Apache Shiro - Executive Summary
|
|
|
- Louisa Simon
- 10 years ago
- Views:
Transcription
1 Apache Shiro - Executive Summary Apache Shiro is a powerful, easy-to-use Java Security Framework with a goal to be more powerful and easier to use than the standard Java APIs. If you have any interest in Security or need to add security features to you Java program, then you should view this presentation
2 Apache Shiro A Powerful and easy-to-use Java Security Framework Christopher Lynch - By Christopher Lynch
3 History - Origin Originally developed as JSecurity in 2004 By Les Hazlewood and Jeremy Haile They could not find a suitable Java Security Framework that operated well at the application level and was frustrated with JAAS (Java Authentication and Authorization Service). Quoted from d_authorization_service
4 History Name Changes JSecurity was submitted to the Apache Software Foundation in 2008 and renamed Ki (pronounced key) due to trademark concerns. However, additional trademark concerns caused it to be renamed again to Shiro which is the Japanese word for Castle. I found some archived s that showed Les Hazlewood nominated the name Shiro, and there was eventually some votes between Shiro and Aseca (Application SECurity Api) and Shiro won.
5 History - Version Apache Shiro 1.0 was released in July Version 1.1 was released in November Version 1.2 was released in January The current version is which was released in July 2012.
6 Primary Concepts A powerful, easy-to-use Java Security framework that performs: Authentication Authorization Cryptography Session Management Can be used to secure any application: From Command-Line Applications, Mobile Applications to the largest web and enterprise applications.
7 Primary Concepts There are 3 main concepts in the Shiro Architecture: Subject Security Manager Realms
8 Primary Concepts - Subject Subject Refers to the current user. Who is the current user? Or, is the current user allowed to perform the requested action. To acquire the Subject using Shiro: import org.apache.shiro.subject.subject; import org.apache.shiro.securityutils; Subject currentuser = SecurityUtils.getSubject();
9 Primary Concepts Security Manager Manages security operations for all users. The heart of Shiro s architecture. An Umbrella object that references many internally nested security components that form an object graph. Once the security manager and its internal object graph is configured, it is usually left alone and the application developer spends almost all of their time with the Subject API.
10 Primary Concepts - Realms Acts as a bridge or connector between Shiro and your application s security data. A security-specific Data Access Object which encapsulates connection details for data sources and makes the association data available to Shiro as needed. When configuring Shiro, you must specify at least one Realm to use for authentication and/or authorization.
11 Primary Concepts - Authentication Authentication is the process of verifying a user s identity. This is typically done in 3 steps 1. Collect the user s identifying information (called principals) and supporting proof of identity (called credentials). 2. Submit the principals and credentials to the system. 3. If the submitted credentials match what the system expects for that user identity, the user is considered authenticated; otherwise, the user is not authenticated.
12 Primary Concepts - Authentication Code Example: //1. Acquire submitted principals and credentials. AuthenticationToken token = new UsernamePasswordToken( user, pass); //2. Get the current subject. Subject currentuser = SecurityUtils.getSubject(); //3. Login: currentuser.login( token );
13 Primary Concepts - Authentication Handling Failed Login: try { currentuser.login( token ); } catch(incorrectcredentialsexception e) { } catch( LockedAccountException lae ) { } catch( AuthenticationException ae ) { }
14 Primary Concepts - Authorization Access Control Controlling what the user can access in the application, such as resources, web pages, etc. Code Example: if( subject.hasrole( administrator ) ) { // Show the create user button } else { // Grey-out the button }
15 Primary Concepts - Authorization Can rewrite previous example: if( subject.ispermitted( user:create )) { // Show the create user button } else { // Grey-out the button }
16 Primary Concepts Session Management Christopher Lynch - Shiro enables a Session programming paradigm for any application. Shiro s sessions are container-independent Shiro allows for pluggable Session data stores. Such as enterprise caches, relational databases, NoSQL systems, etc. You can configure session clustering once, and it will work the same way regardless of your deployment environment.
