Asynchronous intrusion recovery for interconnected web services
|
|
|
- Louise Dawson
- 10 years ago
- Views:
Transcription
1 Asynchronous intrusion recovery for interconnected web services Ramesh Chandra, Taesoo Kim, Nickolai Zeldovich MIT CSAIL
2 Today's web services are highly interconnected Many web services provide APIs to other sites Many websites integrate those APIs: Authentication: Facebook Connect, Google+... Data sharing: Dropbox... Business process management: Salesforce...
3 Example: online shopping mall... Customer Relationship Management (CRM)
4 Example: online shopping mall Adobe Echo Sign (E-Signature Service) Financial Force (Accounting Service)... CRM Bill.ON (Invoices and Billing Service)
5 Example: online shopping mall Facebook Twitter Allow Facebook users to buy our products without registration Financial Force (Accounting Service) Adobe Echo Sign (E-Signature Service)... CRM Bill.ON (Invoices and Billing Service)
6 Example: online shopping mall Facebook Twitter Allow Facebook users to buy our products without registration Financial Force (Accounting Service) Adobe Echo Sign (E-Signature Service)... Address in Facebook CRM Bill.ON (Invoices and Billing Service)
7 Attack in one service can spread between services Facebook Twitter Adobe Echo Sign (E-Signature Service) Ship purchased products to... Financial Force (Accounting Service)... Address modified by Attacker CRM Bill.ON (Invoices and Billing Service)
8 Bugs in web services are commonplace Facebook (Mar 29th 2013): Attackers can intercept full permission access tokens
9 Bugs in web services are commonplace Facebook (Mar 29th 2013): Attackers can intercept full permission access tokens Many web services have similar bugs Twitter (Aug 20th 2013) Instagram (May 2nd 2013) Microsoft Yammer (Aug 4th 2013)
10 Goal Recovering integrity in interconnected services Repair the state of affected services as if the attack never occurred State-of-the-art: manual recovery Admin doesn't trust other sites for recovery Require manual interaction (e.g., other admin)
11 General plan for automatic recovery Use rollback-and-replay for recovering integrity in single machine Prior works: Retro [OSDI '10], Warp [SOSP '11] Extend rollback-and-replay to many web services!
12 Challenges Rollback-and-replay requires global coordinator Each service cannot decide what to do for repair All services must be available during recovery We want to repair some services even if others are down Consistency problem: some services are not repaired yet
13 Contributions Enable automatic intrusion recovery in distributed web services 1. Repair protocol between services No central coordinator Each service controls its repair 2. Asynchronous repair Proceed repair even with unavailable services Consistency in partially repair state
14 Running example of an attack Facebook Twitter Adobe Echo Sign (E-Signature Service) Ship purchased products to... Financial Force (Accounting Service)... Address modified by Attacker CRM Bill.ON (Invoices and Billing Service)
15 Running example of an attack Facebook... CRM Bill.ON (Invoices and Billing Service)
16 Running example of an attack Attacker Facebook... Victim CRM Bill.ON (Invoices and Billing Service)
17 Running example of an attack Attacker Facebook... Victim CRM Bill.ON (Invoices and Billing Service)
18 Running example of an attack Attacker Facebook... Victim CRM Bill.ON (Invoices and Billing Service)
19 Running example of an attack Attacker Facebook Modify address... Victim CRM Bill.ON (Invoices and Billing Service)
20 Running example of an attack Attacker Facebook Modify address... Victim Address modified by Attacker CRM Bill.ON (Invoices and Billing Service)
21 Timeline of the attack Attacker Victim Facebook Shopping Mall Bill.ON
22 Timeline of the attack Attacker Victim Facebook Time Shopping Mall Bill.ON
23 Timeline of the attack Attacker Victim Facebook Time Shopping Mall Bill.ON
24 Timeline of the attack Attacker Victim Facebook Time Shopping Mall Bill.ON
25 Goal: attack did not take place Attacker Victim Facebook Time Shopping Mall Bill.ON
26 Goal: attack did not take place Attacker Victim Facebook Time Shopping Mall Bill.ON
27 Overview of system execution Normal execution: Record enough information for rollback-and-replay Repair: Identify an attack to initiate repair Repair local state: rollback and replay recorded requests Propagate repair whenever local repair affects others
