Authenticating REST services in OpenEdge
|
|
|
- Emerald Shields
- 10 years ago
- Views:
Transcription
1 Authenticating REST services in OpenEdge Controlling business logic access via OE Realm & LDAP Peter Judge, Progress Software
2 Abstract Slides-only précis of the REST Security Workshop Paul Koufalis & I presented at the EMEA PUG Challenge this year It covers securing REST services using OERealm authentication LDAP authentication Role-based authorization Cross Origin Resource Sharing (CORS) Assumes you're using PASOE, but applies to classic AppServer too 2
3 Who is this Peter Judge person? Peter Judge Software Progress since 2003 Integration-y stuff: HTTP-Out, Corticon OE Best Practices / OERA / AutoEdge / CCS 4GL since
4 Agenda Introduction to PAS/OE & REST What is a REST security architecture? What's LDAP? URL-based authorization CORS Considerations for a production environment Logging for fun & profit 4
5 REST-based ABL services 5
6 What is REST? REpresentational State Transfer: an architecture for designing networked applications In English: Uses HTTP URLs and verbs to provide web services GET will return customer #24 GET will return all customers PUT will update customer #24 Some features: Client-Server: pull- or request-based Stateless: each request must contain all information necessary to understand the request Cacheable Uniform interface: all resources accessed via generic interface 6
7 What is REST? Practically, JSON payloads to and fro over HTTP, using a particular style of URL JSON content types : application/json application/vnd.[vendor]+json GET /users/peterjudge-psc HTTP/1.1 Host: api.github.com Accept: application/vnd.github.v3+json User-Agent: OpenEdge-HttpClient/0.3.0 HTTP/ OK Cache-Control: public, max-age=60, s-maxage=60 Content-Encoding: gzip Content-Type: application/json; charset=utf-8 Server: GitHub.com headers headers { "login": "PeterJudge-PSC", "id": , "url": " "repos_url": " "type": "User", "updated_at": " T20:44:24Z } request response 7
8 OpenEdge REST Services Each deployed OE REST web application has A web application name One or more REST services A security configuration ( user authentication and [URL] authorization ) A connection to an AppServer [ABL service] Example OpenEdge REST web application : deployment site defined part OE defined part 8
9 RESTful Service and URL Design A REST service Has a service-name that appears in the URL A service-name contains one or more REST resources Each resource has a unique URL path within the service Each resource URL path can have optional input parameters and/or options Example developer designed part 9
10 You Choose What Goes Where Routing HTTP method + URI => class + method Alt. =>persistent proc + internal proc Mapping HTTP message into ABL arguments URL parameters Headers Cookies Server Context
11 Securing Your OE REST Web Service Security provided in layers SSL/TLS to encrypt data-in-transit between client and web server and between web server and AppServer Web application (Tomcat) session management Spring Security for authentication Can also provide authorization OpenEdge AppServer for application level authorization 11
12 Authentication and Authorization Authentication Identifies a user, using factors Something the user knows (e.g. password) Something the user has (e.g. security token) Something of the user (e.g. biometric) Verify that a user is who they say they are We need to be able to trust this fact, as do others Authorization What services can the user access? What data can the user see and/or modify? Multi-tenancy Record-level, field-level 12
13 Spring Security OpenEdge supplements the Java container s security with the industry-recognized Spring security framework Spring Security is a customizable authentication and access control framework It is one of the industry standards for securing Spring-based applications 13
14 Web Application Authentication Models Anonymous : No user authentication or login session HTTP Basic or Digest Authentication Client sends base64 encoded user name/password to web application in each http request HTTP header: Authorization HTTP Form Authentication Client logs in and out the web application once per session Login: The client obtains user credentials and POSTs them to the web application Logout: The client uses a GET request to log out 14
