Geoff McGregor, Indiana University Integra(ng KC with CAS and LDAP 4/25/2012
|
|
- Allyson Reynolds
- 8 years ago
- Views:
Transcription
1 2012 User Conference April 22-24, 2012 Atlanta, Georgia Together Toward Tomorrow Geoff McGregor, Indiana University Integra(ng KC with CAS and LDAP 4/25/2012 open source administration software for education!
2 Key Concepts Authen;ca;on Prove you are who you say you are Example: enter a username + password In Kuali, a username is also known as a principal Authoriza;on Do you have the right to do what you re trying to do? System uses the authen;cated principal to decide
3 Key Concepts Kuali Iden;ty Management (KIM) Rice module charged with managing en;ty data, authen;ca;on, and authoriza;on for all Rice client applica;ons Can also be bundled within KC and used only by KC Provides a service API and a database- backed reference implementa;on
4 Key Concepts Authen;ca;on Filter Used by Java web applica;ons to intercept incoming requests and check creden;als Rice ships with a simple dummy login filter user must enter a username Recommended for demo instances only not produc;on! You can write your filter to work with any authn provider you choose database, LDAP, X509 cer;ficates, etc.
5 Servlet Filters
6 Adding a new Authen;ca;on Filter You will need to provide a filter to implement your authn mechanism of choice and pass the authen;cated principal to KC We ll implement a CAS filter to look at the KIM principal tables, and also look at how to configure it to query LDAP CAS exercise is an example not your only op;on!
7 Adding a new Authen;ca;on Filter KC project will work with Coeus schools to provide appropriate implementa;ons for func;onal equivalence There s an excellent chance your ins;tu;on already provides a central web authen;ca;on service you just have to hook into it!
8 CAS Authen;ca;on Central Authen;ca;on Service (CAS) A robust single sign- on service that s a really good choice for authen;ca;on hhp://
9 CAS Authen;ca;on source:
10 Registering the filter Must be registered in web.xml You can add addi;onal filters to kc- config.xml and they will be picked up on startup BootstrapFilter.java The appended numerical.x will determine the order in which they are hit
11 Registering the filter For CAS, we will actually register three filters: HIpServletRequestWrapperFilter You can implement single sign- on/sign- out to log in/out of mul;ple webapps connected to the same CAS server Useful if you are running Rice standalone More info: hhps://wiki.kuali.org/x/yrs1eg
12 Kuali- CAS Kuali- CAS is a kuali- fied version of CAS By default, it queries the KIM Principal table org.jasig.cas.client.authen@ca@on.authen@ca@onfilter An LDAP implementa;on is also available on github hhps://github.com/r351574nc3/kuali- cas Wrihen by Leo Przybylski (rsmart) Leo s blog entry: hhp://kualigan.blogspot.com/ 2012/04/ldap- cas- implementa;on.html
13 Kuali- CAS LDAP Integra;on Modify custom.proper;es: ldap.server.url=ldap://localhost:10389 ldap.server.bind.username=uid=admin,ou=system ldap.server.bind.password=secret ldap.authentication.filter=uid=%u,ou=system ldap.searchbase=o=whoniverse Or, use as a reference for your own implementa;on
14 Authen;ca;onService KIM Service for extrac;ng authen;cated principal from incoming request Default is simply request.getremoteuser() If your filter puts the authen;cated principal somewhere else, you ll need to provide an alternate implementa;on of Authen;ca;onService
15 LDAP Integra;on You can also override the KIM services to query LDAP for En;ty informa;on beyond authen;ca;on. Beyond the scope of this exercise, but if you re interested: hhps://wiki.kuali.org/x/fsyreg
16 Mul;campus KC supports mul;campus authen;ca;on Shared usernames across campuses Filtering on campus- specific data KC ships with a dummy mul;campus authen;ca;on filter and authen;ca;on service org.kuali.kra.web.filter.mul;campusdummyl oginfilter
17 Exercise
Invest in security to secure investments. Breaking SAP Portal. Dmitry Chastuhin Principal Researcher at ERPScan
Invest in security to secure investments Breaking SAP Portal Dmitry Chastuhin Principal Researcher at ERPScan 1 About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security Monitoring Suite
More informationPasswords are for Chumps
Copyright 2014 Splunk Inc. Passwords are for Chumps David Veuve SE, Splunk Who Am I?! David Veuve Sales Engineer for Major Accounts in Northern California! dveuve@splunk.com! Former Splunk Customer (For
More informationCMU s Transi+on from ISA 2006 to F5 s BIG- IP LTM/APM
