Integrating the Google Search Appliance with WebSphere Portal and Lotus Web Content Management
|
|
- Harry Lee
- 8 years ago
- Views:
Transcription
1 Integrating the Google Search Appliance with WebSphere Portal and Lotus Web Content Management Dave Hay Portal and Collaboration Architect IBM Software Services for Lotus (ISSL)
2 About Me With IBM since 1992 Experienced with hardware, software and now services AS/400 and iseries Network Station WebSphere and Lotus software Linux advocate Collaboration evangelist Infrastructure Architect With ISSL since 2009
3 Introduction The Project Major UK financial institution Internal and external websites Content held in Lotus Web Content Management Existing intranet and internet sites using Google Search Appliance IBM team and Google partner engaged Solution adoption programme
4 Requirements To To To To To To To deliver access to unsecured AND secured content maintain security of content within search results present content in context via search results deliver personalized results with variance and relevance integrate with WebSphere Portal maintain access to existing search facilities perform in line with non-functional requirements
5 Lotus Web Content Management Role-based content management system Built upon WebSphere Portal Workflow-driven authoring, approval and publishing process Content accessible via portlets, standalone websites, API, feeds etc. etc. etc. Content stored in standards-based Java Content Repository (JCR) database
6 Google Search Appliance Search in a box Self-contained appliance Only requires power and data Different models for different requirements Client uses GB-7007 Can index 10,000,000 content items / documents GSAs can be scaled to meet non-functional requirements
7 Challenges Preserve existing search functionality Integrate with client's custom security solution Need to maintain segregation - GSA should never interact with WCM directly WCM supports standard Seedlist format GSA supports Google Feeds format User experience what and where
8 Terminology Crawling the process that the GSA goes through to build its onbox search index ( known as the default collection ) Serving the GSA provides search request form and search results to users Searching the process that the users go through Collections provide views into the default collection based upon URL patterns Front-Ends defines the user experience IN and OUT of GSA XSLT Extensible Stylesheet Language Transformations, used to drive the user experience
9 Seedlists and Feeds Google Feeds is the format that the GSA uses when crawling, and what our solution needed to produce WCM automatically produces a Seedlist, albeit on-demand Seedlist can also be scheduled and, perhaps, persisted Question about where seedlist would be persisted e.g. file sysem, database Both are XML structures What are the differences? IBM Seedlist format has features that Google Feeds doesn't offer: Pre-filtering by user groups stored in meta-data in the index Post-filtering at run-time Pagination useful for large content stores Embedded seedlists ( seedlists within seedlists ) Incremental indexing ( what has changed since the last crawl ) Long-term objective is for standardization around the Seedlist format
10 The Solution IBM team developed Crawling Proxy (CP) solution CP is based upon an established Google pattern, so not First Of A Kind (FOAK) CP is a standard JEE application deployed onto WebSphere Application Server 6.1 CP acts as broker between GSA and WCM GSA never connects to WCM direct CP can be scaled across clustered WebSphere environment to meet non-functional requirements
11 System Context Diagram CWS Administrator Core Web Security Content Authoring Server Content Author WCM Database Portal Administrator Database Administrator Web Server Portal/Content Delivery Cluster End User End User Portal Databases Google Search Appliance Existing Content (Insite) GSA Administrator Insite Administrator Admin Flow User data Flow Security flow
12 Crawling Process GSA makes a crawl request to Crawling Proxy via a specific URL CP requests Seedlist from WCM CP generates Jump Page HTML page of links, paged as needed GSA crawls Jump Page requesting each URL from CP CP returns content and meta-data to GSA Injected into GSA using Google Feeds format
13 Crawling Process Jump Page
14 Crawling Process - Feeds
