Password-based authentication
|
|
|
- Brandon Sharp
- 10 years ago
- Views:
Transcription
1 Lecture topics Authentication and authorization for EJBs Password-based authentication The most popular authentication technology Storing passwords is a problem On the server machines Could encrypt them, but would have to store the key somewhere Solution: store only a hash of the password An attacker wouldn t be able to reconstruct the password from the hash Usability problem good security -> long key -> long passwords Many password hashing approaches use the password itself as a key E.g., to get 128 bits of security, need 20-character passwords, with characters as random as possible
2 Password manipulation pitfalls Displaying password in cleartext on the screen as it is entered Unlimited login attempts Letting users use the same password over a long period of time Using a non-random seed crypt(pw, pw) call in C Leaving passwords around in memory in plaintext E.g. core dump attacks E.g. swaps to the disk Need zero out memory that was taken by the password Access rights to the password database Password selection Problem: people pick things that are easy to remember Prone to dictionary attacks Password systems commonly check that specific password quality standards are satisfied Any suggestions for good password selection criteria? Must be: Easy to remember Hard to guess tbontbtitq!, anyone?
3 Dealing with the problem of having to remember multiple passwords Password safes E.g. PasswordSafe from Counterpane Microsoft attempted to be more than that Microsoft Passport One-time passwords People do wacky things Write their password on a Post-It and stick it to their monitor Send their password in an unencrypted to their colleagues One-time passwords improve security of a password by using a shared secret between the user and the application as a part of the password E.g. SecurID
4 Reminder: role-based access control for EJBs Java Authentication and Authorization Service (JAAS) Used for two purposes: Authentication of users Who is executing our code? Authorization of users Are they allowed to perform security-sensitive operations? Pluggable: different methods for authentication and authorization can be implemented and plugged in the framework
5 JAAS terminology Subject is a source of request for service Could represent a person or a service Modeled as a javax.security.auth.subject object Authentication is he process of verifying the identity of a subject The subject has to provide some evidence to demonstrate its identity Principal is the dentity of a subject A subject can have several principals After authentication, a subject is populated with its principals E.g. a person can have a name principal Joe and an SSN principal Credentials are security-related attributes of a subject (other than principals) E.g. passwords, public key certificates, Kerberos tickets May contain data that enables the subject to perform certain activities E.g., cryptographic keys enable the subject to encrypt messages JAAS authentication User authentication is done in two steps: Instantiate a LoginContext Call the LoginContext s login method Instantiating a LoginContext: Provide a config file entry name and a CallbackHandler to use for communication with the user, e.g.: import javax.security.auth.login.*; import com.sun.security.auth.callback.textcallbackhandler;... LoginContext lc = new LoginContext("JaasSample", new TextCallbackHandler()); The config file jaas.conf will contain: JaasSample { com.sun.security.auth.module.krb5loginmodule required; ; com.sun.security.auth.module.krb5loginmodule can be replaced with any class that implements interface javax.security.auth.spi.loginmodule
6 JAAS authentication, cont. Using a CallbackHandler instance A LoginModule may need to communicate with the user E.g. to ask for username and password LoginModule uses a javax.security.auth.callback.callbackhandler instance for this communication Calling the LoginContext's login Method It actually carries out the authentication process: lc.login() Instantiates a new empty javax.security.auth.subject object Represents the user or service being authenticated Constructs the LoginModule and initializes it with the subject and CallbackHandler Calls methods in the LoginModule to perform the login (uses CallbackHandler to get the required info) If authentication is successful, the LoginModule populates the subject with a principal representing the user and user credentials
7 JAAS-based security in JBoss The EJB container intercepts calls to EJB methods and delegates the tasks of principal authentication and principal role mapping to two different security interfaces: org.jboss.security.ejbsecuritymanager org.jboss.security.realmmapping JBoss has a number of implementations of these interfaces in package org.jboss.security.plugins.samples The default security implementation consists of a JMX service bean org.jboss.security.plugins.jaassecuritymana gerservice and a JAAS-based implementation of both interfaces org.jboss.security.plugins.jaassecuritymana ger Configuring LoginModules to work with JaasSecurityManager The UsersRolesLoginModule class is a simple properties file based implemention that uses two Java Properties (users.properties and roles.properties) to perform authentication and role mapping users.properties: username1=password1 username2=password2... roles.properties: username1=role1[,role2,...] username2=role1...