CMU s Transi+on from ISA 2006 to F5 s BIG- IP LTM/APM About Me I m Josh and I m CMU s SharePoint Architect. (Hi Josh) Before CMU 4 years in LAMP/LAPP development & management The Center for Charter Schools
More informationUsing FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013
Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty
More informationIdentity and Access Positioning of Paradgimo
1 1 Identity and Access Positioning of Paradgimo Olivier Naveau Managing Director assisted by Bruno Guillaume, CISSP IAM in 4D 1. Data Model 2. Functions & Processes 3. Key Components 4. Business Values
More informationVoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
More informationThe Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases
The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases Elba Horta Regional Sales Manager, Southern Europe SSH Communica1ons Security elba.horta@ssh.com ENABLE,
More informationIdentity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
More informationUsing Ac+ve Directory and LDAP for directory management kept in sync
1 2 Using Ac+ve Directory and LDAP for directory management kept in sync 3 3 different evalua+on a@empts star+ng in mid- 2000 s: First: Inconclusive reluctance to move off of homegrown system BlitzMail
More informationUnified Access for Enterprise Users
Unified Access for Enterprise Users Informational webinar Chinmay Meghani Liferay Portal Specialist Fulcrum Worldwide, Inc. Mehria Askaryar Business Development Manager Fulcrum Worldwide, Inc. Agenda Introduction
More informationSecurity Protocols: SSH. Michael E. Locasto University of Calgary
Security Protocols: SSH Michael E. Locasto University of Calgary Agenda Philosophy: data protec?on on the network Discussion of SSH SSH history Authen?ca?on Mechanisms SSH2 design overview / architecture
More informationCloud Security: Yesterday, Today, and Tomorrow
Cloud Security: Yesterday, Today, and Tomorrow Presentation by Gunnar Peterson www.arctecgroup.net 2005-9 Arctec Group Everything we think of as a computer today is really just a device that connects to
More informationHunk & Elas=c MapReduce: Big Data Analy=cs on AWS
Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements
More informationA detailed walk through a CAS authentication
Welcome! First of all, what is CAS? Web single sign on Uses federated authentication, where all authentication is done by the CAS server, instead of individual application servers The implementation is
More informationOAuth2 Ready or not? Dominick Baier h.p://leastprivilege.com @leastprivilege
OAuth2 Ready or not? Dominick Baier h.p://leastprivilege.com Dominick Baier Security consultant at thinktecture Focus on security in distributed applica9ons iden9ty management access control Windows/.NET
More informationFTC Data Security Standard
FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls
More informationThe Seven Habits of State-of-the-Art Mobile App Security
#mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App
More informationMobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in
More informationRetrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765]
Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765] Irena Shaigorodsky Java One, 2014 ishaigorodsky@enservio.com @ishaigorodsky hops://github.com/ishaigor/rest- retro- sample 1 Quick Survey
More informationThree Step Redirect API
Inspire Commerce &.pay Three Step Redirect API Inspire Commerce 800-261-3173 support@inspirecommerce.com Contents Overview... 3 Methodology... 3 XML Communica:on... 5 Transac:on Opera:ons... 6 Customer
More informationEnabling Collaboration Using the Biomedical Informatics Research Network (BIRN)
Enabling Collaboration Using the Biomedical Informatics Research Network (BIRN) Carl Kesselman, Ph.D. Information Sciences Institute, University of Southern California March 21, 2012 BIRN Capabilities
More informationRemote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
More informationHow To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook
How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply
More informationCustomer Portal User Manual. 2012 Scott Logic Limited. All rights reserve. 2013 Scott Logic Limited. All rights reserved
Customer Portal User Manual 2012 Scott Logic Limited. All rights reserve Contents Introduction... 2 How should I use it?... 2 How do I login?... 2 How can I change my password?... 3 How can I find out
More informationEnterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory.