15 Delivering Secured Search Content is secured in WCM using user groups Crawling proxy injects groups into GSA as meta-data via Feed process GSA needs to get the user groups to perform search across ACLsecured content in index How does the GSA know the identity and groups of the user? GSA can use LDAP, but client doesn't use it with a custom authentication mechanism used instead
16 The Cookie Cracker Like the Crawling Proxy, this is another pattern that GSA supports Cookie Cracker is used to decrypt and validate user's security token Then returns user ID and groups to GSA GSA can then perform search across ACL-secured content in index Also need a Redirect URL to force user to authenticate if anonymous or expired session
17 Serving Process User initiates search request Either by accessing GSA directly or via portal User indicates whether secured or unsecured search is required If unsecured, then GSA searches as usual If secured, GSA redirects user request to Cookie Cracker If no valid token, GSA redirects user request to Redirect URL to force logon Once valid token, Cookie Cracker returns user ID and groups to GSA GSA performs search across ACL-secured content
18 The Multiple GSA Scenario May be needed for performance and/or resilience Multiple patterns including Active/Active Crawl, Active/Active Search, Active/Passive Crawl etc. Option to use mirroring to keep passive GSA in sync with active GSA Crawling Proxy needs to be designed to know which GSA is making a request Crawling Proxy also needs to persist timestamp of last Seedlist request 2222 IBM Corporation
19 GSA Security GSA can use security mechanisms such as NTLM and FormBased Authentication to control crawler access We chose to use NTLM GSA also supports solutions such as Kerberos and SAML for client authentication essential for secure serving We chose to use Cookie Cracking We also needed to consider other aspects: Using HTTPS to encrypt access from GSA to Crawling Proxy Using IP whitelist and network ACLs to control access to GSA ports such as Feeds and Admin Using HTTPS to encrypt data being fed into the Feed port Using on-box user accounts ( administrator, manager ) rather than LDAP
20 End-user Experience Options to deliver UX from portal -or- from GSA GSA experience driven by front-end Front-end provides search request and search results Option to have multiple front-ends; each with different theme/style Front-ends delivered using Extensible Stylesheet Language Transformations (XSLT) Re-use existing styles e.g. CSS files, icons, logos etc.
21 Examples of UX
22 Component Design
23 Skills Client had previous experience with GSA Needed to acquire additional GSA administration experience Crawling Proxy, Cookie Cracker and Redirect URL applications realized in JEE XSLT skills needed to customize front-ends GSA has on-box front-end tooling XSLT expertise needed to modify over and above
24 Project Lifecycle Conduct requirements gathering exercise We started with a baseline requirement for secured search in Portal Equates to an agile project; we knew where we wanted to get to, but the way-points on the journey changed along the way Work with Google partner to understand art of the possible Patterns such as Crawling Proxy and Cookie Cracking came this way Identify dependancies Need GSA 6.8 software level to support content-level ACLs Needed additional fix for SSL support Develop and functionally test, iteratively Plan for non-functional testing, to build capacity model Using Crawling Proxy against WCM was a known unknown Plan to upgrade production GSAs to 6.8 Plan for administrator and developer training
25 The Future Client plans to make this Search Solution a standard part of all future Portal/WCM deployments This includes internal AND external web sites Option to re-use all/part of solution ( esp. Crawling Proxy ) for Collaboration project with Lotus Connections Extend solution to offer Personalization ( variance and relevance ) using meta-data Consider scheduling Seedlist generation, and caching across clusters Look at options to standardize XSLT across organization Consider search on mobile devices e.g. ipad, Android
26 Lessons Learned Need complete set of skills Portal/WCM GSA XSLT Security infrastructure Networking Project spans infrastructure, application and security disciplines Decide on UX as soon as possible Focus on requirements, requirements, requirements
