CloudCERT (Testbed framework to exercise critical infrastructure protection)
|
|
- Gwen Parker
- 8 years ago
- Views:
Transcription
1 WP2. CONCEPTUAL MODELLING AND ARCHITECTURE CloudCERT (Testbed framework to exercise critical infrastructure protection) With the financial support of the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme. European Commission - Directorate-General Justice, Freedom and Security
2 PROJECT CHRONOGRAM WP1 WP2 WP1 Project Management WP3 WP4 WP5 WP6 WP2 Modelling & Architecture. WP3 Information and Communication Standards WP4 Secure Framework Definition. WP5 Platform Development. WP6 Pilot experimentation. WP7 Dissemination. WP7
3 WP2. CONCEPTUAL MODELLING AND ARCHITECTURE OBJETIVE Design the system architecture based on the system conceptual definition of CloudCERT Platform. ACTIVITIES WP2.1 Platform conceptual modelling. DELIVERABLES D3.1 Platform Design document.
4 WP2. 1 Platform conceptual modelling DELIVERABLE D PLATFORM DESIGN DOCUMENT OBJETIVES Base platform model analysis: analysis in depth of the model documentation of the base platform. Platform model adaptation: generating the CloudCERT model document, based on the previous analysis. Base platform architecture analysis: analysis in depth of the architecture documentation of the base platform. Platform architecture adaptation: generating the CloudCERT architecture document, based on the previous analysis.
5 D2.1 Platform Design Document ARCHITECTURE MODEL SERVER CLIENT DATABASE SERVER LDAP SERVER WEB SERVER APPLICATION SERVER WEB BROWSER
6 D2.1 Platform Design Document Logical Model (I) LOGICAL MODEL Web Browser Mobile device USER TIER PRESENTATION TIER LOGIC TIER DATA ACCESS TIER
7 D2.1 Platform Design Document Logical Model (II) USER AND PRESENTATION TIERS Users can use CloudCERT with any device capable to connect the Internet. The information will be shown into the browser using a secure interface to maintain the privacy of contents and users. Web Browser Mobile device USER TIER PRESENTATION TIER 7
8 D3.1 Platform Design Document Logical Model (III) LOGIC TIER (I) Web Services: Web services available within the platform are deployed in AXIS CloudCERT. AXIS is a SOAP implementation developed by Apache and meeting OASIS and W3C standards. Struts: It has been used at level views (JSP's) the following elements of Struts presentation layer: Validators: For the different form fields. Tags-lib's: To facilitate the presentation of different data types. J2EE: The model of the different components of the CloudCERT platform is based on the standard J2EE (Java 2 Enterprise Edition). LOGIC TIER 8
9 D2.1 Platform Design Document Logical Model (IV) LOGIC TIER (II) Spring: It is used (combined with Hibernate) for the persistence of information. The main functionalities are: Storage and retrieval of information Transactionality Jboss: It is used as the application server for hosting J2EE which constitute the CloudCERT platform. CERT Management Console CloudCERT Management Console Web Services Authentication Services Single Sign - on: Central Authentication Service (CAS) Password management module. LOGIC TIER 9
10 D2.1 Platform Design Document Logical Model (V) DATA ACCESS TIER (I) MySQL: Database used to store every application data, including: Information management CloudCERT platform Global data platform Data on management information CloudCERT Audit information Entities level information Entity-specific information. Information content. Translations Information. Status information. DATA ACCESS TIER 10
11 D2.1 Platform Design Document Logical Model (and VI) DATA ACCESS TIER (II) Open LDAP: It manages the Directory (users access control to CloudCERT). It is also used to restrict or allow access (authorization) based on authenticated user role on the different applications or parts of applications. Apache: This is the applications web server. The main features in the project are the following: Request load balancer on the cluster formed by the instances of Application Server (JBoss) Managing secure connections SSL (Secure Sockets Layer) applications. Accommodate and serve the contents of the portals of the CERTs, developed in PHP (PHP Hypertex t Pre-processor). Hibernate: Used to facilitate the storage and retrieval of Java domain objects via object/relational mapping. DATA ACCESS TIER 11
12 D2.1 Platform Design Document MVC Outline User gestures State change View selection Change notification State query 12
13 D2.1 Platform Design Document Functional Design Entity CloudCERT Admin Console Management Supervisor Transport Entity Registration Configuration Moderation Moderation Moderator Moderator Admin Financial Entity Energy Admin CloudCERT User Console Permissions Content Propagation Shared Repository Contents Users Services Public Web site Private repository 13
