Geoff McGregor, Indiana University Integra(ng KC with CAS and LDAP 4/25/2012

Size: px
Start display at page:

Download "Geoff McGregor, Indiana University Integra(ng KC with CAS and LDAP 4/25/2012"

Transcription

1 2012 User Conference April 22-24, 2012 Atlanta, Georgia Together Toward Tomorrow Geoff McGregor, Indiana University Integra(ng KC with CAS and LDAP 4/25/2012 open source administration software for education!

2 Key Concepts Authen;ca;on Prove you are who you say you are Example: enter a username + password In Kuali, a username is also known as a principal Authoriza;on Do you have the right to do what you re trying to do? System uses the authen;cated principal to decide

3 Key Concepts Kuali Iden;ty Management (KIM) Rice module charged with managing en;ty data, authen;ca;on, and authoriza;on for all Rice client applica;ons Can also be bundled within KC and used only by KC Provides a service API and a database- backed reference implementa;on

4 Key Concepts Authen;ca;on Filter Used by Java web applica;ons to intercept incoming requests and check creden;als Rice ships with a simple dummy login filter user must enter a username Recommended for demo instances only not produc;on! You can write your filter to work with any authn provider you choose database, LDAP, X509 cer;ficates, etc.

5 Servlet Filters

6 Adding a new Authen;ca;on Filter You will need to provide a filter to implement your authn mechanism of choice and pass the authen;cated principal to KC We ll implement a CAS filter to look at the KIM principal tables, and also look at how to configure it to query LDAP CAS exercise is an example not your only op;on!

7 Adding a new Authen;ca;on Filter KC project will work with Coeus schools to provide appropriate implementa;ons for func;onal equivalence There s an excellent chance your ins;tu;on already provides a central web authen;ca;on service you just have to hook into it!

8 CAS Authen;ca;on Central Authen;ca;on Service (CAS) A robust single sign- on service that s a really good choice for authen;ca;on hhp://

9 CAS Authen;ca;on source:

10 Registering the filter Must be registered in web.xml You can add addi;onal filters to kc- config.xml and they will be picked up on startup BootstrapFilter.java The appended numerical.x will determine the order in which they are hit

11 Registering the filter For CAS, we will actually register three filters: HIpServletRequestWrapperFilter You can implement single sign- on/sign- out to log in/out of mul;ple webapps connected to the same CAS server Useful if you are running Rice standalone More info: hhps://wiki.kuali.org/x/yrs1eg

12 Kuali- CAS Kuali- CAS is a kuali- fied version of CAS By default, it queries the KIM Principal table org.jasig.cas.client.authen@ca@on.authen@ca@onfilter An LDAP implementa;on is also available on github hhps://github.com/r351574nc3/kuali- cas Wrihen by Leo Przybylski (rsmart) Leo s blog entry: hhp://kualigan.blogspot.com/ 2012/04/ldap- cas- implementa;on.html

13 Kuali- CAS LDAP Integra;on Modify custom.proper;es: ldap.server.url=ldap://localhost:10389 ldap.server.bind.username=uid=admin,ou=system ldap.server.bind.password=secret ldap.authentication.filter=uid=%u,ou=system ldap.searchbase=o=whoniverse Or, use as a reference for your own implementa;on

14 Authen;ca;onService KIM Service for extrac;ng authen;cated principal from incoming request Default is simply request.getremoteuser() If your filter puts the authen;cated principal somewhere else, you ll need to provide an alternate implementa;on of Authen;ca;onService

15 LDAP Integra;on You can also override the KIM services to query LDAP for En;ty informa;on beyond authen;ca;on. Beyond the scope of this exercise, but if you re interested: hhps://wiki.kuali.org/x/fsyreg

16 Mul;campus KC supports mul;campus authen;ca;on Shared usernames across campuses Filtering on campus- specific data KC ships with a dummy mul;campus authen;ca;on filter and authen;ca;on service org.kuali.kra.web.filter.mul;campusdummyl oginfilter

