Stefan Thomé Yves Kising
|
|
|
- Austin Franklin
- 10 years ago
- Views:
Transcription
1 Access your Company s Knowledge Simple, Secure, Comprehensive Stefan Thomé Yves Kising Seite 1 edicos Access your Company's Knowledge
2 edicos Your Corporate Web Competence for Portal and WCMS solutions Information Portals with Liferay Corporate Websites with OpenText Consulting, Implementation and Support Consulting in Digital Marketing and SocialMedia Implementation with strong JAVA Know-How Ongoing Support with edicos Support Center Technology Partnerships Liferay Silver Partner OpenText Premier Partner Seite 2 edicos Access your Company's Knowledge
3 edicos your specialist edicos Solutions edicos UserInterface easy and comfortable AddOn for web content authoring with Liferay edicos SocialMediaBridges Multichannel Publishing directly from the Liferay authoring environment Facts Locations: Hamburg, Hanover, Cologne, Munich Employees: 45 Experience: Since 2003 more than 100 complex web and portal projects Seite 3 edicos Access your Company's Knowledge
4 Business case Seite 4 edicos Access your Company's Knowledge
5 Problems and solution A lot reusable and valuable knowledge spread over different projects and people This knowledge is indispensable for future projects to be successful! Existing Knowledge Management System is not accepted by consultants Based on OpenText Content Server Project Experiences and Skill Profiles are stored as documents or/and as metadata Standard OpenText User Interface without Corporate Design SOLUTION: Knowledge Management Portal to make all these information easily accessible and to fit future requirements for Knowledge Management Seite 5 edicos Access your Company's Knowledge
6 Why Liferay? No licenses costs. Subscription model for Enterprise Edition Flexible theming to fit customers layout style guide (CD) Intuitive user interface with Drag n Drop (like igoogle) Use of Out-of-the-Box feature for many requirements Main implementation tasks: layout, custom portlets, authentication Easy integration of web applications via JSR-286 portlet standard Extensible for future requirements Active Liferay-community Seite 6 edicos Access your Company's Knowledge
7 Three main challenges of the project Simple Secure Comprehensive Seite 7 edicos Access your Company's Knowledge
8 Liferay Portal and OpenText Content Server Simple Secure Comprehensive Seite 8 edicos Access your Company's Knowledge
9 Accessing content from the OT Content Server The user wants to know the skills of the person which he just found within the People finder portlet. GET /skillprofile?uid=11681 GET /km?function=getxmlskillp rofile?uid=11681 Liferay gets the request and sends a new request extended with some additional information to the OT CS, as if it is the user itself. Seite 9 edicos Access your Company's Knowledge
10 Accessing content from the OT Content Server The OT CS delivers the XML to Liferay Portal Metadata Metadata Metadata Metadata Metadata Metadata XML Metadata XML Metadata Metadata XML The OT CS collects the relevant documents and data. The OT CS extracts the metadata and Seite 10 edicos Access your Company's Knowledge The OT CS creates an XML file with the metadata
11 Accessing content from the OT Content Server Liferay delivers the HTML to the user. Liferay transforms the XML to HMTL. The user reads the informations. Seite 11 edicos Access your Company's Knowledge
12
13 Security Simple Secure Comprehensive Seite 13 edicos Access your Company's Knowledge
14 GetAccess Entrust GetAccess is a high performance, scalable Web access control solution. It centrally manages access to multiple applications through a single portal, providing users with single sign-on to the applications and content they are authorized to see The GetAccess component is integrated as an ISAPI-Filter into the Webserver GetAccess is responsible for the security It offers simple Windows Login functionality and two-factor authentication GetAccess can be configured such that certain URLs are protected only by Windows Login and others by two factor authentication (PKI-Card and digit) Seite 14 edicos Access your Company's Knowledge
15 User Management Because no user directory exists, we implement a Liferay service which imports and updates the users from the OT CS into the Liferay portal SSO is achieved by the GetAccess module and an autologin hook The GetAccess module provides the user s address within the HTTP- Header Seite 15 edicos Access your Company's Knowledge