28 Overview of system execution Normal execution: Record enough information for rollback-and-replay Repair: Identify an attack to initiate repair Repair local state: rollback and replay recorded requests Propagate repair whenever local repair affects others
29 Strawman: repair with global coordinator using rollback-and-replay Attacker Victim Facebook Identify an attack for repair Time Shopping Mall Bill.ON
30 Strawman: repair with global coordinator using rollback-and-replay Attacker Victim Facebook Rollback state before the attack occurred Time Shopping Mall Bill.ON
31 Strawman: repair with global coordinator using rollback-and-replay Attacker Victim Time Error Facebook Rollback state before the attack occurred Shopping Mall Bill.ON
32 Strawman: repair with global coordinator using rollback-and-replay Attacker Victim Error Time Error Facebook Rollback state before the attack occurred Shopping Mall Bill.ON
33 Strawman: repair with global coordinator using rollback-and-replay Attacker Victim Facebook Error Time Error Original address Rollback state before the attack occurred Shopping Mall Bill.ON
34 Strawman: repair with global coordinator using rollback-and-replay Attacker Victim Facebook Error Time Error Original address Rollback state before the attack occurred Shopping Mall Bill.ON
35 Strawman: repair with global coordinator using rollback-and-replay Attacker Victim Facebook Remove access token Restore victim's address Error Time Error Shopping Mall Bill.ON
36 Problems in Strawman design P1. All services must be available Support asynchronous repair with speculation P2. Require global coordinator Define repair APIs between services
37 Problems in Strawman design P1. All services must be available Support asynchronous repair with speculation P2. Require global coordinator Define repair APIs between services
38 Challenge: cooperating with unavailable web services Attacker Victim Facebook Offline Error Time Error Wait for other services to come up? Shopping Mall Unavailable Bill.ON
39 Solution: asynchronous repair Asynchronously deliver repair requests Speculatively proceed local repair with past responses (or timeout responses) Expose repaired state after local repair Intuition: why asynchronous repair works? Many web services are designed for independent operation, prepared for handling others failures
40 Example: asynchronous repair Attacker Victim Facebook Repair queues Error Time Error Shopping Mall Bill.ON
41 Example: asynchronous repair Attacker Victim Facebook Repair queues Error Time Speculatively proceed Error with past request Asynchronously deliver new response Shopping Mall Bill.ON
42 Example: asynchronous repair Attacker Victim Facebook Repair queues Error Time Speculatively proceed Error with past request Asynchronously deliver new response Shopping Mall Bill.ON
43 Example: asynchronous repair Attacker Victim Facebook Repair queues Error Time Speculatively proceed Error with past request Asynchronously deliver new response Shopping Mall Bill.ON
44 Example: exposing state after local repair Attacker Victim Facebook Shopping Mall Bill.ON Time... Another web service Two services are still repairing
45 What if speculation fails? If service responds differently, Restart local repair with the new response In fact, it is not different from initiating new repair Asynchronous repair will converge to the correctly repaired state at the end
46 Example: speculation failure Shopping Mall Facebook Message: Mall Ready for shipping to: ok
47 Example: speculation failure Shopping Mall Facebook Message: Mall Ready for shipping to: Following request depends on previous request ok
48 Example: speculation failure Shopping Mall Facebook Message: Mall Ready for shipping to: ok
49 Example: speculation failure Shopping Mall Facebook Message: Message: Mall Mall Ready for shipping to: Ready for shipping to: ok Respond with different result
50 Example: speculation failure Shopping Mall Facebook Message: Mall Ready for shipping to: ok
51 Example: speculation failure Shopping Mall Facebook Message: Mall Ready for shipping to: ok
52 Example: speculation failure Shopping Mall Facebook Message: Asynchronous repair makes forward Mall progress in time-line graph, so it will converge Ready for shipping to: to the correctly repaired state at the end ok
53 Consistency problem: partially repaired state Attacker Victim... Facebook Shopping Mall Bill.ON Two services are still repairing Time Repaired state Another web service?