17 Exercise

Invest in security to secure investments. Breaking SAP Portal. Dmitry Chastuhin Principal Researcher at ERPScan

Invest in security to secure investments. Breaking SAP Portal. Dmitry Chastuhin Principal Researcher at ERPScan Invest in security to secure investments Breaking SAP Portal Dmitry Chastuhin Principal Researcher at ERPScan 1 About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security Monitoring Suite

More information

Passwords are for Chumps

Passwords are for Chumps Copyright 2014 Splunk Inc. Passwords are for Chumps David Veuve SE, Splunk Who Am I?! David Veuve Sales Engineer for Major Accounts in Northern California! dveuve@splunk.com! Former Splunk Customer (For

More information

CMU s Transi+on from ISA 2006 to F5 s BIG- IP LTM/APM

CMU s Transi+on from ISA 2006 to F5 s BIG- IP LTM/APM CMU s Transi+on from ISA 2006 to F5 s BIG- IP LTM/APM About Me I m Josh and I m CMU s SharePoint Architect. (Hi Josh) Before CMU 4 years in LAMP/LAPP development & management The Center for Charter Schools

More information

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013 Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty

More information

Identity and Access Positioning of Paradgimo

Identity and Access Positioning of Paradgimo 1 1 Identity and Access Positioning of Paradgimo Olivier Naveau Managing Director assisted by Bruno Guillaume, CISSP IAM in 4D 1. Data Model 2. Functions & Processes 3. Key Components 4. Business Values

More information

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security

More information

The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases

The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases Elba Horta Regional Sales Manager, Southern Europe SSH Communica1ons Security elba.horta@ssh.com ENABLE,

More information

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication

More information

Using Ac+ve Directory and LDAP for directory management kept in sync

Using Ac+ve Directory and LDAP for directory management kept in sync 1 2 Using Ac+ve Directory and LDAP for directory management kept in sync 3 3 different evalua+on a@empts star+ng in mid- 2000 s: First: Inconclusive reluctance to move off of homegrown system BlitzMail

More information

Unified Access for Enterprise Users

Unified Access for Enterprise Users Unified Access for Enterprise Users Informational webinar Chinmay Meghani Liferay Portal Specialist Fulcrum Worldwide, Inc. Mehria Askaryar Business Development Manager Fulcrum Worldwide, Inc. Agenda Introduction

More information

Security Protocols: SSH. Michael E. Locasto University of Calgary

Security Protocols: SSH. Michael E. Locasto University of Calgary Security Protocols: SSH Michael E. Locasto University of Calgary Agenda Philosophy: data protec?on on the network Discussion of SSH SSH history Authen?ca?on Mechanisms SSH2 design overview / architecture

More information

Cloud Security: Yesterday, Today, and Tomorrow

Cloud Security: Yesterday, Today, and Tomorrow Cloud Security: Yesterday, Today, and Tomorrow Presentation by Gunnar Peterson www.arctecgroup.net 2005-9 Arctec Group Everything we think of as a computer today is really just a device that connects to

More information

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements

More information

A detailed walk through a CAS authentication

A detailed walk through a CAS authentication Welcome! First of all, what is CAS? Web single sign on Uses federated authentication, where all authentication is done by the CAS server, instead of individual application servers The implementation is

More information

OAuth2 Ready or not? Dominick Baier h.p://leastprivilege.com @leastprivilege

OAuth2 Ready or not? Dominick Baier h.p://leastprivilege.com @leastprivilege OAuth2 Ready or not? Dominick Baier h.p://leastprivilege.com Dominick Baier Security consultant at thinktecture Focus on security in distributed applica9ons iden9ty management access control Windows/.NET

More information

FTC Data Security Standard

FTC Data Security Standard FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls

More information

The Seven Habits of State-of-the-Art Mobile App Security

The Seven Habits of State-of-the-Art Mobile App Security #mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App

More information

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in

More information

Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765]

Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765] Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765] Irena Shaigorodsky Java One, 2014 ishaigorodsky@enservio.com @ishaigorodsky hops://github.com/ishaigor/rest- retro- sample 1 Quick Survey