Enterprise Thousands of companies save 1me and money by using SIMMS to manage their inventory. SIMMS is a powerful inventory management system that enables you to gain fast and accurate control over your
More informationPrivileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
More informationCounters & Polls. Dynamic Content 1
Dynamic Content 1 In this tutorial, we ll introduce you to Serif Web Resources and the Smart Objects that you can use to easily add interactivity to your website. In this tutorial, you ll learn how to:
More informationUsing the Portal and Direct Messaging HOW TO SETUP AND USE PORTAL AND DIRECT MESSAGING FUNCTIONALITY STARTING IN VERSION 7
Using the Portal and Direct Messaging HOW TO SETUP AND USE PORTAL AND DIRECT MESSAGING FUNCTIONALITY STARTING IN VERSION 7 Set up your practice and user accounts Are you an existing Updox user? No Did
More informationPhone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
More informationUpdate on the Cloud Demonstration Project
Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,
More informationCSA SDP Working Group
CSA SDP Working Group An Open Source Code Project for a Software Defined Perimeter to Defend Cloud Applications from DDoS CSA Conference - Berlin November 2015 DHS Problem Addressing the Changing Perimeter
More informationOpen Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4
Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory
More informationCommon App Online: The Applicant Perspec5ve
Common App Online: The Applicant Perspec5ve Agenda This presenta,on looks at the processing life cycle of a student s applica,on from registra,on to submission. The CAO 2011-12 Common Applica,on Registra,on
More informationNetwork Performance Tools
Network Performance Tools Jeff Boote Internet2/R&D June 1, 2008 NANOG 43/ Brooklyn, NY Overview BWCTL OWAMP NDT/NPAD BWCTL: What is it? A resource alloca=on and scheduling daemon for arbitra=on of iperf
More informationCentralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan Paul.J.Sullivan@oracle.com Principal Security Consultant Kevin Moulton Kevin.moulton@oracle.com Senior Manager,
More informationExercise Safe Commands and Audit Trail
Exercise Safe Commands and Audit Trail Table of Contents Exercise 1: Secure Objects with Safe Commands...2 Exercise 2: Record User Actions in the Audit Trail... 13 3.1 Setting up the SQL Server for Audit
More informationAPEX 5 New Features - auch die Kleinen verdienen Beachtung! Dietmar Aust Opal- Consul3ng, Köln www.opal- consul3ng.de
APEX 5 New Features - auch die Kleinen verdienen Beachtung! Dietmar Aust Opal- Consul3ng, Köln www.opal- consul3ng.de Opal Consul3ng Building Oracle based Web Applica3ons since 1997 Portal, Forms, Reports,
More informationAuthen'cator Leakage Through Backup Channels on Android
Authen'cator Leakage Through Backup Channels on Android Guangdong Bai Na'onal University of Singapore Web services are increasingly delivered through mobile apps Social Networking Online Banking Email
More informationMobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future
Mobility in the Modern Factory Discussion of Mobile Adop7on for the Factories of the Future Talking Points History Lesson The Reasons for Going Mobile Mobile Infrastructure Mobile Device Security BYOD
More informationKuali Security Request Installation Guide
Kuali Security Request Installation Guide Client: Cornell University Date: July, 2011 Contents I. Integration of Rice Code... 2 II. Integration of KFS Code... 4 III. Rice Database Updates... 4 IV. KFS
More informationHow to Install SQL Server 2008
How to Install SQL Server 2008 A Step by Step guide to installing SQL Server 2008 simply and successfully with no prior knowledge Developers and system administrators will find this installation guide
More informationActive Directory Integration for Greentree
App Number: 010044 Active Directory Integration for Greentree Last Updated 14 th February 2013 Powered by: AppsForGreentree.com 2013 1 Table of Contents Features... 3 Options... 3 Important Notes... 3
More informationApache web server: ConceI avanza0 (Lezione 2, Parte I) Emiliano Casalicchio (C) emiliano.casalicchio@uniroma1.it
Corso di Proge+azione di Re0 e Sistemi Informa0ci Apache web server: ConceI avanza0 (Lezione 2, Parte I) Emiliano Casalicchio emiliano.casalicchio@uniroma1.it Agenda ConceI e pra0ca sul Virtual hos0ng
More informationINSTALLATION INSTRUCTIONS
INSTALLATION INSTRUCTIONS About Practice Perfect Practice Perfect is a client/server application. In other words, there are two parts to the software that make it usable: The server software, which runs
More information!"#$%&'()*#"+,&-(.#,"*'/'.%-*
!"#$%&'()*#"+,&-(.#,"*'/'.%-*!01234567* #0894:6;90* '!#'?* 15* =@3* 03A* B30346;90* 98* 10=3B46=3C* 59DA643* 894* %0=34E4153* &359F4G3* -606B3:30=* >%&-?* =@6=* E4921C35* =@3* 836=F435* 60C* 8F0G;90671;35*
More informationCan Cloud Hos+ng Providers Really Replace. Your Cri(cal IT Infrastructure?
Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Housekeeping Welcome to Align s Webinar Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Informa+on for
More informationProtec'ng Informa'on Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 10 - Identity Management and Access Control In the News Readings MIS5206 Week 10 Identity Management and Access Control Test Taking Tip Quiz In the News Discuss items
More informationProgramming on the Web(CSC309F) Tutorial: Servlets && Tomcat TA:Wael Aboelsaadat
Programming on the Web(CSC309F) Tutorial: Servlets && Tomcat TA:Wael Aboelsaadat Acknowledgments : This tutorial is based on a series of articles written by James Goodwill about Tomcat && Servlets. 1 Tomcat
More informationLiferay Enterprise ecommerce. Adding ecommerce functionality to Liferay Reading Time: 10 minutes
Liferay Enterprise ecommerce Adding ecommerce functionality to Liferay Reading Time: 10 minutes Broadleaf + Liferay ecommerce + Portal Options Integration Details REST APIs Integrated IFrame Separate Conclusion
More informationWebsite Design. A Crash Course. Monique Sherre, monique@boxcarmarke4ng.com
Website Design A Crash Course Monique Sherre, monique@boxcarmarke4ng.com When & Why Do We Re- Design no mobile BoxcarMarke6ng.com aesthe6c update Raincoast.com legacy CMS ABCBookWorld.com new company,
More informationS P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference
Shibboleth and Its Integration into Security Architectures Christian Fernau, Francisco Pinto University of Oxford EDUCAUSE & Internet 2 Security Professionals Conference Denver, CO 10-12 April 2006 16:47:29
More informationAdministration: Users and Roles
Last Update: September 2011 Release 7.5 Administration: Users and Roles This lesson is specifically designed for administrators responsible for user security settings in the Astra Schedule system. Astra
More information<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style
Hudson Security Architecture Click to edit Master subtitle style Winston Prakash Hudson Security Architecture Hudson provides a security mechanism which allows Hudson Administrators
More informationTable of contents. Jasig CAS support for the Spring Security plugin.
Table of contents Jasig CAS support for the Spring Security plugin. 1 Spring Security ACL Plugin - Reference Documentation Authors: Burt Beckwith Version: 1.0.4 Table of Contents 1 Introduction 1.1 History
More informationComtrend 1 Port Router Installation Guide CT-5072T
Comtrend 1 Port Router Installation Guide CT-5072T 1 Installing Access Point s DSL Service with a Comtrend Router Thank you for selecting Access Point, Inc. to be your Internet service provider. This guide
More informationSIP Trunk 2 IP-PBX User Guide Asterisk. Ver1.0.0 2015/08/01 Ver1.0.3 2015/09/17 Ver1.0.4 2015/10/07 Ver1.0.5 2015/10/15 Ver1.0.
SIP Trunk 2 IP-PBX User Guide Asterisk Ver1.0.0 2015/08/01 Ver1.0.3 2015/09/17 Ver1.0.4 2015/10/07 Ver1.0.5 2015/10/15 Ver1.0.6 2015/10/23 Index 1. SIP Trunk 2 Overview 3 2. Purchase/Settings in Web Portal
More informationUpdate on the Cloud Demonstration Project
Update on the Cloud Demonstration Project Steven Wallace Joint Techs Summer 2011 13- July- 2011 Project Par4cipants BACKGROUND Twelve Universi,es: Caltech, Carnegie Mellon,Cornell George Mason, Indiana
More informationHow do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?
Enterprise Computing & Service Management How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend
More informationQuest for Web Single Sign-on at the University of Michigan slides from a poster presentation @ Educause 2003
Quest for Web Single Sign-on at the University of Michigan slides from a poster presentation @ Educause 2003 Abstract: Cosign is a Web single-sign-on system recently deployed at the University of Michigan.
More informationTrademarks: Yellowfin and the Yellowfin Logo are registered trademarks of Yellowfin International.