14 D2.1 Platform Design Document Security Entity CloudCERT Admin Console Entity Registration Permissions Entity Energy Registration DIRECTORY Access Control Supervisor Admin Operation Management Users Users Authentication Authorization Authentication Authorization Moderator Admin Public Web site Access Control Permissions CloudCERT User Console Services Contents 14
15 D2.1 Platform Design Document Overall context design APPLICATION AREA APPLICATION CONTEXT AREA BACK-END AREA 15
16 Thank you. With the financial support of the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme. European Commission - Directorate-General Justice, Freedom and Security
Client Overview. Engagement Situation. Key Requirements for Platform Development :
Client Overview Our client provides leading video platform for enterprise HD video conferencing and has product suite focused on product-based visual communication solutions. Our client leverages its solutions
More informationCustomer Bank Account Management System Technical Specification Document
Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6
More informationJEE Web Applications Jeff Zhuk
JEE Web Applications Jeff Zhuk From the book and beyond Integration-Ready Architecture and Design Cambridge University Press Software Engineering With XML, Java,.NET, Wireless, Speech and Knowledge Technologies
More informationenterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards
IBM WebSphere Application Server v7.0 Security Secure your WebSphere applications with Java EE and JAAS security standards Omar Siliceo "publishing enterprise^ birmingham - mumbai Preface 1 Chapter 1:
More informationTo increase scalability, the following features can be integrated:
Client Requirements Magento Multi Store Ecommerce Management system is an online virtual mall using is Saas based model based Ecommerce Platform where merchants and retailers can sign up and easily create
More informationPortals, Portlets & Liferay Platform
Portals, Portlets & Liferay Platform Repetition: Web Applications and Model View Controller (MVC) Design Pattern Web Applications Frameworks in J2EE world Struts Spring Hibernate Data Service Java Server
More informationDTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities:
DTWMS Required Software Engineers 1. Senior Java Programmer (3 Positions) Responsibilities: Responsible to deliver quality software solutions using standard end to end software development cycle Collaborate
More informationCase Study. SaaS Based Multi-Store Market Place. www.brainvire.com 2013 Brainvire Infotech Pvt. Ltd Page 1 of 5
Case Study SaaS Based Multi-Store Market Place Page 1 of 5 Client Requirement Magento Multi-Store Ecommerce Management is a web based virtual mall. It s an e- commerce virtual mall cum SaaS based model
More informationCHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS
CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS Java EE Components Java EE Vendor Specifications Containers Java EE Blueprint Services JDBC Data Sources Java Naming and Directory Interface Java Message
More informationGuide to Web Hosting in CIS. Contents. Information for website administrators. ITEE IT Support
Contents CIS Web Environment... 2 Cis-web... 2 Cis-content... 2 MySQL... 3 Applying for web hosting... 3 Frequently Asked Questions... 4 Code Snippets... 6 LDAP authentication... 6 1 BN : June 2010 CIS
More informationOracle Identity Analytics Architecture. An Oracle White Paper July 2010
Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
More informationWhite Paper: 1) Architecture Objectives: The primary objective of this architecture is to meet the. 2) Architecture Explanation
White Paper: 1) Architecture Objectives: The primary objective of this architecture is to meet the following requirements (SLAs). Scalability and High Availability Modularity and Maintainability Extensibility
More informationSoftware Architecture Document
Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural
More informationTIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
More informationNo.1 IT Online training institute from Hyderabad Email: info@sriramtechnologies.com URL: sriramtechnologies.com
I. Basics 1. What is Application Server 2. The need for an Application Server 3. Java Application Solution Architecture 4. 3-tier architecture 5. Various commercial products in 3-tiers 6. The logic behind
More informationEntrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
More informationOracle WebLogic Server 11g Administration
Oracle WebLogic Server 11g Administration This course is designed to provide instruction and hands-on practice in installing and configuring Oracle WebLogic Server 11g. These tasks include starting and
More informationLast Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
More informationActiveVOS Server Architecture. March 2009
ActiveVOS Server Architecture March 2009 Topics ActiveVOS Server Architecture Core Engine, Managers, Expression Languages BPEL4People People Activity WS HT Human Tasks Other Services JMS, REST, POJO,...
