Groups Winter 2010 Victor Ake Identity Architect ForgeRock.com Agenda What is new in OpenSSO Express 9 Monitoring OpenSSO Express 9 What is new in OpenSSO Expresss 9 Web container

More information

Nimsoft Monitor. ntevl Guide. v3.6 series

Nimsoft Monitor. ntevl Guide. v3.6 series Nimsoft Monitor ntevl Guide v3.6 series Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed, without

More information

Performance in the Infragistics WebDataGrid for Microsoft ASP.NET AJAX. Contents. Performance and User Experience... 2

Performance in the Infragistics WebDataGrid for Microsoft ASP.NET AJAX. Contents. Performance and User Experience... 2 Performance in the Infragistics WebDataGrid for Microsoft ASP.NET AJAX An Infragistics Whitepaper Contents Performance and User Experience... 2 Exceptional Performance Best Practices... 2 Testing the WebDataGrid...

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion. Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On

More information

Central Administration QuickStart Guide

Central Administration QuickStart Guide Central Administration QuickStart Guide Contents 1. Overview... 2 Licensing... 2 Documentation... 2 2. Configuring Central Administration... 3 3. Using the Central Administration web console... 4 Managing

More information

IBM. Implementing SMTP and POP3 Scenarios with WebSphere Business Integration Connect. Author: Ronan Dalton

IBM. Implementing SMTP and POP3 Scenarios with WebSphere Business Integration Connect. Author: Ronan Dalton IBM Implementing SMTP and POP3 Scenarios with WebSphere Business Integration Connect Author: Ronan Dalton Table of Contents Section 1. Introduction... 2 Section 2. Download, Install and Configure ArGoSoft

More information

Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014

Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014 Contents Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014 Copyright (c) 2012-2014 Informatica Corporation. All rights reserved. Installation...

More information

SQL Server Replication Guide

SQL Server Replication Guide SQL Server Replication Guide Rev: 2013-08-08 Sitecore CMS 6.3 and Later SQL Server Replication Guide Table of Contents Chapter 1 SQL Server Replication Guide... 3 1.1 SQL Server Replication Overview...

More information

Using EMC Documentum with Adobe LiveCycle ES

Using EMC Documentum with Adobe LiveCycle ES Technical Guide Using EMC Documentum with Adobe LiveCycle ES Table of contents 1 Deployment 3 Managing LiveCycle ES development assets in Documentum 5 Developing LiveCycle applications with contents in

More information

System Administration Guide

System Administration Guide www.novell.com/documentation System Administration Guide Data Synchronizer 1.2 August 22, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this

More information

Add User to Administrators Group using SQL Lookup Table

Add User to Administrators Group using SQL Lookup Table Add User to Administrators Group using SQL Lookup Table Summary This utility is intended to aid customers in the ability to make the user of a desktop a local administrator on the desktop. In order to

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

Monitoring App V eg Enterprise v6

Monitoring App V eg Enterprise v6 Monitoring App V eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced or

More information

SAML Single-Sign-On (SSO)

SAML Single-Sign-On (SSO) C O L A B O R A T I V E I N N O V A T I O N M A N A G E M E N T Complete Feature Guide SAML Single-Sign-On (SSO) 1. Features This feature allows administrators to setup Single Sign-on (SSO) integration

More information

ODBC Client Driver Help. 2015 Kepware, Inc.

ODBC Client Driver Help. 2015 Kepware, Inc. 2015 Kepware, Inc. 2 Table of Contents Table of Contents 2 4 Overview 4 External Dependencies 4 Driver Setup 5 Data Source Settings 5 Data Source Setup 6 Data Source Access Methods 13 Fixed Table 14 Table

More information

PassMark Software BurnInTest Management Console. Quick start guide

PassMark Software BurnInTest Management Console. Quick start guide PassMark Software BurnInTest Management Console Quick start guide Edition: 1.1 Date: 16 August 2013 BurnInTest Version: 7.1.1011+ BurnInTest is a trademark of PassMark software Overview For BurnInTest

More information

FileNet P8 Platform Directory Service Migration Guide

FileNet P8 Platform Directory Service Migration Guide FileNet P8 Platform Directory Service Migration Guide Release 3.5.1 November 2005 FileNet is a registered trademark of FileNet Corporation. All other product and brand names are trademarks or registered

More information

CA SiteMinder. Federation Security Services Release Notes. r12.0 SP3

CA SiteMinder. Federation Security Services Release Notes. r12.0 SP3 CA SiteMinder Federation Security Services Release Notes r12.0 SP3 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational

More information

UltraLog HSPI User s Guide

UltraLog HSPI User s Guide UltraLog HSPI User s Guide A HomeSeer HS2 plug-in to store and retrieve HomeSeer and syslog events Copyright 2013 [email protected] Revised 01/27/2013 This document contains proprietary and copyrighted

More information

OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com

OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and

More information

DBMS / Business Intelligence, SQL Server

DBMS / Business Intelligence, SQL Server DBMS / Business Intelligence, SQL Server Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the needs of IT professionals.