More information

Three Step Redirect API

Three Step Redirect API Inspire Commerce &.pay Three Step Redirect API Inspire Commerce 800-261-3173 support@inspirecommerce.com Contents Overview... 3 Methodology... 3 XML Communica:on... 5 Transac:on Opera:ons... 6 Customer

More information

Enabling Collaboration Using the Biomedical Informatics Research Network (BIRN)

Enabling Collaboration Using the Biomedical Informatics Research Network (BIRN) Enabling Collaboration Using the Biomedical Informatics Research Network (BIRN) Carl Kesselman, Ph.D. Information Sciences Institute, University of Southern California March 21, 2012 BIRN Capabilities

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply

More information

Customer Portal User Manual. 2012 Scott Logic Limited. All rights reserve. 2013 Scott Logic Limited. All rights reserved

Customer Portal User Manual. 2012 Scott Logic Limited. All rights reserve. 2013 Scott Logic Limited. All rights reserved Customer Portal User Manual 2012 Scott Logic Limited. All rights reserve Contents Introduction... 2 How should I use it?... 2 How do I login?... 2 How can I change my password?... 3 How can I find out

More information

Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory.

Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory. Enterprise Thousands of companies save 1me and money by using SIMMS to manage their inventory. SIMMS is a powerful inventory management system that enables you to gain fast and accurate control over your

More information

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

Counters & Polls. Dynamic Content 1

Counters & Polls. Dynamic Content 1 Dynamic Content 1 In this tutorial, we ll introduce you to Serif Web Resources and the Smart Objects that you can use to easily add interactivity to your website. In this tutorial, you ll learn how to:

More information

Using the Portal and Direct Messaging HOW TO SETUP AND USE PORTAL AND DIRECT MESSAGING FUNCTIONALITY STARTING IN VERSION 7

Using the Portal and Direct Messaging HOW TO SETUP AND USE PORTAL AND DIRECT MESSAGING FUNCTIONALITY STARTING IN VERSION 7 Using the Portal and Direct Messaging HOW TO SETUP AND USE PORTAL AND DIRECT MESSAGING FUNCTIONALITY STARTING IN VERSION 7 Set up your practice and user accounts Are you an existing Updox user? No Did

More information

Phone Systems Buyer s Guide

Phone Systems Buyer s Guide Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,

More information

CSA SDP Working Group

CSA SDP Working Group CSA SDP Working Group An Open Source Code Project for a Software Defined Perimeter to Defend Cloud Applications from DDoS CSA Conference - Berlin November 2015 DHS Problem Addressing the Changing Perimeter

More information

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4 Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory

More information

Common App Online: The Applicant Perspec5ve

Common App Online: The Applicant Perspec5ve Common App Online: The Applicant Perspec5ve Agenda This presenta,on looks at the processing life cycle of a student s applica,on from registra,on to submission. The CAO 2011-12 Common Applica,on Registra,on

More information

Network Performance Tools

Network Performance Tools Network Performance Tools Jeff Boote Internet2/R&D June 1, 2008 NANOG 43/ Brooklyn, NY Overview BWCTL OWAMP NDT/NPAD BWCTL: What is it? A resource alloca=on and scheduling daemon for arbitra=on of iperf

More information

Centralized Oracle Database Authentication and Authorization in a Directory

Centralized Oracle Database Authentication and Authorization in a Directory Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan Paul.J.Sullivan@oracle.com Principal Security Consultant Kevin Moulton Kevin.moulton@oracle.com Senior Manager,

More information

Exercise Safe Commands and Audit Trail

Exercise Safe Commands and Audit Trail Exercise Safe Commands and Audit Trail Table of Contents Exercise 1: Secure Objects with Safe Commands...2 Exercise 2: Record User Actions in the Audit Trail... 13 3.1 Setting up the SQL Server for Audit

More information

APEX 5 New Features - auch die Kleinen verdienen Beachtung! Dietmar Aust Opal- Consul3ng, Köln www.opal- consul3ng.de