8 The LoginModule configuration file This is where JAAS looks to find out what LoginModule implementation to use The default file for JBoss: ${jboss_home)/conf/default/auth.conf Syntax and example: name { login_module_class_name (required optional...) [options] ; ; example1 { org.jboss.security.auth.spi.usersrolesloginmodule required ; ; Use of the configuration file The name of the security configuration has to be used in jboss.xml <?xml version="1.0" encoding="utf-8"?> <jboss> <security-domain>java:/jaas/example1</security-domain> <enterprise-beans>
9 Example server code public class StatefulSessionBean implements SessionBean { private SessionContext sessioncontext; public void ejbcreate() throws CreateException { System.out.println("StatefulSessionBean.ejbCreate() called"); public void setsessioncontext(sessioncontext context) { sessioncontext = context; public String echo(string arg){ System.out.println("StatefulSessionBean.echo, arg="+arg); Principal p = sessioncontext.getcallerprincipal(); System.out.println("StatefulSessionBean.echo, callerprincipal="+p); return arg; public void noop() { System.out.println("StatefulSessionBean.noop"); Principal p = sessioncontext.getcallerprincipal(); System.out.println("StatefulSessionBean.noop, callerprincipal="+p); Example client code public static void main(string args[]) throws Exception { if( args.length!= 3 ) throw new IllegalArgumentException("Usage: username password example"); String name = args[0]; char[] password = args[1].tochararray(); String example = args[2]; try { AppCallbackHandler handler = new AppCallbackHandler(name, password); LoginContext lc = new LoginContext("TestClient", handler); lc.login(); catch (LoginException le) { System.out.println("Login failed"); System.exit(1); try { InitialContext inicontext = new InitialContext(); SessionHome home = (SessionHome) inicontext.lookup(example+"/statelesssession"); Session bean = home.create(); System.out.println("Bean.echo('Hello') -> "+bean.echo("hello")); bean.remove(); catch(exception e) {System.exit(1)
10 Example client code, cont. static class AppCallbackHandler implements CallbackHandler { private String username; private char[] password; public AppCallbackHandler(String username, char[] password) { this.username = username; this.password = password; public void handle(callback[] callbacks) throws java.io.ioexception, UnsupportedCallbackException { for (int i = 0; i < callbacks.length; i++) { if (callbacks[i] instanceof NameCallback) { NameCallback nc = (NameCallback)callbacks[i]; nc.setname(username); else if (callbacks[i] instanceof PasswordCallback) { PasswordCallback pc = (PasswordCallback)callbacks[i]; pc.setpassword(password); else { throw new UnsupportedCallbackException(callbacks[i], "Unrecognized Callback"); User authentication in JBoss: JBossSX framework javax.ejb.ejbcontext defines the security context in the EJB container public boolean iscallerinrole(string rolename) checks if the caller has the specified role public java.security.principal getcallerprincipal() returns the Principal object that identifies the caller
11 Security proxies in JBoss org.jboss.security.securityproxy void invoke(method m, Object [] args, Object bean) An additional layer between clients and beans Convenient for custom security checks
Using jlock s Java Authentication and Authorization Service (JAAS) for Application-Level Security
Using jlock s Java Authentication and Authorization Service (JAAS) for Application-Level Security Introduction Updated January 2006 www.2ab.com Access management is a simple concept. Every business has
JAAS Java Authentication and Authorization Services
JAAS Java Authentication and Authorization Services Bruce A Rich Java Security Lead IBM/Tivoli Systems Java is a trademark and Java 2 is a registered trademark of Sun Microsystems Inc. Trademarks Java,
Web Application Access Control with Java SE Security
Web Application Access Control with Java SE Security Java Forum Stuttgart 2009 Jürgen Groothues Stuttgart, Agenda 1. Access Control Basics 2. The Java Authentication and Authorization Service (JAAS) 3.