More informationWhite Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
More informationGlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications,
GlassFish Security Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures Masoud Kalali PUBLISHING
More informationMALAYSIAN PUBLIC SECTOR OPEN SOURCE SOFTWARE (OSS) PROGRAMME BENCHMARK/COMPARISON REPORT DOCUMENT MANAGEMENT SYSTEMS (NUXEO AND ALFRESCO)
MALAYSIAN PUBLIC SECTOR OPEN SOURCE SOFTWARE (OSS) PROGRAMME BENCHMARK/COMPARISON REPORT DOCUMENT MANAGEMENT SYSTEMS (NUXEO AND ALFRESCO) DECEMBER 2009 Copyright The Government of Malaysia retains the
More informationOracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.
Oracle WebLogic Foundation of Oracle Fusion Middleware Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.com/in/lawrence143 History of WebLogic WebLogic Inc started in 1995 was a company
More informationJAVA/J2EE DEVELOPER RESUME
1 of 5 05/01/2015 13:22 JAVA/J2EE DEVELOPER RESUME Java Developers/Architects Resumes Please note that this is a not a Job Board - We are an I.T Staffing Company and we provide candidates on a Contract
More informationRRF Reply Reporting Framework
RRF Reply Reporting Framework Introduction The increase in the services provided in the telco market requires to carry out short and long-term analyses aimed at monitoring the use of resources and timely
More informationWeb Hosting. Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications.
Web Hosting Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications. Features High-performance Apache web server Apache 1.3 and 2.0 1 with HTTP
More informationHigh Availability CAS
High Availability CAS Adam Rybicki, Scott Battaglia 2009 Jasig Conference, Dallas, TX March 4, 2009 Copyright Unicon, Inc., 2009. This work is the intellectual property of Unicon, Inc. Permission is granted
More informationProject Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/-
Project Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/- Senior Soft ware Developer 2 Posts Junior Soft ware Developer 4 Posts Database Administrator
More informationManagement. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.
ORACLE Oracle Press Oracle Fusion Middleware 11 g Architecture and Management Reza Shafii Stephen Lee Gangadhar Konduri Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan
More informationPatent Public Advisory Committee Meeting PE2E Status. David Landrith Patents Portfolio Manager July 14, 2011
Patent Public Advisory Committee Meeting PE2E Status David Landrith Patents Portfolio Manager July 14, 2011 PE2E Timeline 2 Front-End Summary Integrated front-end design & implementation Initial front-end
More informationWEB APPLICATION DEVELOPMENT. UNIT I J2EE Platform 9
UNIT I J2EE Platform 9 Introduction - Enterprise Architecture Styles - J2EE Architecture - Containers - J2EE Technologies - Developing J2EE Applications - Naming and directory services - Using JNDI - JNDI
More informationNet-WMS FP6-034691. Net-WMS SPECIFIC TARGETED RESEARCH OR INNOVATION PROJECT. Networked Businesses. D.8.1 Networked architecture J2EE compliant
Net-WMS SPECIFIC TARGETED RESEARCH OR INNOVATION PROJECT Networked Businesses D.8.1 Networked architecture J2EE compliant ( Version 1 ) Due date of deliverable: June 30 th, 2007 Actual submission date:
More informationProperty & Casualty Insurance Solutions from CCS Technology Solutions
Property & Casualty Insurance Solutions from CCS Technology Solution presents OneTimePortal (Powered by WEBSPHERE), Web-based software platform for property and casualty insurers that are seeking to reduce
More informationProject Title: Judicial Branch Enterprise Document Management System RFP Number: FIN122210CK Appendix D Technical Features List
FEAT891 Medium Recoverable using backup The solution shall be recoverable from backup storage media storage media. FEAT893 Desired Medium Support Load Sharing High Availability The solution should utilize
More informationInformation Technology Services Classification Level Range C Reports to. Manager ITS Infrastructure Effective Date June 29 th, 2015 Position Summary
Athabasca University Professional Position Description Section I Position Update Only Information Position Title Senior System Administrator Position # 999716,999902 Department Information Technology Services
More informationThis training is targeted at System Administrators and developers wanting to understand more about administering a WebLogic instance.