15 Common Authentication Providers In-memory user accounts in configuration file Local file user accounts in clear-text file Container user account authenticated by Java container LDAP / AD user accounts in a Directory Service ( ) OERealm OpenEdge AppServer service (11.3+) 15
16 What is a REST security architecture? 16
17 Components of a security architecture Security tokens & Security Token Service Authentication flows Configuring Spring Security Flow of a CLIENT-PRINCIPAL through an application 17
18 What is a Security Token? A transportable block of data that can be used as proof of user identity by any systems or applications that have a trust relationship with the originator of the security token Exists for same reason passports do: so that a gatekeeper doesn t have to ask you for everything every time you want to pass Enables Single Sign On (SSO) Authenticate once and allow access many times across (ABL) processes Secure, time sensitive and data-integrity protected CLIENT-PRINCIPAL = ABL security token Sets current identity in any connected db or AVM session A security token service (STS) is the service component that builds, signs, and issues security tokens [1] [1] 18
19 Authentication flows between client, STS and AppServer Client PAS/OE Security Token Service (Spring Security) LoginUser() LogoutUser() ValidateUser Domain Services (ABL) security-policy:set-client( ) CustomerSvc:ReadAllCustomers( ) Single Point AuthN ValidateUser() ValidatePassword() GetAttributes() 19
20 Authentication flows between client, STS and AppServer Client GET /customers PAS/OE Security Token Service (Spring Security) LoginUser() LogoutUser() ValidateUser Domain Services (ABL) security-policy:set-client( ) CustomerSvc:ReadAllCustomers( ) Single Point AuthN ValidateUser() ValidatePassword() GetAttributes() 20
21 Authentication flows between client, STS and AppServer Client GET /customers Authorization: mary/letmein PAS/OE Security Token Service (Spring Security) LoginUser() LogoutUser() ValidateUser Domain Services (ABL) security-policy:set-client( ) CustomerSvc:ReadAllCustomers( ) Single Point AuthN ValidateUser() ValidatePassword() GetAttributes() 21
22 Authentication flows between client, STS and AppServer Client GET /customers Authorization: mary/letmein PAS/OE Security Token Service LoginUser() LogoutUser() ValidateUser Domain Services security-policy:set-client( ) CustomerSvc:ReadAllCustomers( ) Single Point AuthN ValidateUser() ValidatePassword() GetAttributes() 22
23 Authentication flows between client, STS and AppServer Client GET /customers Authorization: mary/letmein PAS/OE Security Token Service LoginUser() LogoutUser() ValidateUser Domain Services (ABL) security-policy:set-client( ) CustomerSvc:ReadAllCustomers( ) Single Point AuthN ValidateUser() ValidatePassword() GetAttributes() 23
24 Authentication flows between client, STS and AppServer Client GET /customers Authorization: mary/letmein PAS/OE Security Token Service LoginUser() LogoutUser() ValidateUser Domain Services security-policy:set-client( ) CustomerSvc:ReadAllCustomers( ) Single Point AuthN ValidateUser() ValidatePassword() GetAttributes() 24
25 What Are Domains? A group of users with a common set of Roles and responsibilities Level of security Data access privileges Configured in db meta-schema Authentication systems Tenants _sec-authentication-domain _Domain-name _Domain-type _Domain-description _Domain-access-code _Domain-runtime-options _Tenant-name _Domain-enabled 25
26 Flow of CLIENT-PRINCIPAL through an application Domain Services security-policy:set-client( ) CustomerSvc:ReadAllCustomers( ) STS passes credentials into AVM using CURRENT-REQUEST-INFO CLIENT-PRINCIPAL available in activation event procedure Credentials can be asserted on session or per-database SECURITY-POLICY:SET-CLIENT(<client-principal>) SET-DB-CLIENT(<client-principal>, <database>) Token is validated against an existing domain Domain name & access code must match for successful authentication 26
27 Authentication using an OpenEdge Realm 27
28 OE Realm details Class-based implementation of the Progress.Security.Realm.IHybridRealm interface SPA does NOT create, seal or otherwise operate on CLIENT-PRINCIPALs Requires integer type user id ValidateUser(input <character>) returns <integer> Roles are Just Another Attribute Single Point of Authentication ValidateUser() ValidatePassword() GetAttributes() 28