16 Single Sign On 1 2 GetAccess adds a new variable remote_user to the http-request The user is logged in and redirected to his personal page. The autologin hook compares this remoter_user to the OT CS users table and if this is successful The autologin hook compares this remoter_user to its users table. Seite 16 edicos Access your Company's Knowledge
17 Two-factor authentication 1 GA - cookie The user requests a secured portal page /skillprofile?ui d=11641 GetAccess asks for PKI card and password 5 3 https GA - Cookie 4 2 After successful authentication, the GetAccess cookie is provided within the HTTP Header Liferay extracts the GA-cookie and creates a new request with that cookie. Liferay delivers the content to the user GetAccess accepts the GA cookie. Liferay can identify itself as the user Seite 17 edicos Access your Company's Knowledge OT CS provides the requested data to the portal
18 Federated Query Simple Secure Comprehensive Seite 18 edicos Access your Company's Knowledge
19 Federated Query Technical breakdown The user searches in all pots. The results are transformed Corporate Intranet Liferay Portal Blogs OT Content Server Proj-Exper. Skill-Profils General The results are displayed to the user. Seite 19 edicos Access your Company's Knowledge
20 The result Seite 20 edicos Access your Company's Knowledge
21
22 Lessons Learned Certain Liferay portlets are prone to XSS Vulnerabilities, e.g. there is no default HTML-Sanitizer Liferay-Support provides answers and solutions very quickly For efficient debugging of portlet code etc. Liferay source (EE) code should be available Hard customizing of Liferay standard portlets is tricky - one JSP is used within different portlets Evaluate the two options: Create custom portlets on Liferay services Customize existing standard portlets Seite 22 edicos Access your Company's Knowledge
23 Any questions? Your contact Stefan Thomé Managing Director Tel.: +49 (0) Yves P. Kising Senior IT Consultant Tel.: +49 (0) Seite 23 edicos Access your Company's Knowledge
24 edicos Group Locations and contacts Hannover Prinzenstraße Hannover Hamburg Im Spitalerhof Kurze Mühren Hamburg [email protected] Köln Robertstraße Köln [email protected] München In der Kraemer`schen Kunstmühle Birkenleiten München [email protected] Seite 24 edicos Access your Company's Knowledge
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
WebOTX Portal. November, 2015. NEC Corporation, Cloud Platform Division, WebOTX Group
WebOTX Portal November, 2015 NEC Corporation, Cloud Platform Division, WebOTX Group Front-end integration WebOTX Portal What is WebOTX Portal? Internal system integration for creating appropriate work
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
BizFlow 9.0 BizCoves BluePrint
BizFlow 9.0 BizCoves BluePrint HandySoft Global Corporation 1952 Gallows Road Suite 100 Vienna, VA USA 703.442.5600 www.handysoft.com 1999-2004 HANDYSOFT GLOBAL CORPORATION. ALL RIGHTS RESERVED. THIS DOCUMENTATION
Liferay, Alfresco, SSO and LDAP Full Integration
Liferay, Alfresco, SSO and LDAP Full Integration A generic solution of SSO plus LDAP against - Liferay Portals and Alfresco portlets - Alfresco (compliant) standalone applications Jonas Yuan July 18, 2007
OrgPublisher EChart Security
OrgPublisher EChart Security Table of Contents Table of Contents EChart Security Overview... 3 EChart Rich and Thin Client Authentication... 3 Securing Fields... 4 Style Security EChart Rich Client...
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
MY EWU PORTAL FEATURES AND BENEFITS. Promotion of the Eastern brand name
MY EWU PORTAL The My EWU web portal is an interactive website that provides single sign-on access to different EWU information and services. Content is based on your role or roles for example; student,
Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction
SSL-VPN Using different Security Policies on Group Level for AD within one Portal SSL-VPN Security on Group Level Introduction Security on the SSL-VPN is done via Policies which allows or denies access
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
SAP NetWeaver AS Java
Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
ATTACKS TO SAP WEB APPLICATIONS
ATTACKS TO SAP WEB APPLICATIONS by Mariano Nuñez Di Croce [email protected] BlackHat DC 2011 Briefings Abstract "SAP platforms are only accessible internally". While that was true in many organizations
vtiger Customer Portal 4.2 User Manual
- 1 - vtiger Customer Portal 4.2 User Manual (Version 2.0) - 2 - Table of Contents 1. Introduction... 3 2. Installing vtiger Customer Portal... 4 2.1. System Requirements... 4 2.2. Installation Prerequisites...