17 Primary Concepts Session Management Christopher Lynch - Code example: Can simply obtain the session from the subject: Session session = subject.getsession(); session.getattribute( key, somevalue ); Date start = session.getstarttimestamp(); Date timestamp = session.getlastaccesstime(); session.settimeout( millis );
18 Primary Concepts - Cryptography Shiro s goal in cryptography is to simplify and make usable the JDK s cryptography support. Cryptography is not specific to Subjects in general, so Shiro s API for cryptography is not Subject specific. Shiro focuses on cryptographic hashes (aka message digests) and cryptic ciphers.
19 Primary Concepts - Cryptography Cryptographic Hashing JDK method JDK uses the MessageDigest for cryptographic hashing It has an awkward static method factory-based API instead of an object-oriented one. Your are forced to catch checked exceptions that may never need to be caught. There is no support for hex-encode or Base64- encode message digest output.
20 Primary Concepts - Cryptography Cryptographic Hashing Shiro method Shiro has simplified the API so that it is much easier to use. Shiro has added support for hex-encode and Base64-encode message digest output.
21 Primary Concepts - Cryptography Cryptographic Hashing Code example without Shiro: try { MessageDigest md = MessageDigest.getInstance( MD5 ); md.digest( bytes ); byte[] hashed = md.digest(); } catch( NoSuchAlgorithmException e ) { //Handle Error. }
22 Primary Concepts - Cryptography Cryptographic Hashing Code example without Shiro: String hex = new Md5Hash(myFile).toHex(); SHA-512 hashing and Base64-encoding of passwords is just as easy: String encodedpassword = new Sha512Hash( password, salt, count ).tobase64();
23 Primary Concepts - Cryptography Cryptic Ciphers Ciphers are cryptographic algorithms that can reversibly transform data using a key. Shiro introduces CipherService API: a simple, stateless, thread-safe, that can encrypt or decrypt data in one method call. Shiro supports both byte-array encryption/decryption as well as stream-based encryption/decryption.
24 Primary Concepts - Cryptography Cryptic Ciphers Sample code: AesCipherService cipherservice = new AesCipherService(); cipherservice.setkeysize(256); //create a test key: byte[] testkey = cipherservice.generatenewkey(); //encrypt a file s bytes: byte[] encrypted = cipherservice.encrypt( filebyte, testkey);
25 Primary Concepts Web Support Shiro ships with a robust web support module. Only need to define a Shiro Servlet Filter in web.xml: <filter> <filter-name>shirofilter</filter-name> <filter-class> org.apache.shiro.web.servlet.inishirofilter </filter-class> <!--no init-param means load the INI config from classpath:shiro.ini --> </filter> <filter-mapping> <filter-name>shirofilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping>
26 Primary Concepts Web Support web.xml example: This filter can read shiro.ini to get a consistent configuration experience regardless of the deployment environment. Once configured, the Shiro Filter will filter every request and ensure the request-specific Subject is accessible during the request. You can perform security-specific logic to ensure only requests that meet certain criteria are allowed through.
27 Primary Concepts Web Support Shiro allows you to specify ad-hoc filter chains for any matching URL pattern. This gives you a great deal of flexibility in enforcing security rules.
28 Primary Concepts Web Support URL-Specific Filter Chains: Just need to configure in shiro.ini: [urls] /assets/** = anon /user/signup = anon /user/** = user /rpc/reset/** = perms[rpc:invoke], authc /** = authc The values on the left of the = represent a contextrelative web application path. The values on the right define a filter chain.
29 Primary Concepts Web Support URL-Specific Filter Chains A filter chain is an ordered, comma delimited list of Servlet filters to execute for the given path. Each filter is a normal Servlet Filter. anon, user, perms and authc are special securityrelated filters that Shiro provides out-of-the-box. You can use any combination of the security filters including specifying your own.