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

RTI Database Integration Service. Release Notes

RTI Database Integration Service. Release Notes RTI Database Integration Service Release Notes Version 5.2.0 2015 Real-Time Innovations, Inc. All rights reserved. Printed in U.S.A. First printing. June 2015. Trademarks Real-Time Innovations, RTI, NDDS,

More information

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS) w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS) To set up ADFS so that your employees can access Egnyte using their ADFS credentials,

More information

CA SiteMinder. Implementation Guide. r12.0 SP2

CA SiteMinder. Implementation Guide. r12.0 SP2 CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only

More information

Ocean Data Systems Ltd. The Art of Industrial Intelligence. Dream Report GETTING STARTED. User- Friendly Programming-Free Reporting for Automation

Ocean Data Systems Ltd. The Art of Industrial Intelligence. Dream Report GETTING STARTED. User- Friendly Programming-Free Reporting for Automation Ocean Data Systems Ltd. The Art of Industrial Intelligence Dream Report GETTING STARTED User- Friendly Programming-Free Reporting for Automation http://www.dreamreport.net Copyright (R) Ocean Data Systems

More information

DataLogger. 2015 Kepware, Inc.

DataLogger. 2015 Kepware, Inc. 2015 Kepware, Inc. 2 DataLogger Table of Contents Table of Contents 2 DataLogger Help 4 Overview 4 Initial Setup Considerations 5 System Requirements 5 External Dependencies 5 SQL Authentication 6 Windows

More information

TV Server Configuration Fails To Start - get_cards() error. Overview... 2 Origin of the error... 2 Resolution... 2. Related... 5

TV Server Configuration Fails To Start - get_cards() error. Overview... 2 Origin of the error... 2 Resolution... 2. Related... 5 Overview............... 2 Origin of the error........ 2 Resolution.............. 2 Revert Changes.............. 2 Update TV Server Database.... 2 Create New TV Server Database 3 Complete Reinstall............

More information

FileMaker 11. ODBC and JDBC Guide

FileMaker 11. ODBC and JDBC Guide FileMaker 11 ODBC and JDBC Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

EMC Documentum Repository Services for Microsoft SharePoint

EMC Documentum Repository Services for Microsoft SharePoint EMC Documentum Repository Services for Microsoft SharePoint Version 6.5 SP2 Installation Guide P/N 300 009 829 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com

More information

Comparing SQL and NOSQL databases

Comparing SQL and NOSQL databases COSC 6397 Big Data Analytics Data Formats (II) HBase Edgar Gabriel Spring 2015 Comparing SQL and NOSQL databases Types Development History Data Storage Model SQL One type (SQL database) with minor variations

More information

The SkySQL Administration Console

The SkySQL Administration Console www.skysql.com The SkySQL Administration Console Version 1.1 Draft Documentation Overview The SkySQL Administration Console is a web based application for the administration and monitoring of MySQL 1 databases.

More information

SAP HANA - Main Memory Technology: A Challenge for Development of Business Applications. Jürgen Primsch, SAP AG July 2011

SAP HANA - Main Memory Technology: A Challenge for Development of Business Applications. Jürgen Primsch, SAP AG July 2011 SAP HANA - Main Memory Technology: A Challenge for Development of Business Applications Jürgen Primsch, SAP AG July 2011 Why In-Memory? Information at the Speed of Thought Imagine access to business data,

More information

Merit Cloud Media User Guide

Merit Cloud Media User Guide in collaboration with NJEDgeNet Table of Contents 1 Requirements... 3 1.1 Shibboleth... 3 1.2 Administration Hierarchy... 3 2 Administration Hierarchy... 3 3 Manage Videos... 4 3.1 Supported Video Formats...

More information

SQL Server Setup for Assistant/Pro applications Compliance Information Systems

SQL Server Setup for Assistant/Pro applications Compliance Information Systems SQL Server Setup for Assistant/Pro applications Compliance Information Systems The following document covers the process of setting up the SQL Server databases for the Assistant/PRO software products form

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information

Flight Workflow User's Guide. Release 12.0.0

Flight Workflow User's Guide. Release 12.0.0 Flight Workflow User's Guide Release 12.0.0 Copyright 2015 Signiant Inc. All rights reserved. Contents CHAPTER 1 Flight Introduction 4 FlightUploadReference 4 FlightDownloadReference 4 Cloud Storage Configuration

More information

SETTING UP AND RUNNING A WEB SITE ON YOUR LENOVO STORAGE DEVICE WORKING WITH WEB SERVER TOOLS

SETTING UP AND RUNNING A WEB SITE ON YOUR LENOVO STORAGE DEVICE WORKING WITH WEB SERVER TOOLS White Paper SETTING UP AND RUNNING A WEB SITE ON YOUR LENOVO STORAGE DEVICE WORKING WITH WEB SERVER TOOLS CONTENTS Introduction 1 Audience 1 Terminology 1 Enabling a custom home page 1 Adding webmysqlserver

More information

Release Bulletin Sybase ETL Small Business Edition 4.2

Release Bulletin Sybase ETL Small Business Edition 4.2 Release Bulletin Sybase ETL Small Business Edition 4.2 Document ID: DC00737-01-0420-02 Last revised: November 16, 2007 Topic Page 1. Accessing current release bulletin information 2 2. Product summary

More information

Nimsoft Monitor. sysloggtw Guide. v1.4 series

Nimsoft Monitor. sysloggtw Guide. v1.4 series Nimsoft Monitor sysloggtw Guide v1.4 series Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,

More information