29 OERealm config: ValidateUser() Example METHOD PUBLIC INTEGER ValidateUser( INPUT p0 AS CHARACTER ): DEFINE VARIABLE cname AS CHARACTER NO-UNDO. DEFINE VARIABLE cdomain AS CHARACTER NO-UNDO. cname = ENTRY(1, p0, '@'). IF NUM-ENTRIES(p0, '@') GE 2 THEN cdomain = ENTRY(2, p0, '@'). FIND ApplicationUser WHERE ApplicationUser.LoginName = cname AND ApplicationUser.LoginDomain = cdomain NO-LOCK NO-ERROR. IF AVAILABLE ApplicationUser THEN RETURN ApplicationUser.Id. RETURN?. END METHOD. 29
30 OERealm config: GetAttribute() Example METHOD PUBLIC CHARACTER GetAttribute( INPUT p0 AS INTEGER, INPUT p1 AS CHARACTER ): DEFINE VARIABLE cattribute AS CHARACTER NO-UNDO. CASE p1: WHEN "ATTR_ROLES" THEN DO: FIND ApplicationUser WHERE ApplicationUser.Id EQ p0 NO-LOCK NO-ERROR. FOR EACH GrantedRole WHERE GrantedRole.Grantee EQ LC(ApplicationUser.LoginName) + '@' + LC(ApplicationUser.LoginDomain) NO-LOCK: cattribute = cattribute + ',' + GrantedRole.RoleName. END. END. END CASE. RETURN cattribute. END METHOD. 30
31 Config: Using the client-principal in ABL AppServer startup procedure DEFINE INPUT PARAMETER pstartupinfo AS CHARACTER NO-UNDO. SECURITY-POLICY:LOAD-DOMAINS("sports"). 31
32 Config: Using the client-principal in ABL AppServer activate procedure DEFINE VARIABLE hcp AS HANDLE NO-UNDO. IF SESSION:CURRENT-REQUEST-INFO:ProcedureName BEGINS "Demo.Security.SportsRealm" THEN RETURN. ASSIGN hcp = SESSION:CURRENT-REQUEST-INFO:GetClientPrincipal(). /* this is the important bit: we do not want to set this on our security client */ SET-DB-CLIENT(hCP, 'sports'). CATCH oerror AS Progress.Lang.Error : DEF VAR i AS INT. DO i = 1 TO oerror:nummessages: LOG-MANAGER:WRITE-MESSAGE(oError:GetMessage(i), 'ACTV8ERR'). END. LOG-MANAGER:WRITE-MESSAGE(oError:CallStack, 'ACTV8ERR'). /* blow up */ RETURN ERROR oerror:getmessage(1). END CATCH. 32
33 Config: Authentication Providers : web.xml <context-param> <param-name>contextconfiglocation</param-name> <param-value> <!-- USER EDIT: Select which application security model to employ /WEB-INF/oeablSecurity-basic-local.xml /WEB-INF/oeablSecurity-anonymous.xml /WEB-INF/oeablSecurity-form-local.xml /WEB-INF/oeablSecurity-container.xml /WEB-INF/oeablSecurity-basic-ldap.xml /WEB-INF/oeablSecurity-form-ldap.xml /WEB-INF/oeablSecurity-basic-oerealm.xml /WEB-INF/oeablSecurity-form-oerealm.xml /WEB-INF/oeablSecurity-form-saml.xml /WEB-INF/oeablSecurity-basic-saml.xml /WEB-INF/oeablSecurity-anonymous.xml --> /WEB-INF/oeablSecurity-basic-oerealm.xml </param-value> </context-param> 33
34 Config: Authentication Providers : web.xml <context-param> <param-name>contextconfiglocation</param-name> <param-value> <!-- USER EDIT: Select which application security model to employ /WEB-INF/oeablSecurity-basic-local.xml /WEB-INF/oeablSecurity-anonymous.xml /WEB-INF/oeablSecurity-form-local.xml /WEB-INF/oeablSecurity-container.xml /WEB-INF/oeablSecurity-basic-ldap.xml /WEB-INF/oeablSecurity-form-ldap.xml --> /WEB-INF/oeablSecurity-basic-oerealm.xml /WEB-INF/oeablSecurity-form-oerealm.xml /WEB-INF/oeablSecurity-form-saml.xml /WEB-INF/oeablSecurity-basic-saml.xml /WEB-INF/oeablSecurity-anonymous.xml /WEB-INF/oeablSecurity-basic-oerealm.xml Authentication provider 34 </param-value> </context-param> Authentication model
35 Spring config: realm location <b:bean id="oerealmuserdetails" class="com.progress.appserv.services.security.oerealmuserdetailsimpl" > <b:property name="realmurl" value="internal://localhost/nxgas" /> <b:property name="realmclass" value="demo.security.sportsrealm" /> <b:property name="grantedauthorities" value="role_pscuser" /> <b:property name="roleprefix" value="role_" /> <b:property name="roleattrname" value="attr_roles" /> <b:property name="enabledattrname" value="attr_enabled" /> <b:property name="lockedattrname" value="attr_locked" /> <b:property name="expiredattrname" value="attr_expired" /> 35
36 Spring config: passing a client-principal to the AppServer <b:bean id="oerealmauthprovider" class= "com.progress.appserv.services.security.oerealmauthprovider" > <b:property name="userdetailsservice"> <b:ref bean="oerealmuserdetails"/> </b:property> <b:property name="createcpauthn" value="true" /> <b:property name="multitenant" value="false" /> <b:property name="userdomain" value="sports" /> <b:property name="key" value="abc123" /> 36
37 LDAP Authentication 37