Yellowfin Release 7 Clustering Guide Under international copyright laws, neither the documentation nor the software may be copied, photocopied, reproduced, translated or reduced to any electronic medium
More informationPierce County IT Department GIS Division Xuejin Ruan Dan King
Pierce County IT Department GIS Division Xuejin Ruan Dan King Web Application Work Flow Main Topics Authentication Authorization Session Management * Concurrent Session Management * Session Timeout Single
More informationXSEDE12 Panel: Security for Science Gateways and Campus Bridging
go.illinois.edu/xsede12secpanel XSEDE12 Panel: Security for Science Gateways and Campus Bridging Jim Basney, Randy Butler, Dan Fraser, Suresh Marru, and Craig Stewart July 18, 2012 Panel Agenda Suresh
More informationInstallation procedure for Chromis REC for 3CX
Installation procedure for Chromis REC for 3CX According to 3CX recommendations Chromis REC system should be installed on separate computer than 3CX Phone system due to necessary Microsoft SQL Server which
More informationAllSeen Summit 2015: IoT: Taking PKI Where No PKI Has Gone Before Presented by: Scott Rea DigiCert Sr. PKI Architect ALLSEEN ALLIANCE
AllSeen Summit 2015: IoT: Taking PKI Where No PKI Has Gone Before Presented by: Scott Rea DigiCert Sr. PKI Architect Agenda Slide Title 3 Trust and PKI 9 Web Security - PKI example 26 Traditional PKI Principles
More informationAbsorb Single Sign-On (SSO) V3.0
Absorb Single Sign-On (SSO) V3.0 Overview Absorb allows single sign-on (SSO) with third-party systems, regardless of the programming language. SSO is made secure by a series of calls (between Absorb and
More informationWebinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security
Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security With Iden>ty Expert and UnboundID Customer Bill Bonney Today s Speakers Bill Bonney Formerly Director,
More informationCafePilot has 3 components: the Client, Server and Service Request Monitor (or SRM for short).
Table of Contents Introduction...2 Downloads... 2 Zip Setups... 2 Configuration... 3 Server...3 Client... 5 Service Request Monitor...6 Licensing...7 Frequently Asked Questions... 10 Introduction CafePilot
More informationMSSQL quick start guide
C u s t o m e r S u p p o r t MSSQL quick start guide This guide will help you: Add a MS SQL database to your account. Find your database. Add additional users. Set your user permissions Upload your database
More informationHow To Configure The Jasig Casa Single Sign On On A Workstation On Ahtml.Org On A Server On A Microsoft Server On An Ubuntu 7.5.3 (Windows) On A Linux Computer On A Raspberry V
Configuring CAS-based SSO with ActiveVOS on Apache Tomcat Technical Note Version: 1.3 Dated: August 2013 2013 Informatica Corporation ActiveVOS is a trademark of Informatica, Inc. All other company and
More informationSecuring a Web Service
1 Securing a Web Service HTTP Basic Authentication and HTTPS/SSL Authentication and Encryption - Read Chaper 32 of the J2EE Tutorial - protected session, described later in this chapter, which ensur content
More informationTop 10 most interes.ng SAP vulnerabili.es and a9acks
Invest in security to secure investments Top 10 most interes.ng SAP vulnerabili.es and a9acks Alexander Polyakov CTO at ERPScan About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security
More informationAUTHENTICATION... 2 Step 1:Set up your LDAP server... 2 Step 2: Set up your username... 4 WRITEBACK REPORT... 8 Step 1: Table structures...
AUTHENTICATION... 2 Step 1:Set up your LDAP server... 2 Step 2: Set up your username... 4 WRITEBACK REPORT... 8 Step 1: Table structures... 8 Step 2: Import Tables into BI Admin.... 9 Step 3: Creating
More informationSecuring ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com @leastprivilege
Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com think mobile! Dominick Baier Security consultant at thinktecture Focus on security in distributed applica9ons iden9ty management access
More informationMTD Keystone s Multiple Service Platforms
MTD s Multiple Service Platforms uses the Microso/ Office pla5orm and is an MS Access applica:on with integra:on to the common Microso/ Office applica:ons, namely Excel, Word, and Outlook. may be installed
More informationVERALAB LDAP Configuration Guide
VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to
More informationClicktoFax Service Usage Manual
ClicktoFax Service Usage Manual 1. Log in to Fax Service 2. Configure your account 3. Send a fax 4. Receive a fax/search for Faxes/View Faxes 5. Logout 6. Additional Support 1. Log into fax service: a.
More informationReplacing a commercial integration platform with an open source ESB. Magnus Larsson magnus.larsson@callistaenterprise.se Cadec 2010-01- 20
Replacing a commercial integration platform with an open source ESB Magnus Larsson magnus.larsson@callistaenterprise.se Cadec 2010-01- 20 Agenda The customer Phases Problem defini?on Proof of concepts
More informationGrid Engine. The EPIKH Project (Exchange Programme to advance e-infrastructure Know-How)
The EPIKH Project (Exchange Programme to advance e-infrastructure Know-How) Grid Engine Riccardo Rotondo (riccardo.rotondo@garr.it) Consortium GARR Joint CHAIN/EPIKH School for Application Porting to Science
More informationWhat is Drupal, exactly?