30 Primary Concepts Web Support JSP Tag Library This allows you to control the output of your JSP pages based on the current Subject s state. <%@ taglib prefix="shiro uri=" %>... <p>hello <shiro:user> <!-- shiro:principal prints out the Subject s main principal - in this case, a username: --> <shiro:principal/>! </shiro:user> <shiro:guest> <!-- not logged in - considered a guest. Show the register link: -->! <a href= register.jsp >Register today!</a> </shiro:guest> </p>
31 Primary Concepts Web Support JSP Tag Library There are other tags that allow you to include output based on what roles exist or don t exist, what permissions are assigned or not, and whether they are authenticated, remembered (from Remember Me services), or an anonymous guest.
32 Primary Concepts Limitations Shiro does not currently deal with Virtual Machine level security. For example, cannot prevent certain classes from loading in a class loader based on an access control policy. Shiro does not currently natively support multistage authentication, where a user might login via one mechanism, only to be asked to login again via a different mechanism. A real possibility that this will be supported in the future.
33 Primary Concepts Limitations Currently, all Realm implementations support read operations for acquiring authentication and authorization data to perform logins and access control. Write operations, like creating user accounts, are not supported. This is because the data model to support these operations varies dramatically across applications, and it would be difficult to enforce a write API on all Shiro users.
34 Conclusion Shiro powerful and easy-to-use Java Security framework that provides APIs for Authentication Authorization Sessions Cryptography Web Support
Apache Ki (formerly JSecurity) DevNexus - 2009
Apache Ki (formerly JSecurity) DevNexus - 2009 Introduction Jeremy Haile Project Co-Founder VP Product Development, WeTheCitizens Agenda What is Apache Ki? Terminology Authentication, Authorization, Session
Security for Java Web Applications Using Apache Shiro
Javier Ochoa Security for Java Web Applications Using Apache Shiro Helsinki Metropolia University of Applied Sciences Master s Degree Information Technology Master s Thesis 28 November 2014 Author(s) Title
Spring Security 3. http://www.springsource.com/download/community?project=spring%20security
Spring Security 3 1. Introduction http://www.springsource.com/download/community?project=spring%20security 2. Security Namespace Configuration Web.xml configuration: springsecurityfilterchain
SSO Eurécia. and external Applications. Purpose
SSO Eurécia Purpose This document describes the way to manage SSO connection and external applications. The users logged to the external application by entering his credentials then access to Eurécia without
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Qualtrics Single Sign-On Specification
Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by
ApacheCon 2014. Infinite Session Clustering with Apache Shiro & Cassandra
ApacheCon 2014 Infinite Clustering with Apache Shiro & Cassandra Les Hazlewood @lhazlewood Apache Shiro Project Chair CTO, Stormpath stormpath.com .com User Management and Authen=ca=on API Security for
Lecture 9: Application of Cryptography
Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS
White Paper TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS Abstract This white paper explains how to diagnose and troubleshoot issues in the RSA Access Manager single sign-on
<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style
Hudson Security Architecture Click to edit Master subtitle style Winston Prakash Hudson Security Architecture Hudson provides a security mechanism which allows Hudson Administrators
CORISECIO. Quick Installation Guide Open XML Gateway
Quick Installation Guide Open XML Gateway Content 1 FIRST STEPS... 3 2 INSTALLATION... 3 3 ADMINCONSOLE... 4 3.1 Initial Login... 4 3.1.1 Derby Configuration... 5 3.1.2 Password Change... 6 3.2 Logout...