38 LDAP Essentials Single manageable location for enterprise configurations LDAP (Lightweight Directory Access Protocol) is a wire protocol and client API LDAP Directory Services widely used for single point of administration Most commonly recognized as a Single Point of Authentication (SPA) A directory service is hierarchical store of schema defined objects and object attributes Examples: OpenLDAP, Windows Active Directory, Apache DS No two production sites will have the same hierarchy ( of users & groups ) 38
39 Key Directory Service Terms and Concepts Distinguished Name ( DN ) The path to a specific data object Root DN: the name of the object hierarchy's root data object example: dc=acme,dc=com Fully qualified DN: full path to the object from the root DN to the object example: dn=ldapserver1,ou=it,dc=acme,dc=com Relative DN: example: dn=ldapserver (child object of: ou=it,dc=acme,dc=com) Search root: the fully qualified DN of the data object at which to begin a decending search for one or more data objects 39
40 Key Directory Service Terms and Concepts (cont'd) Directory Services require logging in to search information Security policies prevent read/write of another user s password attribute Passwords are stored as salted one-way hashes To test a user account s password for login 1. You have to login with a fully qualified DN that has search privileges 2. Search to find the user s account and retrieve its fully qualified DN 3. Logout 4. Login using the user account s fully qualified DN and password 5. Retrieve user attributes - primarily the Groups (i.e. Role) they are a member of 6. Logout 40
41 Required Information From Directory Service Admin 1. Network address and ports of the Directory Service "foo.com" ROOT DN of the directory service "dc=foo, dc=com" 3. DN & password of an account with query privilege "uid=admin, ou=ds admins, ou=it, dc=foo, dc=com" 4. LDAP DN of the object where the user object search will start 5. LDAP user account object s attribute name that holds the user s login ID 6. LDAP DN of the object where the search for LDAP user groups (roles) will start 7. LDAP group object s attribute name whose value will be the role name inserted into the user s login token "ou=users, ou=employees, dc=foo, dc=com" "uid" 8. LDAP Group attribute holding the Role/Group name "cn" "ou=groups,dc=foo,dc=com" "uniquemember" or "roleoccupant" 41
42 Example directory 42
43 Configuring Spring Security LDAP: Directory access <ldap-server id="primayldap" url="ldap://localhost:10389 /dc=xxx,dc=yyy" 1 2 /> manager-dn= "uid=admin,ou=system" manager-password="secret" 43
44 Configuring Spring Security LDAP: Directory access <ldap-server id="primayldap" url="ldap://localhost:10389 /dc=xxx,dc=yyy" 1 2 /> manager-dn= "uid=admin,ou=system" manager-password="secret" 3 44
45 Configuring Spring Security LDAP: Authentication Manager <authentication-manager id="oeablapplicationauth"> <ldap-authentication-provider server-ref="primayldap" role-prefix="role_" group-search-base= "ou=groups,ou=sports,ou=tenants, dc=pugchallenge,dc=org" group-role-attribute="cn" group-search-filter="(roleoccupant={0})" user-search-base= "ou=users,ou=sports,ou=tenants, 4 dc=pugchallenge,dc=org" user-search-filter="(uid={0})" /> </authentication-manager> 45
46 Configuring Spring Security LDAP: Authentication Manager <authentication-manager id="oeablapplicationauth"> <ldap-authentication-provider server-ref="primayldap" role-prefix="role_" group-search-base= "ou=groups,ou=sports,ou=tenants, dc=pugchallenge,dc=org" group-role-attribute="cn" group-search-filter="(roleoccupant={0})" user-search-base= "ou=users,ou=sports,ou=tenants, 4 dc=pugchallenge,dc=org" user-search-filter="(uid={0})" /> </authentication-manager> 5 46
47 Configuring Spring Security LDAP: Authentication Manager <authentication-manager id="oeablapplicationauth"> <ldap-authentication-provider server-ref="primayldap" role-prefix="role_" group-search-base= "ou=groups,ou=sports,ou=tenants, dc=pugchallenge,dc=org" group-role-attribute="cn" group-search-filter="(roleoccupant={0})" user-search-base= "ou=users,ou=sports,ou=tenants, 4 dc=pugchallenge,dc=org" user-search-filter="(uid={0})" /> </authentication-manager> uid=peter, ou=users,ou=sports,ou=tenants,dc=pugchallenge,dc=org 5 47
48 Configuring Spring Security LDAP: Authentication Manager <authentication-manager id="oeablapplicationauth"> <ldap-authentication-provider server-ref="primayldap" role-prefix="role_" 6 group-search-base= "ou=groups,ou=sports,ou=tenants, dc=pugchallenge,dc=org" group-role-attribute="cn" group-search-filter="(roleoccupant={0})" user-search-base= "ou=users,ou=sports,ou=tenants, dc=pugchallenge,dc=org" user-search-filter="(uid={0})" /> </authentication-manager> 48