APEX 5 New Features - auch die Kleinen verdienen Beachtung! Dietmar Aust Opal- Consul3ng, Köln www.opal- consul3ng.de APEX 5 New Features - auch die Kleinen verdienen Beachtung! Dietmar Aust Opal- Consul3ng, Köln www.opal- consul3ng.de Opal Consul3ng Building Oracle based Web Applica3ons since 1997 Portal, Forms, Reports,

More information

Authen'cator Leakage Through Backup Channels on Android

Authen'cator Leakage Through Backup Channels on Android Authen'cator Leakage Through Backup Channels on Android Guangdong Bai Na'onal University of Singapore Web services are increasingly delivered through mobile apps Social Networking Online Banking Email

More information

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future Mobility in the Modern Factory Discussion of Mobile Adop7on for the Factories of the Future Talking Points History Lesson The Reasons for Going Mobile Mobile Infrastructure Mobile Device Security BYOD

More information

Kuali Security Request Installation Guide

Kuali Security Request Installation Guide Kuali Security Request Installation Guide Client: Cornell University Date: July, 2011 Contents I. Integration of Rice Code... 2 II. Integration of KFS Code... 4 III. Rice Database Updates... 4 IV. KFS

More information

How to Install SQL Server 2008

How to Install SQL Server 2008 How to Install SQL Server 2008 A Step by Step guide to installing SQL Server 2008 simply and successfully with no prior knowledge Developers and system administrators will find this installation guide

More information

Active Directory Integration for Greentree

Active Directory Integration for Greentree App Number: 010044 Active Directory Integration for Greentree Last Updated 14 th February 2013 Powered by: AppsForGreentree.com 2013 1 Table of Contents Features... 3 Options... 3 Important Notes... 3

More information

Apache web server: ConceI avanza0 (Lezione 2, Parte I) Emiliano Casalicchio (C) emiliano.casalicchio@uniroma1.it

Apache web server: ConceI avanza0 (Lezione 2, Parte I) Emiliano Casalicchio (C) emiliano.casalicchio@uniroma1.it Corso di Proge+azione di Re0 e Sistemi Informa0ci Apache web server: ConceI avanza0 (Lezione 2, Parte I) Emiliano Casalicchio emiliano.casalicchio@uniroma1.it Agenda ConceI e pra0ca sul Virtual hos0ng

More information

INSTALLATION INSTRUCTIONS

INSTALLATION INSTRUCTIONS INSTALLATION INSTRUCTIONS About Practice Perfect Practice Perfect is a client/server application. In other words, there are two parts to the software that make it usable: The server software, which runs

More information

!"#$%&'()*#"+,&-(.#,"*'/'.%-*

!#$%&'()*#+,&-(.#,*'/'.%-* !"#$%&'()*#"+,&-(.#,"*'/'.%-*!01234567* #0894:6;90* '!#'?* 15* =@3* 03A* B30346;90* 98* 10=3B46=3C* 59DA643* 894* %0=34E4153* &359F4G3* -606B3:30=* >%&-?* =@6=* E4921C35* =@3* 836=F435* 60C* 8F0G;90671;35*

More information

Can Cloud Hos+ng Providers Really Replace. Your Cri(cal IT Infrastructure?

Can Cloud Hos+ng Providers Really Replace. Your Cri(cal IT Infrastructure? Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Housekeeping Welcome to Align s Webinar Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Informa+on for

More information

Protec'ng Informa'on Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 10 - Identity Management and Access Control In the News Readings MIS5206 Week 10 Identity Management and Access Control Test Taking Tip Quiz In the News Discuss items

More information

Programming on the Web(CSC309F) Tutorial: Servlets && Tomcat TA:Wael Aboelsaadat

Programming on the Web(CSC309F) Tutorial: Servlets && Tomcat TA:Wael Aboelsaadat Programming on the Web(CSC309F) Tutorial: Servlets && Tomcat TA:Wael Aboelsaadat Acknowledgments : This tutorial is based on a series of articles written by James Goodwill about Tomcat && Servlets. 1 Tomcat