54 Consistency problem: partially repaired state Exposing partially repaired state might diverge global state But it is not something new that our recovery mechanism introduces more Most of web services already cope with this problem
55 Exposing partially repaired state might violate service invariants Service invariants: guarantees by service provider (e.g., locking serivce: when lock is held, no concurrent access) In theory: yes (for arbitrary tightly coupled systems) In practice: no RESTful APIs usually provide consistency per API Web services are in nature loosely coupled
56 Consistency: partial repair state Services and clients already deal with concurrency Repair of a service is modeled as: Being performed by a concurrent repair actor client That uses the service's regular API calls So, partially repaired state can be considered as state resulting from yet another concurrent operations
57 Problems in Strawman design P1. All services must be available Support asynchronous repair with speculation P2. Require global coordinator Define repair APIs between services
58 How to propagate repair requests without global coordinator? Attacker Victim Facebook Time Error to How to ask services initiate repair? Shopping Mall Bill.ON
59 Requesting repair with APIs (RPC) Facebook Tagged: #7 Shopping Mall Tag each request in normal exec. Each service runs repair controller From: Facebook To: Shopping Mall New response (repaired) Tag replace_response(#7, API: modify the previous response From: Facebook To: Shopping Mall )
60 Repair APIs (RPC) No centralized coordinator, each server invokes following repair APIs to recover from the attack replace_response(tag, resp): replace past response replace_request(tag, req): replace past request delete(tag): delete past request create(req, before, after): execute new requests in the past
61 Repair APIs (RPC) No centralized coordinator, each server invokes following repair APIs to recover from the attack replace_response(tag, resp): replace past response replace_request(tag, req): replace past request delete(tag): delete past request create(req, before, after): execute new requests in the past If service supports those 4 APIs, it can participate in decentralized recovery
62 Authentication of repair APIs Too application specific (e.g. service: sender can delete recipient's s?) Delegate authentication to original web services Implement application specific policy (e.g. ask admin for confirmation of repair) Assign a credential to repair requests
63 Summary of design 1. Asynchronous repair Proceed repair with offline or unavailable services Consistency in partially repair state 2. Repair APIs between services No central coordinator Each service controls its repair Delegate authentication
64 Implementation Prototype implementation: Aire Extend Django web framework Support existing Django app. with few modifications Support Askbot, Django-OAuth, and Dpaste e.g., Askbot's authentication policy: 55 LoC Total: 5700 lines of Python code
65 Evaluation questions Can Aire support real web services? Can Aire recover from distributed attacks? What are the runtime overheads of Aire?
66 Aire supports real web services Askbot OAuth Provider Dpaste
67 Aire supports real web services Askbot OAuth Provider Dpaste
68 Aire supports real web services Askbot OAuth Provider Dpaste
69 Aire supports real web services Askbot OAuth Provider... Dpaste
70 Aire supports real web services Askbot OAuth Provider... Dpaste Post code Append a link to Dpaste Share link:
71 Aire supports real web services Askbot OAuth Provider Askbot + OAuth + Dpaste... = 183K LoC! Dpaste Aire can support large Django web applications Post code Append a link to Dpaste Share link:
72 Aire enables automatic recovery Askbot OAuth Provider... Dpaste Post code Append a link to Dpaste Share link:
73 Aire enables automatic recovery Askbot OAuth Provider... Dpaste Post code Append a link to Dpaste Share link:
74 Aire enables automatic recovery Askbot OAuth Provider... Dpaste Post code Append a link to Dpaste Share link:
75 Aire enables automatic recovery Askbot, OAuth, and Dpaste are correctly recovered Even when Dpaste is temporary unavailable Even when Dpaste goes offline More examples in paper: Intrusion recovery (synthetic) Mistakes on ACL setting Misconfigured versioning spreadsheet
76 Aire has moderate runtime overheads Workload Req/s without Aire Req/s with Aire Logs / req With Aire Reading KB Writing KB 19-30% throughput reduction 5-9KB/req storage overheads Moderate overheads for websites which care integrity more than performance
77 Aire's repair is efficient Askbot OAuth DPaste 105 / /9 1 / Local repair time sec 0.10 sec 3.91 sec Normal exec. time sec 0.01 sec 0.02 sec Repaired Reqs Remote repair reqs Experiment setting: Attacker logins as a victim user and writes a post 100 legitimate users post 5 questions and navigate All users are affected by the attack (read attacker's post)