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
WebService Security. A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol
WebService Security A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol Jam Hamidi Senior Technical Analyst BCcampus, Victoria, British Columbia,
Using weblock s Servlet Filters for Application-Level Security
Using weblock s Servlet Filters for Application-Level Security September 2006 www.2ab.com Introduction Access management is a simple concept. Every business has information that needs to be protected from
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Authenticate and authorize API with Apigility. by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team
Authenticate and authorize API with Apigility by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team About me Enrico Zimuel (@ezimuel) Software Engineer since 1996 PHP Engineer at Zend Technologies
FileMaker Server 9. Custom Web Publishing with PHP
FileMaker Server 9 Custom Web Publishing with PHP 2007 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker,
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
FileMaker Server 13. Custom Web Publishing with PHP
FileMaker Server 13 Custom Web Publishing with PHP 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Guidelines for Developing Cryptographic Service Providers (CSPs) for Acrobat on Windows
Technical Note Providers (CSPs) for Acrobat C ONTENTS Requirements for Minimal Functionality 1 Recommendations for Maximum Functionality 2 For a Better User Experience Using CSPs in Acrobat 3 Other Recommendations
Recommended readings. Lecture 11 - Securing Web. Applications. Security. Declarative Security
Recommended readings Lecture 11 Securing Web http://www.theserverside.com/tt/articles/content/tomcats ecurity/tomcatsecurity.pdf http://localhost:8080/tomcat-docs/security-managerhowto.html http://courses.coreservlets.com/course-
Configuring and Monitoring SiteMinder Policy Servers
Configuring and Monitoring SiteMinder Policy Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part
An Ontology-based e-learning System for Network Security
An Ontology-based e-learning System for Network Security Yoshihito Takahashi, Tomomi Abiko, Eriko Negishi Sendai National College of Technology [email protected] Goichi Itabashi Graduate School
Ligero Content Delivery Server. Documentum Content Integration with
Ligero Content Delivery Server Documentum Content Integration with Ligero Content Delivery Server Prepared By Lee Dallas Principal Consultant Armedia, LLC April, 2008 1 Summary Ligero Content Delivery
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
Windows Security and Directory Services for UNIX using Centrify DirectControl
SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory
Configuring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Oracle EBS Interface Connector User Guide V1.4
Oracle EBS Interface Connector User Guide V1.4 Contents Oracle EBS Interface Connector User Guide V1.4... 1 1. Introduction... 3 2. Technologies... 4 3. High level Architectural Diagram... 4 4. About Oracle
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
MS Enterprise Library 5.0 (Logging Application Block)
International Journal of Scientific and Research Publications, Volume 4, Issue 8, August 2014 1 MS Enterprise Library 5.0 (Logging Application Block) Anubhav Tiwari * R&D Dept., Syscom Corporation Ltd.
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002
Security Policy MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS ENCRYPTION DLL CRYPTOGRAPHIC MODULE REV 1.3, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 2 Terms and Definitions...
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING a Class IIIc SSL Certificate using BEA Weblogic V ERSION 1.0 Page 1 of 8 Procedure for
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
vrealize Air Compliance OVA Installation and Deployment Guide
vrealize Air Compliance OVA Installation and Deployment Guide 14 July 2015 vrealize Air Compliance This document supports the version of each product listed and supports all subsequent versions until the
What s New in Juniper s SSL VPN Version 6.0
What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper
Absorb Single Sign-On (SSO) V3.0
Absorb Single Sign-On (SSO) V3.0 Overview Absorb allows single sign-on (SSO) with third-party systems, regardless of the programming language. SSO is made secure by a series of calls (between Absorb and
PUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
NetBrain Security Guidance
NetBrain Security Guidance 1. User Authentication and Authorization 1.1. NetBrain Components NetBrain Enterprise Server includes five components: Customer License Server (CLS), Workspace Server (WSS),
Configure the Application Server User Account on the Domain Server
How to Set up Kerberos Summary This guide guide provides the steps required to set up Kerberos Configure the Application Server User Account on the Domain Server The following instructions are based on
Complete Java Web Development
Complete Java Web Development JAVA-WD Rev 11.14 4 days Description Complete Java Web Development is a crash course in developing cutting edge Web applications using the latest Java EE 6 technologies from
McAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
FileMaker Server 12. Custom Web Publishing with PHP
FileMaker Server 12 Custom Web Publishing with PHP 2007 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks
UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON. Chad Watson Sr. Business Intelligence Developer
UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON Chad Watson Sr. Business Intelligence Developer UPGRADING TO XI 3.1 SP6 What Business Objects Administrators should consider before installing a Service Pack.
MESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE
MESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE OWASP AppSec USA 2011 Conference (@appsecusa / hashtag: #appsecusa) Srini Penchikala (@srinip) 09.23.11 GOALS AND SCOPE Goals: Messaging security
JMETER - MONITOR TEST PLAN
http://www.tutorialspoint.com JMETER - MONITOR TEST PLAN Copyright tutorialspoint.com In this chapter, we will discuss how to create a Test Plan using JMeter to monitor webservers. The uses of monitor
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -
Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC
Apache Sling A REST-based Web Application Framework Carsten Ziegeler [email protected] ApacheCon NA 2014
Apache Sling A REST-based Web Application Framework Carsten Ziegeler [email protected] ApacheCon NA 2014 About [email protected] @cziegeler RnD Team at Adobe Research Switzerland Member of the Apache
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
vcommander will use SSL and session-based authentication to secure REST web services.
vcommander REST API Draft Proposal v1.1 1. Client Authentication vcommander will use SSL and session-based authentication to secure REST web services. 1. All REST API calls must take place over HTTPS 2.
Install guide for Websphere 7.0
DOCUMENTATION Install guide for Websphere 7.0 Jahia EE v6.6.1.0 Jahia s next-generation, open source CMS stems from a widely acknowledged vision of enterprise application convergence web, document, search,
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
Creating a User Profile for Outlook 2013
Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.
Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].
Department Service Integration with e-pramaan
Department Service Integration with e-pramaan How to integrate a.net Application.NET specific integration details are provided in this document. Read e-pramaan Departments Integration Document before proceeding.
Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia
Top Ten Web Application Vulnerabilities in J2EE Vincent Partington and Eelco Klaver Xebia Introduction Open Web Application Security Project is an open project aimed at identifying and preventing causes
Using the Adobe Access Server for Protected Streaming
Adobe Access April 2014 Version 4.0 Using the Adobe Access Server for Protected Streaming Copyright 2012-2014 Adobe Systems Incorporated. All rights reserved. This guide is protected under copyright law,
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08
Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End
Configuring Integrated Windows Authentication for JBoss with SAS 9.3 Web Applications
Configuring Integrated Windows Authentication for JBoss with SAS 9.3 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
How To Manage A Server On A Jboss Application Platform 6.4.4 (Jboss)
Red Hat JBoss Enterprise Application Platform 6.4 Security Architecture Security Architecture Guide for JBoss Enterprise Application Platform 6. Zach Rhoads Ella Ballard Red Hat JBoss Enterprise Application
esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD
esoc European Space Operations Centre Robert-Bosch-Strasse 5 64293 Darmstadt Germany Tel: (49)615190-0 Fax: (49)615190485 www.esa.int SSA DC-I Part 1 - Single Sign-On and Access Management ICD Prepared
Configuring BEA WebLogic Server for Web Authentication with SAS 9.2 Web Applications
Configuration Guide Configuring BEA WebLogic Server for Web Authentication with SAS 9.2 Web Applications This document describes how to configure Web authentication with BEA WebLogic for the SAS Web applications.
Configuring and Monitoring Citrix Branch Repeater
Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Release Notes Date: September 2013
Release Notes Date: September 2013 All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, or stored in any retrieval system of any nature without the
Security Policy. Security Policy. www.clickmeeting.com
Security Policy www.clickmeeting.com 1 Introduction ClickMeeting is a worldwide, solid and easy to use SaaS platform. It s core was constructed with the hi-end technology. Data security the highest priority
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Oracle WebLogic Server 11g: Administration Essentials
Oracle University Contact Us: 1.800.529.0165 Oracle WebLogic Server 11g: Administration Essentials Duration: 5 Days What you will learn This Oracle WebLogic Server 11g: Administration Essentials training
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
Privilege Escalation via Client Management Software November 21, 2015 November 21, 2015 Matthias Deeg BSidesVienna 0x7DF 1 Who am I? Dipl.-Inf. Matthias Deeg Expert IT Security Consultant CISSP, CISA,
Programming with cryptography
Programming with cryptography Chapter 11: Building Secure Software Lars-Helge Netland [email protected] 10.10.2005 INF329: Utvikling av sikre applikasjoner Overview Intro: The importance of cryptography
MAPI Connector Overview
The CommuniGate Pro Server can be used as a "service provider" for Microsoft Windows applications supporting the MAPI (Microsoft Messaging API). To use this service, a special Connector library (CommuniGate