Red Hat JBoss Enterprise Application Platform 6.4 Login Module Reference
Red Hat JBoss Enterprise Application Platform 6.4 Login Module Reference Login Module Reference Red Hat Customer Content Services Red Hat JBoss Enterprise Application Platform 6.4 Login Module Reference
Configuring Integrated Windows Authentication for JBoss with SAS 9.3 Web Applications
Configuring Integrated Windows Authentication for JBoss with SAS 9.3 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
A Pluggable Security Framework for Message Oriented Middleware
A Pluggable Security Framework for Message Oriented Middleware RUEY-SHYANG WU, SHYAN-MING YUAN Department of Computer Science National Chiao-Tung University 1001 Ta Hsueh Road, Hsinchu 300, TAIWAN, R.
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
European Access Point for Truck Parking Data
Delegated Regulation (EU) N 885/2013 of 15 May 2013 with regard to the provision of information services for safe and secure parking places for trucks and commercial vehicles European Access Point for
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
JBoss Enterprise Application Platform 6.2 Security Guide
JBoss Enterprise Application Platform 6.2 Security Guide For Use with Red Hat JBoss Enterprise Application Platform 6 Edition 1 Nidhi Chaudhary Lucas Costi Russell Dickenson Sande Gilda Vikram Goyal Eamon
Java E-Commerce Martin Cooke, 2002 1
Java E-Commerce Martin Cooke, 2002 1 Enterprise Java Beans: an introduction Today s lecture Why is enterprise computing so complex? Component models and containers Session beans Entity beans Why is enterprise
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Brekeke PBX Web Service
Brekeke PBX Web Service User Guide Brekeke Software, Inc. Version Brekeke PBX Web Service User Guide Revised October 16, 2006 Copyright This document is copyrighted by Brekeke Software, Inc. Copyright
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Using ilove SharePoint Web Services Workflow Action
Using ilove SharePoint Web Services Workflow Action This guide describes the steps to create a workflow that will add some information to Contacts in CRM. As an example, we will use demonstration site
Project Software Security: Securing SendMail with JAAS and Polymer
Project Software Security: Securing SendMail with JAAS and Polymer Frank van Vliet [email protected] Diego Ortiz Yepes [email protected] Jornt van der Wiel [email protected] Guido Kok
Security Code Review- Identifying Web Vulnerabilities
Security Code Review- Identifying Web Vulnerabilities Kiran Maraju, CISSP, CEH, ITIL, SCJP Email: [email protected] 1 1.1.1 Abstract Security Code Review- Identifying Web Vulnerabilities This paper
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
Services. Relational. Databases & JDBC. Today. Relational. Databases SQL JDBC. Next Time. Services. Relational. Databases & JDBC. Today.