49 Configuring Spring Security LDAP: Authentication Manager <authentication-manager id="oeablapplicationauth"> <ldap-authentication-provider server-ref="primayldap" role-prefix="role_" group-search-base= "ou=groups,ou=sports,ou=tenants, dc=pugchallenge,dc=org" group-role-attribute="cn" group-search-filter="(roleoccupant={0})" user-search-base= "ou=users,ou=sports,ou=tenants, dc=pugchallenge,dc=org" user-search-filter="(uid={0})" /> </authentication-manager>
50 Configuring Spring Security LDAP: Authentication Manager <authentication-manager id="oeablapplicationauth"> <ldap-authentication-provider server-ref="primayldap" role-prefix="role_" group-search-base= "ou=groups,ou=sports,ou=tenants, dc=pugchallenge,dc=org" group-role-attribute="cn" group-search-filter="(roleoccupant={0})" user-search-base= "ou=users,ou=sports,ou=tenants, dc=pugchallenge,dc=org" user-search-filter="(uid={0})" /> </authentication-manager>
51 Configuring Spring Security LDAP: Authentication Manager <authentication-manager id="oeablapplicationauth"> <ldap-authentication-provider server-ref="primayldap" role-prefix="role_" 6 group-search-base= cn=customer.read "ou=groups,ou=sports,ou=tenants, cn=customer.update dc=pugchallenge,dc=org" group-role-attribute="cn" cn=pscuser group-search-filter="(roleoccupant={0})" user-search-base= "ou=users,ou=sports,ou=tenants, dc=pugchallenge,dc=org" user-search-filter="(uid={0})" /> </authentication-manager>
52 Role-based Authorization 52
53 Intercept URLs A means to provide authorization based on a URL + method (verb) We use role-based authorization An intercept-url element (filter) contains three attributes Pattern: A URI pattern relative to the web application. The pattern can be as general or specific as required. Method: The HTTP method to which this element applies (optional) Access: The access (restriction) to apply when the pattern and method match the requested resource. Intercepts are processed in the order in which they appear in the configuration 53
54 Example intercept URL Specified in the oeablsecurity-*.xml security configuration file Add an intercept-url element under <http pattern="/rest/**" element pattern URL pattern to which this role authorization applies ** in path indicates it applies recursively pattern path is relative to the restsec webapp Look for other examples in XML file method - HTTP method; delete is what we want to restrict access - Authorize using hasanyrole('role_customer_delete') <intercept-url pattern="/rest/restws/customers/**" method="delete" access="hasanyrole('role_customer.delete')" /> 54
55 Example ABL authorization: get-salary.p define input param piempnum as integer. define output param pdsalary as decimal. define variable hcp as handle no-undo. hcp = get-db-client('sports'). if not can-do(hcp:roles, 'Employee.Read.Salary') then do: log-manager:write-message( 'Employee.Read.Salary attempt:' + hcp:qualified-user-id, 'AUTHZERR'). return error 'Access denied'. end. /* business logic to read salary info */ 55
56 Cross-Origin Resource Sharing (CORS) 56
57 Cross Origin Resource Sharing (CORS) A simplified example may be easiest to understand 1. Paul visits 2. This page lists all customers by GETting /rest/restws/customers (using XMLHttpRequest) 3. If it GETs this is a SAME ORIGIN request 4. If it GETs /rest/restws/customers from anywhere else this is a CROSS ORIGIN request Browsers generally dislike this for security reasons CORS is a mechanism that allows a web page loaded from one domain to make HTTP requests to access resources located in another domain PAS provides CORS functionality using the Open Source CORS Filter 57
58 CORS vs. NON-CORS CORS-enabled web servers classify all requests as 1. CORS request containing an Origin header 2. CORS preflight request containing Access-Control-Request-Method header in an OPTION request 3. A generic (non-cors) request that does not contain any CORS headers How the web server reacts to each of these requests is configured in the OECorsFilter in the oeablsecurity-*.xml file 58