More information

Liferay Enterprise ecommerce. Adding ecommerce functionality to Liferay Reading Time: 10 minutes

Liferay Enterprise ecommerce. Adding ecommerce functionality to Liferay Reading Time: 10 minutes Liferay Enterprise ecommerce Adding ecommerce functionality to Liferay Reading Time: 10 minutes Broadleaf + Liferay ecommerce + Portal Options Integration Details REST APIs Integrated IFrame Separate Conclusion

More information

Website Design. A Crash Course. Monique Sherre, monique@boxcarmarke4ng.com

Website Design. A Crash Course. Monique Sherre, monique@boxcarmarke4ng.com Website Design A Crash Course Monique Sherre, monique@boxcarmarke4ng.com When & Why Do We Re- Design no mobile BoxcarMarke6ng.com aesthe6c update Raincoast.com legacy CMS ABCBookWorld.com new company,

More information

S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference

S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference Shibboleth and Its Integration into Security Architectures Christian Fernau, Francisco Pinto University of Oxford EDUCAUSE & Internet 2 Security Professionals Conference Denver, CO 10-12 April 2006 16:47:29

More information

Administration: Users and Roles

Administration: Users and Roles Last Update: September 2011 Release 7.5 Administration: Users and Roles This lesson is specifically designed for administrators responsible for user security settings in the Astra Schedule system. Astra

More information

<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style

<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style Hudson Security Architecture Click to edit Master subtitle style Winston Prakash Hudson Security Architecture Hudson provides a security mechanism which allows Hudson Administrators

More information

Table of contents. Jasig CAS support for the Spring Security plugin.

Table of contents. Jasig CAS support for the Spring Security plugin. Table of contents Jasig CAS support for the Spring Security plugin. 1 Spring Security ACL Plugin - Reference Documentation Authors: Burt Beckwith Version: 1.0.4 Table of Contents 1 Introduction 1.1 History

More information

Comtrend 1 Port Router Installation Guide CT-5072T

Comtrend 1 Port Router Installation Guide CT-5072T Comtrend 1 Port Router Installation Guide CT-5072T 1 Installing Access Point s DSL Service with a Comtrend Router Thank you for selecting Access Point, Inc. to be your Internet service provider. This guide

More information

SIP Trunk 2 IP-PBX User Guide Asterisk. Ver1.0.0 2015/08/01 Ver1.0.3 2015/09/17 Ver1.0.4 2015/10/07 Ver1.0.5 2015/10/15 Ver1.0.

SIP Trunk 2 IP-PBX User Guide Asterisk. Ver1.0.0 2015/08/01 Ver1.0.3 2015/09/17 Ver1.0.4 2015/10/07 Ver1.0.5 2015/10/15 Ver1.0. SIP Trunk 2 IP-PBX User Guide Asterisk Ver1.0.0 2015/08/01 Ver1.0.3 2015/09/17 Ver1.0.4 2015/10/07 Ver1.0.5 2015/10/15 Ver1.0.6 2015/10/23 Index 1. SIP Trunk 2 Overview 3 2. Purchase/Settings in Web Portal

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Steven Wallace Joint Techs Summer 2011 13- July- 2011 Project Par4cipants BACKGROUND Twelve Universi,es: Caltech, Carnegie Mellon,Cornell George Mason, Indiana

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? Enterprise Computing & Service Management How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend

More information

Quest for Web Single Sign-on at the University of Michigan slides from a poster presentation @ Educause 2003

Quest for Web Single Sign-on at the University of Michigan slides from a poster presentation @ Educause 2003 Quest for Web Single Sign-on at the University of Michigan slides from a poster presentation @ Educause 2003 Abstract: Cosign is a Web single-sign-on system recently deployed at the University of Michigan.

More information

Trademarks: Yellowfin and the Yellowfin Logo are registered trademarks of Yellowfin International.