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
Novell Access Manager
Access Gateway Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 November 16, 2010 www.novell.com Novell Access Manager 3.1 SP2 Access Gateway Guide Legal Notices Novell, Inc., makes no representations
Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform
Communiqué 4 Standardized Communiqué 4 - fully implementing the JCR (JSR 170) Content Repository Standard, managing digital business information, applications and processes through the web. Communiqué
Luminis Platform Banner Document Management Suite Portal Guide. Release 5.0.3 November 2011
Luminis Platform Banner Document Management Suite Portal Guide Release 5.0.3 November 2011 Banner, Colleague, PowerCAMPUS, Luminis and Datatel are trademarks of Ellucian or its affiliates and are registered
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House
JBoss Portal 2.4. Quickstart User Guide
Portal 2.4 Quickstart User Guide Table of Contents Portal - Overview... iii 1. Tutorial Forward...1 2. Installation...2 2.1. Downloading and Installing...2 2.2. Starting Portal...3 3. Portal Terminology...5
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Absorb Single Sign-On (SSO) V3.0
Absorb Single Sign-On (SSO) V3.0 Overview Absorb allows single sign-on (SSO) with third-party systems, regardless of the programming language. SSO is made secure by a series of calls (between Absorb and
Technical White Paper - JBoss Security
Technical White Paper - JBoss Security Clustered SSO 1.0 Table of Contents Target Audience... iii Preface...iv 1. Clustered SingleSignOn...1 1.1. Introduction to SingleSignOn...1 1.2. JBoss implementation
HPC PORTAL DEVELOPMENT PLATFORM
HPC PORTAL DEVELOPMENT PLATFORM Chien-Heng Wu, National Center for High-Performance Computing, [email protected] ABSTRACT In the world of information technology, enterprise applications must be designed,
s@lm@n Microsoft Exam MB2-702 Microsoft Dynamics CRM 2013 Deployment Version: 6.1 [ Total Questions: 90 ]
s@lm@n Microsoft Exam MB2-702 Microsoft Dynamics CRM 2013 Deployment Version: 6.1 [ Total Questions: 90 ] Question No : 1 You install Microsoft Dynamics CRM on-premises. The Microsoft Dynamics CRM environment
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Security Assertion Markup Language (SAML) Site Manager Setup
Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and
Creating a generic user-password application profile
Chapter 4 Creating a generic user-password application profile Overview If you d like to add applications that aren t in our Samsung KNOX EMM App Catalog, you can create custom application profiles using
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity
Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: [email protected] Web:
Audit compliance and long-term archiving for SharePoint
Connect to SharePoint Product Info Audit compliance and long-term archiving for SharePoint Connect to SharePoint integrates Microsoft Office SharePoint with the DocuWare integrated document management
From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen
ENTERPRISE SECURITY WITH KEYCLOAK From the Intranet to Mobile By Divya Mehra and Stian Thorgersen PROJECT TIMELINE AGENDA THE OLD WAY Securing monolithic web app relatively easy Username and password
Connected Data. Connected Data requirements for SSO
Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated
Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.2 Web Applications Deployed on BEA WebLogic Server 9.2
Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.2 Web Applications Deployed on BEA WebLogic Server 9.2 This document describes how to configure Apache HTTP Server
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML --------------------------------------------------------------------------------------------------------------------------- Contents Overview...
Publish Acrolinx Terminology Changes via RSS
Publish Acrolinx Terminology Changes via RSS Only a limited number of people regularly access the Acrolinx Dashboard to monitor updates to terminology, but everybody uses an email program all the time.
Software Architecture Document
Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural
A detailed walk through a CAS authentication
Welcome! First of all, what is CAS? Web single sign on Uses federated authentication, where all authentication is done by the CAS server, instead of individual application servers The implementation is
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3
Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation
Content Management Systems: Drupal Vs Jahia
Content Management Systems: Drupal Vs Jahia Mrudula Talloju Department of Computing and Information Sciences Kansas State University Manhattan, KS 66502. [email protected] Abstract Content Management Systems
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
From centralized to single sign on
The LemonLDAP::NG project Abstract LemonLDAP::NG is a modular WebSSO (Web Single Sign On) software based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the
OpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
HPC Portal Development Platform with E-Business and HPC Portlets
HPC Portal Development Platform with E-Business and HPC Portlets CHIEN-HENG WU National Center for High-Performance Computing, Hsin-Chu, 300, Taiwan E-mail: [email protected] Abstract HPC Portal Development
PowerLink for Blackboard Vista and Campus Edition Install Guide
PowerLink for Blackboard Vista and Campus Edition Install Guide Introduction...1 Requirements... 2 Authentication in Hosted and Licensed Environments...2 Meeting Permissions... 2 Installation...3 Configuring
F5 BIG-IP: Configuring v11 Access Policy Manager APM
coursemonster.com/uk F5 BIG-IP: Configuring v11 Access Policy Manager APM View training dates» Overview This three day course gives networking professionals a functional understanding of the BIG-IPÂ APM
TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS
White Paper TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS Abstract This white paper explains how to diagnose and troubleshoot issues in the RSA Access Manager single sign-on
LearningServer for.net Implementation Guide
LearningServer for.net Implementation Guide This document outlines recommended steps for planning and implementing a LearningServer solution. A successful installation and implementation requires the completion
Salesforce Opportunities Portlet Documentation v2
Salesforce Opportunities Portlet Documentation v2 From ACA IT-Solutions Ilgatlaan 5C 3500 Hasselt [email protected] Date 29.04.2014 This document will describe how the Salesforce Opportunities portlet
Identity Server Guide Access Manager 4.0
Identity Server Guide Access Manager 4.0 June 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF
Introductions. Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP chris.cognetta@tribridge.