59 Example : OpenEdge CORS Filter <!-- The security filter that implements the CORS standard for controling cross site resource access by http clients. --> <b:bean id="oecorsfilter" class="com.progress.appserv.services.security.oecorsfilter" > <b:property name="allowall" value="true" /> <b:property name="allowdomains" value=" /> <b:property name="allowsubdomains" value="false" /> <b:property name="allowmethods" value="" /> <b:property name="messageheaders" value="" /> <b:property name="responseheaders" value="" /> <b:property name="supportcredentials" value="true" /> <b:property name="maxage" value="-1" /> </b:bean> 59
60 Deploying in Production 60
61 Considerations for a production PASOE environment Authentication defaults to ANONYMOUS in PROD and DEV modes Our psychics were unable to determine your security mode when OE goes to FCS PLEASE DON'T LEAVE IT LIKE THIS Limited user and file permissions on UNIX installs Deployment tooling in PDSOE for DEV, not PROD May need changes to security XML files No r-code in PROD server Use traditional deployment means R-code in WAR via PDSOE in 11.6 Need to explicitly deploy oe-/manager to PROD 61
62 When Things Go Horribly Wrong 62
63 Logging is your friend Use SEC.AUTH log type with a high value to debug AVM-related issues Set in openedge.properties The REST service logging configuration found in <web-app-name>/web-inf/logging.xml <project>/pasoecontent/web-inf/logging.xml DEBUG and TRACE level produce lots of logging monitor log file sizes <!-- OEABL Security --> <logger name="com.progress.appserv.services.security" level="info"/> <!-- Spring Security --> <logger name="org.springframework" level="info"/> <logger name="org.springframework.security.web.access" level="info"/> <logger name="org.springframework.security.saml" level="info"/> <!-- SAML --> <logger name="org.opensaml" level="info"/> <logger name=" PROTOCOL_MESSAGE " level="info"/> 63
64 Debugging
65 Q&A 65
Progress OpenEdge REST
Progress OpenEdge REST Deploying, Managing, and Troubleshooting your REST Web Application Kumar Navneet Principal Software Engineer Progress Software October 8, 2013 David Cleary Principal Software Engineer
Advanced OpenEdge REST/Mobile Security
Advanced OpenEdge REST/Mobile Security Securing your OpenEdge Web applications Michael Jacobs August 2013 Legal Disclaimer The contents of these materials are confidential information of Progress Software
Mobile Security Jump Start. Wayne Henshaw & Mike Jacobs Progress OpenEdge October 8, 2013
Mobile Security Jump Start Wayne Henshaw & Mike Jacobs Progress OpenEdge October 8, 2013 Agenda Architectural basics REST service Mobile client Making required choices Authentication model User sessions
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
Debugging Mobile Apps
Debugging Mobile Apps Native and Mobile Web Apps Shelley Chase Senior Architect, Progress OpenEdge November 2013 OpenEdge Mobile Value Proposition: Write Once, Run Anywhere Portability with the Benefits
Security Workshop 2013 Improving Security in a Hacker s World
Security Workshop 2013 Improving Security in a Hacker s World Workshop Steve, Roy, Rob, Brian, Peter Progress Software Today Agenda and Timeframes Topic Type Presenter Approx. Length (Minutes) Introductions
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Certified Secure Web Application Secure Development Checklist
www.certifiedsecure.com [email protected] Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
Instant Chime for IBM Sametime Installation Guide for Apache Tomcat and Microsoft SQL
Instant Chime for IBM Sametime Installation Guide for Apache Tomcat and Microsoft SQL Spring 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
Microsoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
Pacific Application Server for OpenEdge: Getting Started. Progress OpenEdge 11.5 Workshop
Pacific Application Server for OpenEdge: Getting Started Progress OpenEdge 11.5 Workshop 2015 Legal Disclaimer The contents of these materials are confidential information of Progress Software Corporation
OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way
OpenAM Written and tested with OpenAM Snapshot 9 the Single Sign-On (SSO) tool for securing your web applications in a fast and easy way Indira Thangasamy [ PUBLISHING 1 open source 1 community experience
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
UFTP AUTHENTICATION SERVICE
UFTP Authentication Service UFTP AUTHENTICATION SERVICE UNICORE Team Document Version: 1.1.0 Component Version: 1.1.1 Date: 17 11 2014 UFTP Authentication Service Contents 1 Installation 1 1.1 Prerequisites....................................
Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3
Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation
From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen
ENTERPRISE SECURITY WITH KEYCLOAK From the Intranet to Mobile By Divya Mehra and Stian Thorgersen PROJECT TIMELINE AGENDA THE OLD WAY Securing monolithic web app relatively easy Username and password
Configuration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
LDAP User Service Guide 30 June 2006
LDAP User Service Guide 30 June 2006 This documents usage of the LDAP User Service for NiagaraAX version 3.1. INSTALLATION... 2 PALETTE... 3 LDAPUSERSERVICE... 3 ACTIVEDIRECTORYSERVICE... 3 KEY CONCEPTS...
<Insert Picture Here> Oracle Web Cache 11g Overview
Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content
vcloud Air Platform Programmer's Guide
vcloud Air Platform Programmer's Guide vcloud Air OnDemand 5.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
HireDesk API V1.0 Developer s Guide
HireDesk API V1.0 Developer s Guide Revision 1.4 Talent Technology Corporation Page 1 Audience This document is intended for anyone who wants to understand, and use the Hiredesk API. If you just want to
Title page. Alcatel-Lucent 5620 SERVICE AWARE MANAGER 13.0 R7
Title page Alcatel-Lucent 5620 SERVICE AWARE MANAGER 13.0 R7 APPLICATION API DEVELOPER GUIDE 3HE-10590-AAAA-TQZZA Issue 1 December 2015 Legal notice Legal notice Alcatel, Lucent, Alcatel-Lucent and the
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
There are more security levels in ARCHIBUS, as described bellow.
Glossary: VPA = Virtual Private ARCHIBUS restriction SSO = Single Sign-On LDAP = Lightweight Directory Access Protocol WebCentral = ARCHIBUS Core Engine IIS = Internet Information Services (IIS, formerly
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
Single-sign-on between MWS custom portlets and IS services
Community TechNote Single-sign-on between MWS custom portlets and IS services Abstract Version 2 Updated 22 Sep 2009 This article describes how to use Single- Sign-On in the authentication of MWS portlets
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
Post Installation Guide for Primavera Contract Management 14.1 July 2014 Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
LDAP Authentication and Authorization
LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized
vcommander will use SSL and session-based authentication to secure REST web services.
vcommander REST API Draft Proposal v1.1 1. Client Authentication vcommander will use SSL and session-based authentication to secure REST web services. 1. All REST API calls must take place over HTTPS 2.
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected]
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected] Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
SSL CONFIGURATION GUIDE
HYPERION RELEASE 9.3.1 SSL CONFIGURATION GUIDE CONTENTS IN BRIEF About This Document... 2 Assumptions... 2 Information Sources... 2 Identifying SSL Points for Hyperion Products... 4 Common Activities...