78 Aire's repair isrepair efficient in Askbot propagates to OAuth and Dpaste Askbot OAuth DPaste 105 / /9 1 / Local repair time sec 0.10 sec 3.91 sec Normal exec. time sec 0.01 sec 0.02 sec Repaired Reqs Remote repair reqs Experiment setting: Attacker logins as a victim user and writes a post 100 legitimate users post 5 questions and navigate All users are affected by the attack (read attacker's post)
79 Aire's repair is efficient 5% of requests are repaired Askbot OAuth DPaste 105 / /9 1 / Local repair time sec 0.10 sec 3.91 sec Normal exec. time sec 0.01 sec 0.02 sec Repaired Reqs Remote repair reqs Experiment setting: Attacker logins as a victim user and writes a post 100 legitimate users post 5 questions and navigate All users are affected by the attack (read attacker's post)
80 Aire's repair is efficient Askbot OAuth DPaste 105 / /9 1 / Local repair time sec 0.10 sec 3.91 sec Normal exec. time sec 0.01 sec 0.02 sec Repaired Reqs Remote repair reqs Total repair takessetting: x2 shorter than normal execution, Experiment although x10 slower in replaying Attacker logins as a victim user and writes a post a request for repair 100 legitimate users post 5 questions and navigate All users are affected by the attack (read attacker's post)
81 Related work Intrusion recovery with selective re-execution: Retro [OSDI'10], Warp [SOSP'11] Use them as building blocks for asynchronous repair Intrusion recovery in distributed systems: Heat-ray [SOSP'09], Polygraph [EuroSys'09], Dare [APsys'12] Automatic recovery in loosely coupled web services
82 Summary Aire recovers integrity of distributed web services Define a repair protocol Support asynchronous and decentralized repair Propose partial repair consistency
SmartConnect User Credentials 2012
User Credentials Used When The SmartConnect client connects to Microsoft Dynamics GP When connecting to the Microsoft Dynamics GP the credentials of the current AD user are used to connect to Dynamics
IT Exam Training online / Bootcamp
DumpCollection IT Exam Training online / Bootcamp http://www.dumpcollection.com PDF and Testing Engine, study and practice Exam : 70-534 Title : Architecting Microsoft Azure Solutions Vendor : Microsoft
DocuSign Connect for Salesforce Guide
Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign
Installation and Administration Guide
Installation and Administration Guide Release 8 This installation guide will walk you through how to install and deploy Conga Composer, including recommended settings for the application. Contact Support:
Optimizing unit test execution in large software programs using dependency analysis
Optimizing unit test execution in large software programs using dependency analysis Taesoo Kim, Ramesh Chandra, and Nickolai Zeldovich MIT CSAIL Abstract TAO is a system that optimizes the execution of
Social Application Guide
Social Application Guide Version 2.2.0 Mar 2015 This document is intent to use for our following Magento Extensions Or any other cases it might help. Copyright 2015 LitExtension.com. All Rights Reserved
Microsoft Dynamics CRM 2011 Performance Counters
Microsoft Dynamics CRM 2011 Performance Counters Microsoft Corporation Published August 2011 Abstract Windows Server 2008 R2 includes a tool named Windows Performance Monitor. You can configure Windows
Build Your Mobile Strategy Not Just Your Mobile Apps
Mobile Cloud Service Build Your Mobile Strategy Not Just Your Mobile Apps Copyright 2015 Oracle Corporation. All Rights Reserved. What is is it? Oracle Mobile Cloud Service provides everything you need
Active Directory Integration WHITEPAPER
Active Directory Integration WHITEPAPER Even as enterprises continue to adopt more cloud applications, Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) still play a critical role
Module - Facebook PS Connect
Module - Facebook PS Connect Operation Date : October 10 th, 2013 Business Tech Installation & Customization Service If you need assistance, we can provide you a full installation and customization service
Jive Case Escalation for Salesforce
Jive Case Escalation for Salesforce TOC 2 Contents System Requirements... 3 Understanding Jive Case Escalation for Salesforce... 4 Setting Up Jive Case Escalation for Salesforce...5 Installing the Program...
Pre-Installation Guide
Pre-Installation Guide Version 8.2 December 11, 2015 For the most recent version of this document, visit our documentation website. Table of Contents 1 Pre-installation overview 4 2 Windows updates 4 3
Cloud to Cloud Integrations with Force.com. Sandeep Bhanot Developer Evangelist @cloudysan
Cloud to Cloud Integrations with Force.com Sandeep Bhanot Developer Evangelist @cloudysan Safe Harbor Salesforce.com Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This
Automation Engine 14.1. AE Server management
14.1 AE Server management 06-2015 Contents 1. The Server Web Page... 3 2. Status Overview...4 2.1 FAQs on Restarting and Reactivating the Server...5 3. Server Activity... 6 4. Server Setup... 7 4.1 Server
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Lync SHIELD Product Suite
Lync SHIELD Product Suite The Natural Solution For Securing Lync Connectivity For today s mobile enterprise, the need to connect smartphones to the corporate network has become a vital business requirement.