& & 1 & 2 Lecture #7 2008 3 Terminology Structure & & Database server software referred to as Database Management Systems (DBMS) Database schemas describe database structure Data ordered in tables, rows
EJB 3.0 and IIOP.NET. Table of contents. Stefan Jäger / [email protected] 2007-10-10
Stefan Jäger / [email protected] EJB 3.0 and IIOP.NET 2007-10-10 Table of contents 1. Introduction... 2 2. Building the EJB Sessionbean... 3 3. External Standard Java Client... 4 4. Java Client with
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications
Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5
Single sign-on for ASP.Net and SharePoint
Single sign-on for ASP.Net and SharePoint Author: Abhinav Maheshwari, 3Pillar Labs Introduction In most organizations using Microsoft platform, there are more than one ASP.Net applications for internal
Apache Ki (formerly JSecurity) DevNexus - 2009
Apache Ki (formerly JSecurity) DevNexus - 2009 Introduction Jeremy Haile Project Co-Founder VP Product Development, WeTheCitizens Agenda What is Apache Ki? Terminology Authentication, Authorization, Session
VPN Client User s Guide. 9235966 Issue 2
VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o Presented by: Smitha Sundareswaran Chi Tsong Su Introduction Kerberos: An authentication protocol based on
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
Configuring Secure Socket Layer (SSL)
7 Configuring Secure Socket Layer (SSL) Contents Overview...................................................... 7-2 Terminology................................................... 7-3 Prerequisite for Using
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
An Introduction to Application Security in J2EE Environments
An Introduction to Application Security in J2EE Environments Dan Cornell Denim Group, Ltd. www.denimgroup.com Overview Background What is Application Security and Why is It Important? Specific Reference
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
Virtual Code Authentication User s Guide. June 25, 2015
Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
AT&T Synaptic Storage as a Service SM Getting Started Guide
AT&T Synaptic Storage as a Service SM Getting Started Guide Version 3.0 2011 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. All other
Internal Penetration Test
Internal Penetration Test Agenda Time Agenda Item 10:00 10:15 Introduction 10:15 12:15 Seminar: Web Application Penetration Test 12:15 12:30 Break 12:30 13:30 Seminar: Social Engineering Test 13:30 15:00
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
Managed Portable Security Devices
Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
kalmstrom.com Business Solutions
HelpDesk OSP User Manual Content 1 INTRODUCTION... 3 2 REQUIREMENTS... 4 3 THE SHAREPOINT SITE... 4 4 THE HELPDESK OSP TICKET... 5 5 INSTALLATION OF HELPDESK OSP... 7 5.1 INTRODUCTION... 7 5.2 PROCESS...
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
10 steps to better secure your Mac laptop from physical data theft
10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context
Secure PostgreSQL Deployments
Secure PostgreSQL Deployments pgcon.br 2009 Campinas, Brazil Magnus Hagander Redpill Linpro AB There's much to security Identify the threats Apply the correct measures Don't do things just because you
A Guide for Administrators
User Guide for JBoss Negotiation A Guide for Administrators Darran A. Lofthouse ISBN: Publication date: User Guide for JBoss Negotiation User Guide for JBoss Negotiation: A Guide for Administrators by
Virtual Code Authentication User Guide for Administrators
Virtual Code Authentication User Guide for Administrators Virtual Code Authentication - User Guide for Administrators Document No.: 05-001 2001-2015 All rights reserved. Under copyright laws, this document
Securing corporate assets with two factor authentication
WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for
User Identification and Authentication Concepts
Chapter 1 User Identification and Authentication Concepts The modern world needs people with a complex identity who are intellectually autonomous and prepared to cope with uncertainty; who are able to
Personal Secure Email Certificate
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:
INTRODUCTION: You can extract data (i.e. the total cost report) directly from the Truck Tracker SQL Server database by using a 3 rd party data tools such as Excel or Crystal Reports. Basically any software
Module 13 Implementing Java EE Web Services with JAX-WS
Module 13 Implementing Java EE Web Services with JAX-WS Objectives Describe endpoints supported by Java EE 5 Describe the requirements of the JAX-WS servlet endpoints Describe the requirements of JAX-WS
4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
J2EE Web Development. Agenda. Application servers. What is J2EE? Main component types Application Scenarios J2EE APIs and Services.