Trademarks: Yellowfin and the Yellowfin Logo are registered trademarks of Yellowfin International. Yellowfin Release 7 Clustering Guide Under international copyright laws, neither the documentation nor the software may be copied, photocopied, reproduced, translated or reduced to any electronic medium

More information

Pierce County IT Department GIS Division Xuejin Ruan Dan King

Pierce County IT Department GIS Division Xuejin Ruan Dan King Pierce County IT Department GIS Division Xuejin Ruan Dan King Web Application Work Flow Main Topics Authentication Authorization Session Management * Concurrent Session Management * Session Timeout Single

More information

XSEDE12 Panel: Security for Science Gateways and Campus Bridging

XSEDE12 Panel: Security for Science Gateways and Campus Bridging go.illinois.edu/xsede12secpanel XSEDE12 Panel: Security for Science Gateways and Campus Bridging Jim Basney, Randy Butler, Dan Fraser, Suresh Marru, and Craig Stewart July 18, 2012 Panel Agenda Suresh

More information

Installation procedure for Chromis REC for 3CX

Installation procedure for Chromis REC for 3CX Installation procedure for Chromis REC for 3CX According to 3CX recommendations Chromis REC system should be installed on separate computer than 3CX Phone system due to necessary Microsoft SQL Server which

More information

AllSeen Summit 2015: IoT: Taking PKI Where No PKI Has Gone Before Presented by: Scott Rea DigiCert Sr. PKI Architect ALLSEEN ALLIANCE

AllSeen Summit 2015: IoT: Taking PKI Where No PKI Has Gone Before Presented by: Scott Rea DigiCert Sr. PKI Architect ALLSEEN ALLIANCE AllSeen Summit 2015: IoT: Taking PKI Where No PKI Has Gone Before Presented by: Scott Rea DigiCert Sr. PKI Architect Agenda Slide Title 3 Trust and PKI 9 Web Security - PKI example 26 Traditional PKI Principles

More information

Absorb Single Sign-On (SSO) V3.0

Absorb Single Sign-On (SSO) V3.0 Absorb Single Sign-On (SSO) V3.0 Overview Absorb allows single sign-on (SSO) with third-party systems, regardless of the programming language. SSO is made secure by a series of calls (between Absorb and

More information

Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security

Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security With Iden>ty Expert and UnboundID Customer Bill Bonney Today s Speakers Bill Bonney Formerly Director,

More information

CafePilot has 3 components: the Client, Server and Service Request Monitor (or SRM for short).

CafePilot has 3 components: the Client, Server and Service Request Monitor (or SRM for short). Table of Contents Introduction...2 Downloads... 2 Zip Setups... 2 Configuration... 3 Server...3 Client... 5 Service Request Monitor...6 Licensing...7 Frequently Asked Questions... 10 Introduction CafePilot

More information

MSSQL quick start guide

MSSQL quick start guide C u s t o m e r S u p p o r t MSSQL quick start guide This guide will help you: Add a MS SQL database to your account. Find your database. Add additional users. Set your user permissions Upload your database

More information

How To Configure The Jasig Casa Single Sign On On A Workstation On Ahtml.Org On A Server On A Microsoft Server On An Ubuntu 7.5.3 (Windows) On A Linux Computer On A Raspberry V

How To Configure The Jasig Casa Single Sign On On A Workstation On Ahtml.Org On A Server On A Microsoft Server On An Ubuntu 7.5.3 (Windows) On A Linux Computer On A Raspberry V Configuring CAS-based SSO with ActiveVOS on Apache Tomcat Technical Note Version: 1.3 Dated: August 2013 2013 Informatica Corporation ActiveVOS is a trademark of Informatica, Inc. All other company and

More information

Securing a Web Service

Securing a Web Service 1 Securing a Web Service HTTP Basic Authentication and HTTPS/SSL Authentication and Encryption - Read Chaper 32 of the J2EE Tutorial - protected session, described later in this chapter, which ensur content

More information

Top 10 most interes.ng SAP vulnerabili.es and a9acks

Top 10 most interes.ng SAP vulnerabili.es and a9acks Invest in security to secure investments Top 10 most interes.ng SAP vulnerabili.es and a9acks Alexander Polyakov CTO at ERPScan About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security

More information

AUTHENTICATION... 2 Step 1:Set up your LDAP server... 2 Step 2: Set up your username... 4 WRITEBACK REPORT... 8 Step 1: Table structures...