What is Drupal, exactly? Drupal is an open source content management system used to build and manage websites. A content management system (CMS) is a set of procedures or functions that allow content to
More informationCopyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
More informationSSO Plugin. HP Service Request Catalog. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin HP Service Request Catalog J System Solutions Version 3.6 Page 2 of 7 Introduction... 3 Adobe Flash and NTLM... 3 Enabling the identity federation service... 4 Federation key... 4 Token lifetime...
More informationHow To Add Security Roles On Banner Har Account On A Pc Orca (For A Free Download) On A Microsoft Powerbook (For Free) On An Ipa 2.5 (For An Ipad) On Pc Ora (For
Banner HR Account Request System Login and Usage: Login: 1. Go to http://accounts.unh.edu 2. Click on the IT Accounts Management System button 3. Login Adding Security Roles After logging in the Home screen
More informationHP Service Manager. Service Request Catalog (SRC) Tips & Tricks Document
HP Service Manager Service Request Catalog (SRC) Tips & Tricks Document (note: in process of updating to support v 9.32) 1 The HP Service Request Catalog (SRC) is a more robust and user- friendly version
More informationSchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
More informationSocial Media and the Future of E- Discovery. Bruce Malter, CEDS General Manager, Merrill Corporation Chicago
Social Media and the Future of E- Discovery Bruce Malter, CEDS General Manager, Merrill Corporation Chicago Bruce Malter, CEDS General Manager Merrill Corpora;on Presenter 23 years of technology- based
More informationINTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:
INTRODUCTION: You can extract data (i.e. the total cost report) directly from the Truck Tracker SQL Server database by using a 3 rd party data tools such as Excel or Crystal Reports. Basically any software
More informationGetting Started With SAM Director SAM Director User Guide
Getting Started With SAM Director SAM Director User Guide Copyright 2014 License Dashboard Limited. License Dashboard Limited is a trading subsidiary of the Blenheim Group. License Dashboard Limited -
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationVolta Log Library user manual
Volta Log Library user manual www.satellitevolta.com 1 ... 3... 3... 3... 3... 3 www.satellitevolta.com 2 [Ref.01] Volta Log distribution package (volta-log-x.y.z.* http://sourceforge.net/projects/voltalog/files/?source=navbar)
More informationModule - Facebook PS Connect
Module - Facebook PS Connect Operation Date : October 10 th, 2013 Business Tech Installation & Customization Service If you need assistance, we can provide you a full installation and customization service
More informationSecuring Business Informa9on in the Cloud
Securing Business Informa9on in the Cloud For security and IT pros concerned with protec9ng sensi9ve informa9on across mul9ple endpoints and applica9ons. Explore how cloud can enable us to go back to basics
More informationBIRT Application and BIRT Report Deployment Functional Specification
Functional Specification Version 1: October 6, 2005 Abstract This document describes how the user will deploy a BIRT Application and BIRT reports to the Application Server. Document Revisions Version Date
More informationSafewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
More informationI) Add support for OAuth in CAS server
Table of contents I)Add support for OAuth in CAS server...2 II)How to add OAuth client support in CAS server?...3 A)Add dependency...3 B)Add the identity providers needed...3 C)Add the OAuth action in
More informationEIOBoard Integration with Outlook and Exchange
Savance Phone: 248-478-2555 Fax: 248-478-3270 www.eioboard.com support@eioboard.com www.savance.com 2014 Table of Contents Overview 3 Exchange Calendar Sync 3 1 Connect... to Exchange 3 2 Exchange... Sync
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationBank of America Security by Design. Derrick Barksdale Jason Gillam
Bank of America Security by Design Derrick Barksdale Jason Gillam Costs of Correcting Defects 2 Bank of America The Three P s Product Design and build security into our product People Cultivate a security
More informationMiddleware integration in the Sympa mailing list software. Olivier Salaün - CRU
Middleware integration in the Sympa mailing list software Olivier Salaün - CRU 1. Sympa, its middleware connectors 2. Sympa web authentication 3. CAS authentication 4. Shibboleth authentication 5. Sympa
More informationGetting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
More informationSUMMIT. November 2010
SUMMIT November 2010 Why Summit? Comprehensive Summit provides a unified approach to IT enterprise management following a prescriptive, ITIL based framework Rapid Deployment Summit is developed for and
More information