This course teaches system/application administrators to setup, configure and manage an Oracle WebLogic Application Server, its resources and environment and the Java EE Applications running on it. This
More informationChapter. Solve Performance Problems with FastSOA Patterns. The previous chapters described the FastSOA patterns at an architectural
Chapter 5 Solve Performance Problems with FastSOA Patterns The previous chapters described the FastSOA patterns at an architectural level. This chapter shows FastSOA mid-tier service and data caching architecture
More informationApache Syncope OpenSource IdM
Apache Syncope OpenSource IdM Managing Identities in Enterprise Environments Version 1.3 / 2012-07-26 Apache Syncope OpenSource IdM by http://syncope.tirasa.net/ is licensed under a Creative Commons Attribution
More informationMS 10978A Introduction to Azure for Developers
MS 10978A Introduction to Azure for Developers Description: Days: 5 Prerequisites: This course offers students the opportunity to learn about Microsoft Azure development by taking an existing ASP.NET MVC
More informationSchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
More informationADMINISTERING ADOBE LIVECYCLE MOSAIC 9.5
ADMINISTERING ADOBE LIVECYCLE MOSAIC 9.5 Legal notices Copyright 2011 Adobe Systems Incorporated and its licensors. All rights reserved. Administering Adobe LiveCycle Mosaic 9.5 March 31, 2011 This administering
More informationFileMaker Server 13. FileMaker Server Help
FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
More informationBeyond the SOA/BPM frontiers Towards a complete open cooperative environment
Beyond the SOA/BPM frontiers Towards a complete open cooperative environment This presentation has been used during a webinar delivered within SpagoWorld Webinar Center: http://www.spagoworld.org/xwiki/bin/view/spagoworld/webinarcenter
More informationBPM FOR QUALITY ASSURANCE SYSTEMS IN HIGHER EDUCATION
Journal of Teaching and Education, CD-ROM. ISSN: 2165-6266 :: 03(02):175 183 (2014) Copyright c 2014 by UniversityPublications.net BPM FOR QUALITY ASSURANCE SYSTEMS IN HIGHER EDUCATION Vicente Cerverón-Lleó,
More informationManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)
ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationStock Trader System. Architecture Description
Stock Trader System Architecture Description Michael Stevens mike@mestevens.com http://www.mestevens.com Table of Contents 1. Purpose of Document 2 2. System Synopsis 2 3. Current Situation and Environment
More informationSAAS. Best practices for SAAS implementation using an Open Source Portal (JBoss)
SAAS Best practices for SAAS implementation using an Open Source Portal (JBoss) Introduction JBoss Portal is a very popular open source portal offering from Red Hat. It is JSR-168 compliant and provides
More informationFileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
More informationConfiguring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based
More informationCourse 10978A Introduction to Azure for Developers
Course 10978A Introduction to Azure for Developers Duration: 40 hrs. Overview: About this Course This course offers students the opportunity to take an existing ASP.NET MVC application and expand its functionality
More informationPro<DOC/> e-commerce Technology An Introduction
Pro e-commerce Technology An Introduction From Rightangle Technologies Private Limited (www.rigthangle.co.in) 1 P a g e R i g h t a n g l e T e c h n o l o g i e s P v t. L t d. 1 Problem Statement
More informationSpring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
More informationSetup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationENGINEER - DEVELOPER ADVANCED JAVA. 28 years old - 7 years of experience
Alexandru A. ENGINEER - DEVELOPER ADVANCED JAVA 28 years old - 7 years of experience Business expertise: Languages: Certifications: Software editors Romanian (Native speaker), English (Advanced), Russian
More informationNetIQ Identity Manager Setup Guide
NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationRelease 6.2.1 System Administrator s Guide
IBM Maximo Release 6.2.1 System Administrator s Guide Note Before using this information and the product it supports, read the information in Notices on page Notices-1. First Edition (January 2007) This
More informationCasper Suite. Security Overview
Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite
More informationBasic TCP/IP networking knowledge of client/server concepts Basic Linux commands and desktop navigation (if don't know we will cover it )
About Oracle WebLogic Server Oracle WebLogic Server is the industry's best application server for building and deploying enterprise Java EE applications with support for new features for lowering cost