27 Any questions?
28 How to contact me Lotus Sametime Lotus Notes
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
More informationThe Challenges of Web single sign-on
Serge Vereecke Security Architect IBM Security Services serge_vereecke@be.ibm.com The Challenges of Web single sign-on GSE Event September 7, 2012 Agenda Single sign-on technology Why single sign-on Challenges
More informationRich Media & HD Video Streaming Integration with Brightcove
Rich Media & HD Video Streaming Integration with Brightcove IBM Digital Experience Version 8.5 Web Content Management IBM Ecosystem Development 2014 IBM Corporation Please Note IBM s statements regarding
More informationNew Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
More informationSharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
More informationDeploying the BIG-IP LTM and APM with Citrix XenApp or XenDesktop
Deployment Guide Deploying the BIG-IP LTM and APM with Citrix XenApp or XenDesktop Welcome to the F5 deployment guide for Citrix VDI applications, including XenApp and XenDesktop with the BIG-IP v11.2
More informationnexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
More informationIBM Software Group Thought Leadership Whitepaper. IBM Customer Experience Suite and Enterprise Search Optimization
IBM Software Group Thought Leadership Whitepaper IBM Customer Experience Suite and Enterprise Search Optimization 2 IBM Customer Experience Suite and Enterprise Search Optimization Introduction Delivering
More informationIdentity Server Guide Access Manager 4.0
Identity Server Guide Access Manager 4.0 June 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF
More informationSECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
More informationIBM Digital Experience meets IBM WebSphere Commerce
Portal Arbeitskreis - 27.10.2014 IBM Digital Experience meets IBM WebSphere Commerce Stefan Koch Chief Programmer IBM Digital Experience 2013 IBM Corporation 2 2013 IBM Corporation Integration Pattern
More informationSecure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements
More informationReverse Proxy Scenarios for Single Sign-On
Sterling Secure Proxy Reerse Proxy Scenarios for Single Sign-On Version 3.4 Sterling Secure Proxy Reerse Proxy Scenarios for Single Sign-On Version 3.4 Note Before using this information and the product
More informationGoogle Search Appliance Google Search for Your Business
Google Search Appliance Google Search for Your Business Access all of your business content through one search box With Google Search Appliance 6.8, your company s intranet or website search engine can
More informationmultiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158
Index A Active Directory Active Directory nested groups, 96 creating user accounts, 67 custom authentication, 66 group members cannot log on, 153 mapping certificates, 65 mapping user to Active Directory
More informationGoogle Search Appliance
Google Search Appliance Data Sheet Google Search Appliance Google Search Appliance 7.0 For more information visit: http://www.google.com/enterprise/search/ What s New Relevance algorithm enhancements Document
More informationSecurity IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
More informationThis presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
More informationStep-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
More informationSecuring access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
More informationRobert Honeyman Honeyman IT Consulting. http://www.honeymanit.co.uk rob.honeyman@honeymanit.co.uk
Robert Honeyman Honeyman IT Consulting http://www.honeymanit.co.uk rob.honeyman@honeymanit.co.uk Requirement for HA with SSO Centralized access control SPOF for dependent apps SSO failure = no protected
More informationHow To Manage A Plethora Of Identities In A Cloud System (Saas)
TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities
More informationAdditionally, as a publicly traded company, there are regulatory compliance motivations.
Case Study Retail Industry Sage, TIM & TAM Author: Mark Funk, Trinity Solutions Senior Tivoli Consultant, with over 25 years of extensive experience in the Information Technology Industry with a excellent
More informationOBIEE 11g Scaleout & Clustering
OBIEE 11g Scaleout & Clustering Borkur Steingrimsson, Rittman Mead Consulting Collaborate, Orlando, April 2011 Agenda Review OBIEE Architecture Installation Scenarios : Desktop, Departmental, Enterprise
More informationDeploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
More informationSecure Web Gateway 11.5 Release Notes
Trustwave is pleased to announce the release of Secure Web Gateway version 11.5. Review the Release Notes below for further information. Contents New Features... 1 General Enhancements and Bug Fixes...
More informationChapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
More informationIntegrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
More informationApigee Gateway Specifications
Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption
More informationLoad Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide
Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013 Deployment Guide rev. 1.4.2 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances
More informationSecure remote access to your applications and data. Secure Application Access
Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network
More informationAmeritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
More informationUser-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
More informationCA SiteMinder. Implementation Guide. r12.0 SP2
CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only
More informationCritical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
More informationIntegrating WebSphere Portal V8.0 with Business Process Manager V8.0
2012 Integrating WebSphere Portal V8.0 with Business Process Manager V8.0 WebSphere Portal & BPM Services [Page 2 of 51] CONTENTS CONTENTS... 2 1. DOCUMENT INFORMATION... 4 1.1 1.2 2. INTRODUCTION... 5
More informationApplication Delivery Controller (ADC) Implementation Load Balancing Microsoft SharePoint Servers Solution Guide
Application Delivery Controller (ADC) Implementation Load Balancing Microsoft SharePoint Servers Solution Guide January, 2009 North America Radware Inc. 575 Corporate Dr., Lobby 1 Mahwah, NJ 07430 Tel:
More informationIdentity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
More informationCopyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
More informationCisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationAccess Gateway Guide Access Manager 4.0 SP1
Access Gateway Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
More informationAlliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
More informationAcknowledgments. p. 55
Preface Acknowledgments About the Author Introduction p. 1 IBM SOA Foundation p. 2 Service Design and Service Creation p. 2 Service Integration p. 3 Service Connectivity p. 5 Service Security and Management
More informationWeb Express Logon Reference
IBM WebSphere Host On-Demand Version 10 Web Express Logon Reference SC31-6377-01 IBM WebSphere Host On-Demand Version 10 Web Express Logon Reference SC31-6377-01 Note Before using this information and
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationOracle Collaboration Suite
Oracle Collaboration Suite Firewall and Load Balancer Architecture Release 2 (9.0.4) Part No. B15609-01 November 2004 This document discusses the use of firewall and load balancer components with Oracle
More informationIntroductions. Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP chris.cognetta@tribridge.
Hosted by Introductions Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP chris.cognetta@tribridge.com CRMUG Chairperson Miami & Tampa Co Chair 250+ Dynamics CRM
More informationHow to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
More informationGoogle Search Appliance Google Search for your organization
Google Search Appliance Data Sheet Google Search Appliance Google Search for your organization Google Search Appliance 7.2 What s New Wildcard search Relevance algorithm enhancements New GSA version manager
More informationHow To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip
Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationSametime 9 Meetings deployment Open Mic July 23rd 2014
Sametime 9 Meetings deployment Open Mic July 23rd 2014 Tony Payne Senior Software Engineer - Sametime Ginni Saini Software Engineer Sametime Support Joshua Edwards Software Engineer Sametime Support IBM
More informationWebSphere DataPower SOA Appliances
WebSphere DataPower SOA Appliances Version 3.7.3 Web Application Firewall Developers Guide WebSphere DataPower SOA Appliances Version 3.7.3 Web Application Firewall Developers Guide Note Before using
More informationVMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
More informationIntegrating SharePoint Sites within WebSphere Portal
Integrating SharePoint Sites within WebSphere Portal November 2007 Contents Executive Summary 2 Proliferation of SharePoint Sites 2 Silos of Information 2 Security and Compliance 3 Overview: Mainsoft SharePoint
More informationADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
More informationMcAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
More informationPortals and Hosted Files
12 Portals and Hosted Files This chapter introduces Progress Rollbase Portals, portal pages, portal visitors setup and management, portal access control and login/authentication and recommended guidelines
More informationManaged File Transfer
Managed File Transfer How do most organizations move files today? FTP Typically File Transfer Protocol (FTP) is combined with writing and maintaining homegrown code to address its limitations Limited Reliability
More informationFront Office Server 3.0
Kofax Front Office Server 3.0 Administrator s Guide 10300863-000 2007-2010 Kofax, Inc., 15211Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved. Use is subject to license terms. Third-party
More informationSpring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
More informationowncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
More informationmsuite5 & mdesign Installation Prerequisites
CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...
More informationImprove your mobile application security with IBM Worklight
Improve your mobile application security with IBM Worklight Contents 1 Introduction 2 IBM Worklight overview 4 Enabling mobile security with IBM Worklight 6 Integrating IBM Worklight with enterprise security
More informationArcGIS for Server Reference Implementations. An ArcGIS Server s architecture tour
ArcGIS for Server Reference Implementations An Arc s architecture tour Basic Single Machine Site Advantages Easy to setup Fast performance (keep file resources local) Client Manager Data (Files) Uses:
More informationJMP105 JumpStart: Single Sign-on (SAML) Administration Basics
JMP105 JumpStart: Single Sign-on (SAML) Administration Basics Jane Marcus jmarcus@us.ibm.com Senior software engineer, IBM 2014 IBM Corporation Agenda Single sign-on introduction SAML concepts Domino 9.x
More informationSharePoint 2010 Interview Questions-Architect
Basic Intro SharePoint Architecture Questions 1) What are Web Applications in SharePoint? An IIS Web site created and used by SharePoint 2010. Saying an IIS virtual server is also an acceptable answer.
More informationVMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationDeploying the BIG-IP System with Oracle E-Business Suite 11i
Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system
More information2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
More informationCreating a Strong Security Infrastructure for Exposing JBoss Services
Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products
More informationPingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
More informationReverse Proxy for Trusted Web Environments > White Paper
> White Paper ProxySG for Reverse Proxy Web-based solutions are being implemented for nearly every aspect of business operations, and increasingly for trusted environments with mission-critical business
More informationINTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace
INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
More informationIntegrating the F5 BigIP with Blackboard
Integrating the F5 BigIP with Blackboard Nick McClure nickjm@uky.edu Lead Systems Programmer University of Kentucky Created August 1, 2006 Last Updated June 17, 2008 Integrating the F5 BigIP with Blackboard
More informationSecurely Managing and Exposing Web Services & Applications
Securely Managing and Exposing Web Services & Applications Philip M Walston VP Product Management Layer 7 Technologies Layer 7 SecureSpan Products Suite of security and networking products to address the
More informationTutto quello che c è da sapere su Azure App Service
presenta Tutto quello che c è da sapere su Azure App Service Jessica Tibaldi Technical Evangelist Microsoft Azure & Startups jetiba@microsoft.com @_jetiba www.wpc2015.it info@wpc2015.it - +39 02 365738.11
More informationOIX IDAP Alpha Project - Technical Findings
OIX IDAP Alpha Project - Technical Findings Warwickshire County Council - using a Federated UK Government ID in trusted Local Authority transactions. By Graham Dunnings and Ian Litton 1 Table of Contents
More informationWhite Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
More informationIntroduction to IBM Worklight Mobile Platform
Introduction to IBM Worklight Mobile Platform The Worklight Mobile Platform The Worklight Mobile Platform is an open, complete and advanced mobile application platform for HTML5, hybrid and native apps.
More informationINTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationThis chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : 000-003 Title : Fundamentals of Applying Tivoli Security and Compliance Management Solutions V2 Version : Demo 1.What is another
More informationUser Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
More informationThe Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
More informationNetworking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationWeb Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
More informationA Java proxy for MS SQL Server Reporting Services
1 of 5 1/10/2005 9:37 PM Advertisement: Support JavaWorld, click here! January 2005 HOME FEATURED TUTORIALS COLUMNS NEWS & REVIEWS FORUM JW RESOURCES ABOUT JW A Java proxy for MS SQL Server Reporting Services
More informationIBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
More informationPASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者
PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者 http://www.pass4test.jp 1 年 で 無 料 進 級 することに 提 供 する Exam : 000-003 Title : Fundamentals of Applying Tivoli Security and Compliance Management Solutions V2 Vendors :
More informationSingle Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
More informationSetup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationExternal authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
More informationVMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationServer Deployment and Configuration. Qlik Sense 1.1 Copyright 1993-2015 QlikTech International AB. All rights reserved.
Server Deployment and Configuration Qlik Sense 1.1 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech,
More informationSecuring ArcGIS Server Services: First Steps
Federal GIS Conference February 9 10, 2015 Washington, DC Securing ArcGIS Server Services: First Steps Michael Sarhan Esri msarhan@esri.com Agenda Review Basic Security Workflow ArcGIS Server Roles and
More informationIBM C2040-413. Exam Name: IBM Sametime 9.0 Administration. Product: Demo
IBM C2040-413 Exam Name: IBM Sametime 9.0 Administration Product: Demo Question: 1 Renovations Inc. has two IBM Sametime Community Servers configured in a clustered environment. Why are the users being
More informationInstallation Guide Access Manager 4.0 SP2
Installation Guide Access Manager 4.0 SP2 June 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF
More information