J2EE Web Development Agenda Application servers What is J2EE? Main component types Application Scenarios J2EE APIs and Services Examples 1 1. Application Servers In the beginning, there was darkness and
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING a Class IIIc SSL Certificate using BEA Weblogic V ERSION 1.0 Page 1 of 8 Procedure for
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications
Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
Architecture of Enterprise Applications III Single Sign-On
Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
Developing Applications for SSO
Developing Applications for SSO Justen Stepka Authentisoft, LLC www.authentisoft.com Overview Introduction What is SSO Designing and Implementing for SSO environments Available Solutions Introduction Justen
Enterprise SSO Manager (E-SSO-M)
Enterprise SSO Manager (E-SSO-M) Many resources, such as internet applications, internal network applications and Operating Systems, require the end user to log in several times before they are empowered
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Onset Computer Corporation
Onset, HOBO, and HOBOlink are trademarks or registered trademarks of Onset Computer Corporation for its data logger products and configuration/interface software. All other trademarks are the property
Project: Simulated Encrypted File System (SEFS)
Project: Simulated Encrypted File System (SEFS) Omar Chowdhury Fall 2015 CS526: Information Security 1 Motivation Traditionally files are stored in the disk in plaintext. If the disk gets stolen by a perpetrator,
First Java Programs. V. Paúl Pauca. CSC 111D Fall, 2015. Department of Computer Science Wake Forest University. Introduction to Computer Science
First Java Programs V. Paúl Pauca Department of Computer Science Wake Forest University CSC 111D Fall, 2015 Hello World revisited / 8/23/15 The f i r s t o b l i g a t o r y Java program @author Paul Pauca
No no-argument constructor. No default constructor found
Every software developer deals with bugs. The really tough bugs aren t detected by the compiler. Nasty bugs manifest themselves only when executed at runtime. Here is a list of the top ten difficult and
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
DOMAIN CENTRAL HOSTING EMAIL
Welcome to our hosting services, we have created the following documents to help you get up and running as quickly as possible. If at any stage you encounter difficulties, you are welcome to send a help
System Security Fundamentals
System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.
Name: 1 CSE331: Introduction to Networks and Security Final Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35 Total /135 Do not begin the exam until you are told to do so. You
Software Engineering I CS524 Professor Dr. Liang Sheldon X. Liang
Software Requirement Specification Employee Tracking System Software Engineering I CS524 Professor Dr. Liang Sheldon X. Liang Team Members Seung Yang, Nathan Scheck, Ernie Rosales Page 1 Software Requirements
Brekeke PBX Version 3 Web Service Developer s Guide Brekeke Software, Inc.
Brekeke PBX Version 3 Web Service Developer s Guide Brekeke Software, Inc. Version Brekeke PBX Version 3 Web Service Developer s Guide Revised August 2013 Copyright This document is copyrighted by Brekeke
Using FreePBX with Twilio Elastic SIP Trunking
Using FreePBX with Twilio Elastic SIP Trunking FreePBX works great with Twilio! We support it, it is what many of us use. There are a few tricks, especially for Origination, that are documented here, that
Overview of Web Services API
1 CHAPTER The Cisco IP Interoperability and Collaboration System (IPICS) 4.5(x) application programming interface (API) provides a web services-based API that enables the management and control of various
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
FreeRADIUS Install and Configuration. Joel Jaeggli 05/04/2006
FreeRADIUS Install and Configuration Joel Jaeggli 05/04/2006 What is RADIUS? A AAA protocol (Authentication, Authorization and Accounting). Authentication Confirmation that the user is who they say they
HOBCOM and HOBLink J-Term
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Germany Tel: +49 09103 / 715-0 Fax: +49 09103 / 715-271 E-Mail: [email protected] Internet: www.hobsoft.com HOBCOM and HOBLink J-Term Single Sign-On
RSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
NETWORK SECURITY: How do servers store passwords?
NETWORK SECURITY: How do servers store passwords? Servers avoid storing the passwords in plaintext on their servers to avoid possible intruders to gain all their users passwords. A hash of each password
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
Kerberos. Login via Password. Keys in Kerberos
Kerberos Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos
1.00 Lecture 1. Course information Course staff (TA, instructor names on syllabus/faq): 2 instructors, 4 TAs, 2 Lab TAs, graders
1.00 Lecture 1 Course Overview Introduction to Java Reading for next time: Big Java: 1.1-1.7 Course information Course staff (TA, instructor names on syllabus/faq): 2 instructors, 4 TAs, 2 Lab TAs, graders
BusinessObjects 4.0 Windows AD Single Sign on Configuration
TUBusinessObjects 4.0 Single Sign OnUT BusinessObjects 4.0 Single Sign On also called SSO with Windows AD requires few steps to take. Most of the steps are dependent on each other. Certain steps cannot
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Configuring Integrated Windows Authentication for Oracle WebLogic with SAS 9.2 Web Applications
Configuring Integrated Windows Authentication for Oracle WebLogic with SAS 9.2 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