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Tenable for CyberArk
HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Ricardo Perdigao, Solutions Architect Edsel Garcia, Principal Software Engineer Jean Munro, Senior Systems Engineer Dan Mitchell, Principal Systems
A Sexy UI for Progress OpenEdge using JSDO and Kendo UI Ricardo Perdigao, Solutions Architect Edsel Garcia, Principal Software Engineer Jean Munro, Senior Systems Engineer Dan Mitchell, Principal Systems
IBM WebSphere Portal Integrator for SAP
Introduction This article describes the setup of a simple scenario of the IBM WebSphere Portal Integrator for SAP to give you a quick start. It uses the standard page structure as it is created during
TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS
White Paper TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS Abstract This white paper explains how to diagnose and troubleshoot issues in the RSA Access Manager single sign-on
The HTTP Plug-in. Table of contents
Table of contents 1 What's it for?... 2 2 Controlling the HTTPPlugin... 2 2.1 Levels of Control... 2 2.2 Importing the HTTPPluginControl...3 2.3 Setting HTTPClient Authorization Module... 3 2.4 Setting
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013
SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
Lucid Key Server v2 Installation Documentation. www.lucidcentral.org
Lucid Key Server v2 Installation Documentation Contents System Requirements...2 Web Server...3 Database Server...3 Java...3 Tomcat...3 Installation files...3 Creating the Database...3 Step 1: Create the
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
TMS Phone Books Troubleshoot Guide
TMS Phone Books Troubleshoot Guide Document ID: 118705 Contributed by Adam Wamsley and Magnus Ohm, Cisco TAC Engineers. Jan 05, 2015 Contents Introduction Prerequisites Requirements Components Used Related
<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style
Hudson Security Architecture Click to edit Master subtitle style Winston Prakash Hudson Security Architecture Hudson provides a security mechanism which allows Hudson Administrators
GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK
Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science
OIOSAML 2.0 Toolkits Test results May 2009
OIOSAML 2.0 Toolkits Test results May 2009 5. September 2008 - Søren Peter Nielsen: - Lifted and modified from http://docs.google.com/a/nemsso.info/doc?docid=dfxj3xww_7d9xdf7gz&hl=en by Joakim Recht 12.
LDAP User Guide PowerSchool Premier 5.1 Student Information System
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
GlobalSign Enterprise Solutions Google Apps Authentication User Guide
GlobalSign Enterprise Solutions Google Apps Authentication User Guide Using EPKI for Google Apps for Business Single Sign-on and Secure Document Sharing v.1.1 1 Table of Contents Table of Contents... 2
Configuring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
Programming Autodesk PLM 360 Using REST. Doug Redmond Software Engineer, Autodesk
Programming Autodesk PLM 360 Using REST Doug Redmond Software Engineer, Autodesk Introduction This class will show you how to write your own client applications for PLM 360. This is not a class on scripting.
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
ACCESSING THE PROGRESS OPENEDGE APPSERVER FROM PROGRESS ROLLBASE USING JSDO CODE
ACCESSING THE PROGRESS OPENEDGE APPSERVER FROM PROGRESS ROLLBASE USING JSDO CODE BY EDSEL GARCIA, PRINCIPAL SOFTWARE ENGINEER, PROGRESS OPENEDGE DEVELOPMENT 2 TABLE OF CONTENTS Introduction 3 Components
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
Office 365 deployment checklists
Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.
Certified Secure Web Application Security Test Checklist
www.certifiedsecure.com [email protected] Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands Certified Secure Checklist About Certified Secure exists to encourage and fulfill
From centralized to single sign on
The LemonLDAP::NG project Abstract LemonLDAP::NG is a modular WebSSO (Web Single Sign On) software based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the
Perceptive Integration Server
Perceptive Integration Server Getting Started Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: October 2013 2013 Perceptive Software. All rights reserved CaptureNow, ImageNow,
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
REST web services. Representational State Transfer Author: Nemanja Kojic
REST web services Representational State Transfer Author: Nemanja Kojic What is REST? Representational State Transfer (ReST) Relies on stateless, client-server, cacheable communication protocol It is NOT
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
SAAS. Best practices for SAAS implementation using an Open Source Portal (JBoss)
SAAS Best practices for SAAS implementation using an Open Source Portal (JBoss) Introduction JBoss Portal is a very popular open source portal offering from Red Hat. It is JSR-168 compliant and provides
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD
esoc European Space Operations Centre Robert-Bosch-Strasse 5 64293 Darmstadt Germany Tel: (49)615190-0 Fax: (49)615190485 www.esa.int SSA DC-I Part 1 - Single Sign-On and Access Management ICD Prepared
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
Cross-domain Identity Management System for Cloud Environment
Cross-domain Identity Management System for Cloud Environment P R E S E N T E D B Y: N A Z I A A K H TA R A I S H A S A J I D M. S O H A I B FA R O O Q I T E A M L E A D : U M M E - H A B I B A T H E S
Configuring ActiveVOS Identity Service Using LDAP
Configuring ActiveVOS Identity Service Using LDAP Overview The ActiveVOS Identity Service can be set up to use LDAP based authentication and authorization. With this type of identity service, users and