More informationUNIVERSITY OF ILLINOIS AT CHICAGO University of Illinois Ready
UNIVERSITY OF ILLINOIS AT CHICAGO University of Illinois Ready Kuali Ready & University of Illinois Ready Web-Based System adopted by all three campuses of the University of Illinois system Step by step
More informationFileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationWebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
More informationIDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization
More informationTitle of Deliverable Interoperability Framework Release Report 1 IF/2-D3, IF/3-D3, IF/4-D3, IF/5-D3
Project Number Project Title IST-2006-033789 Planets Title of Deliverable Interoperability Framework Release Report 1 Deliverable Number Contributing Sub-project and Work-package Deliverable Dissemination
More informationAuthentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
More informationSOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
More informationNovell Access Manager
J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations
More informationStandards and Guidelines for. Information Technology. Infrastructure, Architecture, and Ongoing Operations
Standards and Guidelines for Information Technology Infrastructure, Architecture, and Ongoing Operations This document describes applicable standards and guidelines for the university's policy on Information
More informationitop: the open-source ITSM solution
itop: the open-source ITSM solution itop is a multi-client web portal designed for service providers and businesses. Simple and easy to use, it allows all configuration items and their relationships to
More informationOnline Voting for Better Government State IT Management Initiative
Nomination: Marshall University s On-line Voting for Better Government Online Voting for Better Government State IT Management Initiative Nomination Form May 23, 2003 extension to deadline granted. Title
More informationAnnexure 02: Technology Stacks for CAS (State) and CAS (Centre) Version and Year of Release
Annexure 02: Technology Stacks for CAS (State) CAS (Centre) CAS (State) will be developed in two distinct technology stacks the SDA at the Center. The Technical Details for CAS (State) Solution Stack 1
More informationSSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin Release notes J System Solutions Version 3.6 JSS SSO Plugin v3.6 Release notes What's new... 3 Improved Integrated Windows Authentication... 3 BMC ITSM self service... 3 Improved BMC ITSM Incident
More informationMiddleware integration in the Sympa mailing list software. Olivier Salaün - CRU
Middleware integration in the Sympa mailing list software Olivier Salaün - CRU 1. Sympa, its middleware connectors 2. Sympa web authentication 3. CAS authentication 4. Shibboleth authentication 5. Sympa
More informationIntegrating EJBCA and OpenSSO
Integrating EJBCA and OpenSSO EJBCA is an Enterprise PKI Certificate Authority issuing certificates to users, servers and devices. In an organization certificate can be used for strong authentication.
More informationSolarWinds Log & Event Manager
Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...
More informationOpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way
OpenAM Written and tested with OpenAM Snapshot 9 the Single Sign-On (SSO) tool for securing your web applications in a fast and easy way Indira Thangasamy [ PUBLISHING 1 open source 1 community experience
More informationClient-Server Architecture & J2EE Platform Technologies Overview Ahmed K. Ezzat
Client-Server Architecture & J2EE Platform Technologies Overview Ahmed K. Ezzat Page 1 of 14 Roadmap Client-Server Architecture Introduction Two-tier Architecture Three-tier Architecture The MVC Architecture
More informationat the Advanced Photon Source Debby Quock, ANL Advanced Photon Source ICALEPCS 2007 Control System Cyber-Security Workshop
Control System Cyber Security Measures at the Advanced Photon Source Debby Quock, ANL Advanced Photon Source ICALEPCS 2007 Control System Cyber-Security Workshop Introduction Advanced Photon Source (APS)
More informationAn Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
More informationIBM WebSphere Server Administration
IBM WebSphere Server Administration This course teaches the administration and deployment of web applications in the IBM WebSphere Application Server. Duration 24 hours Course Objectives Upon completion
More informationWebLogic Server Admin
Course Duration: 1 Month Working days excluding weekends Overview of Architectures Installation and Configuration Creation and working using Domain Weblogic Server Directory Structure Managing and Monitoring
More informationMERMIG The advanced collaboration software