AUTHENTICATION... 2 Step 1:Set up your LDAP server... 2 Step 2: Set up your username... 4 WRITEBACK REPORT... 8 Step 1: Table structures... AUTHENTICATION... 2 Step 1:Set up your LDAP server... 2 Step 2: Set up your username... 4 WRITEBACK REPORT... 8 Step 1: Table structures... 8 Step 2: Import Tables into BI Admin.... 9 Step 3: Creating

More information

Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com @leastprivilege

Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com @leastprivilege Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com think mobile! Dominick Baier Security consultant at thinktecture Focus on security in distributed applica9ons iden9ty management access

More information

MTD Keystone s Multiple Service Platforms

MTD Keystone s Multiple Service Platforms MTD s Multiple Service Platforms uses the Microso/ Office pla5orm and is an MS Access applica:on with integra:on to the common Microso/ Office applica:ons, namely Excel, Word, and Outlook. may be installed

More information

VERALAB LDAP Configuration Guide

VERALAB LDAP Configuration Guide VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to

More information

ClicktoFax Service Usage Manual

ClicktoFax Service Usage Manual ClicktoFax Service Usage Manual 1. Log in to Fax Service 2. Configure your account 3. Send a fax 4. Receive a fax/search for Faxes/View Faxes 5. Logout 6. Additional Support 1. Log into fax service: a.

More information

Replacing a commercial integration platform with an open source ESB. Magnus Larsson magnus.larsson@callistaenterprise.se Cadec 2010-01- 20

Replacing a commercial integration platform with an open source ESB. Magnus Larsson magnus.larsson@callistaenterprise.se Cadec 2010-01- 20 Replacing a commercial integration platform with an open source ESB Magnus Larsson magnus.larsson@callistaenterprise.se Cadec 2010-01- 20 Agenda The customer Phases Problem defini?on Proof of concepts

More information

Grid Engine. The EPIKH Project (Exchange Programme to advance e-infrastructure Know-How)

Grid Engine. The EPIKH Project (Exchange Programme to advance e-infrastructure Know-How) The EPIKH Project (Exchange Programme to advance e-infrastructure Know-How) Grid Engine Riccardo Rotondo (riccardo.rotondo@garr.it) Consortium GARR Joint CHAIN/EPIKH School for Application Porting to Science

More information

What is Drupal, exactly?

What is Drupal, exactly? What is Drupal, exactly? Drupal is an open source content management system used to build and manage websites. A content management system (CMS) is a set of procedures or functions that allow content to

More information

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft 5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft

More information

SSO Plugin. HP Service Request Catalog. J System Solutions. http://www.javasystemsolutions.com Version 3.6

SSO Plugin. HP Service Request Catalog. J System Solutions. http://www.javasystemsolutions.com Version 3.6 SSO Plugin HP Service Request Catalog J System Solutions Version 3.6 Page 2 of 7 Introduction... 3 Adobe Flash and NTLM... 3 Enabling the identity federation service... 4 Federation key... 4 Token lifetime...

More information

How To Add Security Roles On Banner Har Account On A Pc Orca (For A Free Download) On A Microsoft Powerbook (For Free) On An Ipa 2.5 (For An Ipad) On Pc Ora (For

How To Add Security Roles On Banner Har Account On A Pc Orca (For A Free Download) On A Microsoft Powerbook (For Free) On An Ipa 2.5 (For An Ipad) On Pc Ora (For Banner HR Account Request System Login and Usage: Login: 1. Go to http://accounts.unh.edu 2. Click on the IT Accounts Management System button 3. Login Adding Security Roles After logging in the Home screen

More information

HP Service Manager. Service Request Catalog (SRC) Tips & Tricks Document

HP Service Manager. Service Request Catalog (SRC) Tips & Tricks Document HP Service Manager Service Request Catalog (SRC) Tips & Tricks Document (note: in process of updating to support v 9.32) 1 The HP Service Request Catalog (SRC) is a more robust and user- friendly version