Hosted by Introductions Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP [email protected] CRMUG Chairperson Miami & Tampa Co Chair 250+ Dynamics CRM
esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD
esoc European Space Operations Centre Robert-Bosch-Strasse 5 64293 Darmstadt Germany Tel: (49)615190-0 Fax: (49)615190485 www.esa.int SSA DC-I Part 1 - Single Sign-On and Access Management ICD Prepared
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications
SSO Plugin. HP Service Request Catalog. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin HP Service Request Catalog J System Solutions Version 3.6 Page 2 of 7 Introduction... 3 Adobe Flash and NTLM... 3 Enabling the identity federation service... 4 Federation key... 4 Token lifetime...
vcommander will use SSL and session-based authentication to secure REST web services.
vcommander REST API Draft Proposal v1.1 1. Client Authentication vcommander will use SSL and session-based authentication to secure REST web services. 1. All REST API calls must take place over HTTPS 2.
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : C2150-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version : Demo 1.What is the default file name of the
Certified Secure Web Application Secure Development Checklist
www.certifiedsecure.com [email protected] Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill
Developing an Interoperable Blackboard Proxy Tool
Developing an Interoperable Blackboard Proxy Tool George Kroner Developer Relations Engineer Blackboard Inc. Lance Neumann Sr. Software Architect Blackboard Inc. Agenda Building Blocks Proxy Tools Overview
Configuring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
Safewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Entrust Managed Services PKI Administrator s Quick Start Guide
Entrust Managed Services PKI Administrator s Quick Start Guide Each Managed Services PKI organization requires an administrator also known as a local registration authority (LRA) whose duty it is to manage
Liferay Enterprise ecommerce. Adding ecommerce functionality to Liferay Reading Time: 10 minutes
Liferay Enterprise ecommerce Adding ecommerce functionality to Liferay Reading Time: 10 minutes Broadleaf + Liferay ecommerce + Portal Options Integration Details REST APIs Integrated IFrame Separate Conclusion
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Portal Recipient Guide
Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...
How to open the ArchiveWeb Interface directly from MS Outlook
How to open the ArchiveWeb Interface directly from MS Outlook The purpose of this document is to describe how to optionally use ArchiveWeb in MS Outlook. The ArchiveWEB is designed to be used in a web
SAML 2.0 Configurations at SAP NetWeaver AS ABAP and Microsoft ADFS
SAML 2.0 Configurations at SAP NetWeaver AS ABAP and Microsoft ADFS Applies to: SAP Gateway 2.0 Summary This guide describes how you install and configure SAML 2.0 on Microsoft ADFS server and SAP NetWeaver
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
GlobalSign Enterprise Solutions Google Apps Authentication User Guide
GlobalSign Enterprise Solutions Google Apps Authentication User Guide Using EPKI for Google Apps for Business Single Sign-on and Secure Document Sharing v.1.1 1 Table of Contents Table of Contents... 2
How-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server
Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server This document describes how to configure Apache HTTP Server
AccountView. Single Sign-On Guide
AccountView Single Sign-On Guide 2014 Morningstar. All Rights Reserved. AccountView Version: 1.4 Document Version: 2 Document Issue Date: March 09, 2013 Technical Support: (866) 856-4951 Telephone: (781)
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module
Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
How to Configure edgebox as a Web Server
intelligence at the edge of the network www.critical-links.com edgebox V4.5 Introduction: The Web Server panel allows the simple creation of multiple web sites using the Apache web server. Each website
Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive
HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services
1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