What is MERMIG? MERMIG is a powerful, Web based collaboration platform addressing the needs of those who are: involved in working groups, committees, projects or any kind of team work, dealing with multilingual
More informationWebSphere Application Server - Introduction, Monitoring Tools, & Administration
WebSphere Application Server - Introduction, Monitoring Tools, & Administration presented by: Michael S. Pallos, MBA Senior Solution Architect IBM Certified Systems Expert: WebSphere MQ 5.2 e-business
More informationIntroduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
More informationHow To Protect Your Computer From Being Hacked On A J2Ee Application (J2Ee) On A Pc Or Macbook Or Macintosh (Jvee) On An Ipo (J 2Ee) (Jpe) On Pc Or
Pistoia_ch03.fm Page 55 Tuesday, January 6, 2004 1:56 PM CHAPTER3 Enterprise Java Security Fundamentals THE J2EE platform has achieved remarkable success in meeting enterprise needs, resulting in its widespread
More informationPrepared by Enea S.Teresa (Italy) Version 1.0 2006-October 24
Mersea Information System: an Authentication and Authorization System to access distributed oceanographic data. Prepared by Enea S.Teresa (Italy) Version 1.0 2006-October 24 Revision History Date Version
More informationWeb Curator Tool Software Architecture Document
Web Curator Tool Software Architecture Document Version 1.0 FINAL 31/05/2006 Table of Contents 1. Introduction 3 1.1 1.2 Purpose Scope 3 3 1.3 Definitions, Acronyms and Abbreviations 1.4 References 3 3
More informationWebSphere Server Administration Course
WebSphere Server Administration Course Chapter 1. Java EE and WebSphere Overview Goals of Enterprise Applications What is Java? What is Java EE? The Java EE Specifications Role of Application Server What
More informationMESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE
MESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE OWASP AppSec USA 2011 Conference (@appsecusa / hashtag: #appsecusa) Srini Penchikala (@srinip) 09.23.11 GOALS AND SCOPE Goals: Messaging security
More informationBPM for Quality Assurance Systems in Higher Education. Vicente Cerverón-Lleó, Juan Cabotà-Soro, Francisco Grimaldo-Moreno, Ricardo Ferrís-Castell
BPM for Quality Assurance Systems in Higher Education Vicente Cerverón-Lleó, Juan Cabotà-Soro, Francisco Grimaldo-Moreno, Ricardo Ferrís-Castell Motivation (1) The European Higher Education Area (EHEA)
More informationRemote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
More informationEAI-Low Level Design Document
EAI-Low Level Design Document Version No.: Date: Project Name: Project Code: Revision History Version No Date Prepared by / Modified by Significant Changes 1. Glossary Abbreviation Description
More informationArchitectural Overview
Architectural Overview Version 7 Part Number 817-2167-10 March 2003 A Sun ONE Application Server 7 deployment consists of a number of application server instances, an administrative server and, optionally,
More informationJBS-102: Jboss Application Server Administration. Course Length: 4 days
JBS-102: Jboss Application Server Administration Course Length: 4 days Course Description: Course Description: JBoss Application Server Administration focuses on installing, configuring, and tuning the
More informationConfiguring Secure Socket Layer (SSL) for use with BPM 7.5.x
Configuring Secure Socket Layer (SSL) for use with BPM 7.5.x Configuring Secure Socket Layer (SSL) communication for a standalone environment... 2 Import the Process Server WAS root SSL certificate into
More informationProtected Trust Directory Sync Guide
Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory
More informationCourse Description. Course Audience. Course Outline. Course Page - Page 1 of 5
Course Page - Page 1 of 5 WebSphere Application Server 7.0 Administration on Windows BSP-1700 Length: 5 days Price: $ 2,895.00 Course Description This course teaches the basics of the administration and
More informationWEBSPHERE APPLICATION SERVER ADMIN V8.5 (on Linux and Windows) WITH REAL-TIME CONCEPTS & REAL-TIME PROJECT
WEBSPHERE APPLICATION SERVER ADMIN V8.5 (on Linux and Windows) WITH REAL-TIME CONCEPTS & REAL-TIME PROJECT Faculty Name Experience Course Duration Madhav (Certified Middleware Professional) Certified on
More informationArchitecture Guide Jahia EE v6.1
Documentation Architecture Guide Jahia EE v6.1 Jahia delivers the first Web Content Integration Software by combining Enterprise Web Content Management with Document and Portal Management features. Jahia
More informationOnline Mediation Controller 6-1
Online Mediation Controller 6-1 Online Mediation Controller 6-2 Online Mediation Controller 6-3 As the diagram illustrates, Online Mediation Controller can be used in a large number of scenarios for integrating
More information