More information

SchoolBooking SSO Integration Guide

SchoolBooking SSO Integration Guide SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,

More information

Social Media and the Future of E- Discovery. Bruce Malter, CEDS General Manager, Merrill Corporation Chicago

Social Media and the Future of E- Discovery. Bruce Malter, CEDS General Manager, Merrill Corporation Chicago Social Media and the Future of E- Discovery Bruce Malter, CEDS General Manager, Merrill Corporation Chicago Bruce Malter, CEDS General Manager Merrill Corpora;on Presenter 23 years of technology- based

More information

INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:

INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO: INTRODUCTION: You can extract data (i.e. the total cost report) directly from the Truck Tracker SQL Server database by using a 3 rd party data tools such as Excel or Crystal Reports. Basically any software

More information

Getting Started With SAM Director SAM Director User Guide

Getting Started With SAM Director SAM Director User Guide Getting Started With SAM Director SAM Director User Guide Copyright 2014 License Dashboard Limited. License Dashboard Limited is a trading subsidiary of the Blenheim Group. License Dashboard Limited -

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Volta Log Library user manual

Volta Log Library user manual Volta Log Library user manual www.satellitevolta.com 1 ... 3... 3... 3... 3... 3 www.satellitevolta.com 2 [Ref.01] Volta Log distribution package (volta-log-x.y.z.* http://sourceforge.net/projects/voltalog/files/?source=navbar)

More information

Module - Facebook PS Connect

Module - Facebook PS Connect Module - Facebook PS Connect Operation Date : October 10 th, 2013 Business Tech Installation & Customization Service If you need assistance, we can provide you a full installation and customization service

More information

Securing Business Informa9on in the Cloud

Securing Business Informa9on in the Cloud Securing Business Informa9on in the Cloud For security and IT pros concerned with protec9ng sensi9ve informa9on across mul9ple endpoints and applica9ons. Explore how cloud can enable us to go back to basics

More information

BIRT Application and BIRT Report Deployment Functional Specification

BIRT Application and BIRT Report Deployment Functional Specification Functional Specification Version 1: October 6, 2005 Abstract This document describes how the user will deploy a BIRT Application and BIRT reports to the Application Server. Document Revisions Version Date

More information

Safewhere*Identify 3.4. Release Notes

Safewhere*Identify 3.4. Release Notes Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.

More information

I) Add support for OAuth in CAS server

I) Add support for OAuth in CAS server Table of contents I)Add support for OAuth in CAS server...2 II)How to add OAuth client support in CAS server?...3 A)Add dependency...3 B)Add the identity providers needed...3 C)Add the OAuth action in

More information

EIOBoard Integration with Outlook and Exchange

EIOBoard Integration with Outlook and Exchange Savance Phone: 248-478-2555 Fax: 248-478-3270 www.eioboard.com support@eioboard.com www.savance.com 2014 Table of Contents Overview 3 Exchange Calendar Sync 3 1 Connect... to Exchange 3 2 Exchange... Sync

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

Bank of America Security by Design. Derrick Barksdale Jason Gillam

Bank of America Security by Design. Derrick Barksdale Jason Gillam Bank of America Security by Design Derrick Barksdale Jason Gillam Costs of Correcting Defects 2 Bank of America The Three P s Product Design and build security into our product People Cultivate a security

More information

Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU

Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU Middleware integration in the Sympa mailing list software Olivier Salaün - CRU 1. Sympa, its middleware connectors 2. Sympa web authentication 3. CAS authentication 4. Shibboleth authentication 5. Sympa

More information

Getting Started with Clearlogin A Guide for Administrators V1.01

Getting Started with Clearlogin A Guide for Administrators V1.01 Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality

More information

SUMMIT. November 2010

SUMMIT. November 2010 SUMMIT November 2010 Why Summit? Comprehensive Summit provides a unified approach to IT enterprise management following a prescriptive, ITIL based framework Rapid Deployment Summit is developed for and

More information