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
Device LinkUP + Desktop LP Guide RDP
Device LinkUP + Desktop LP Guide RDP Version 2.1 January 2016 Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Configuration Guide - OneDesk to SalesForce Connector
Configuration Guide - OneDesk to SalesForce Connector Introduction The OneDesk to SalesForce Connector allows users to capture customer feedback and issues in OneDesk without leaving their familiar SalesForce
Administration Authentication for InGenius Connector Enterprise
Administration Authentication for InGenius Connector Enterprise Version 2.23.301 Contact: [email protected] +1-613-591-9002 x3000 TRADEMARKS InGenius, InGenius Connector Enterprise and the InGenius logo
Use of Commercial Backup Software with Juris (Juris 2.x w/msde)
Use of Commercial Backup Software with Juris (Juris 2.x w/msde) Juris databases hosted on a Microsoft SQL Server 2000 Desktop Engine (MSDE) instance can be backed up manually through the Juris Management
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
EPiServer Operator's Guide
EPiServer Operator's Guide Abstract This document is mainly intended for administrators and developers that operate EPiServer or want to learn more about EPiServer's operating environment. The document
Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
Dr.Backup Release Notes - Version 11.2.4
Dr.Backup Release Notes - Version 11.2.4 This version introduces several new capabilities into the Dr.Backup remote backup client software (rbclient). The notes below provide the details about the new
Application Note 02 Advanced SMTP setup
Application Note 02 Advanced SMTP setup A regular SMTP setup may not work if the SMTP server cannot be directly addressed. The following two methods provide an alternative, when the SMTP server cannot
Server Deployment and Configuration. Qlik Sense 1.1 Copyright 1993-2015 QlikTech International AB. All rights reserved.
Server Deployment and Configuration Qlik Sense 1.1 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech,
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for
OAuth. Network Security. Online Services and Private Data. A real-life example. Material and Credits. OAuth. OAuth
Network Security Dr. Ing. Simone Cirani Parma, May 28th, 2013 Online Services and Private Data The evolution of online services, such as social networks, has had a huge impact on the amount of data and
Administration Guide NetIQ Privileged Account Manager 3.0.1
Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager
Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager Introduction The past several years has seen an increase in the amount of attention paid to security management
Dynamics CRM 2011 Outlook Configuration Guide With Windows XP
Dynamics CRM 2011 Outlook Configuration Guide With Windows XP With migrating to a new version of CRM, one of the side-affects is that the Outlook Integration Client has also been updated and needs to be
Using Avaya Aura Messaging Web Access
Using Avaya Aura Messaging Web Access Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting started... 5 Avaya Aura Messaging Web Access... 5 Requirements... 5 Logging in to Messaging Web Access...
Google Cloud Print Administrator Configuration Guide
Google Cloud Print Administrator Configuration Guide 1 December, 2014 Advanced Customer Technologies Ricoh AMERICAS Holdings, Inc. Table of Contents Scope and Purpose... 4 Overview... 4 System Requirements...
Efficient database auditing
Topicus Fincare Efficient database auditing And entity reversion Dennis Windhouwer Supervised by: Pim van den Broek, Jasper Laagland and Johan te Winkel 9 April 2014 SUMMARY Topicus wants their current
MarkLogic Server. Database Replication Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.
Database Replication Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Database Replication
Active Directory Integration 855.426.7227. www.onelogin.com twitter.com/onelogin ONELOGIN WHITEPAPER
Active Directory Integration Even as enterprises continue to adopt more cloud applications, Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) still play a critical role in how information
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
Getting to Know the SQL Server Management Studio
HOUR 3 Getting to Know the SQL Server Management Studio The Microsoft SQL Server Management Studio Express is the new interface that Microsoft has provided for management of your SQL Server database. It
Audit Trails in the Aeolus Distributed Security Platform. Victoria Popic
Audit Trails in the Aeolus Distributed Security Platform by Victoria Popic B.S., C.S. and Math MIT (2009) Submitted to the Department of Electrical Engineering and Computer Science in Partial Fulfillment
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Adobe EchoSign API Guide
Adobe EchoSign API Guide Version 4.2 Last Updated: November 2014 Table of Contents Overview... 3 Getting Started... 3 Working with the Adobe EchoSign APIs... 3 Scenario 1: Sending & tracking from an application
Cloud Services. Email Migration. Cloud Migration Portal Admin Guide
Cloud Services Email Migration Cloud Migration Portal Admin Guide 10/19/2014 CONTENTS Account Activation and Data Migration Cloud Migration Portal... 2 Purchase Cloud Migration License... 2 Create User
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
Frequently Asked Questions
Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange
Transactionality and Fault Handling in WebSphere Process Server Web Service Invocations. version 0.5 - Feb 2011
Transactionality and Fault Handling in WebSphere Process Server Web Service Invocations version 0.5 - Feb 2011 IBM Corporation, 2011 This edition applies to Version 6.2 of WebSphere Process Server 1 /
Using Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods:
Executive Summary This document provides certain best practices with regards to the Emergency Restore feature in vsphere Data Protection 5.5 release. It also describes the methods and processes to be used
How cloud computing can transform your business landscape.
How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about
BlackBerry Business Cloud Services. Administration Guide
BlackBerry Business Cloud Services Administration Guide Published: 2012-07-25 SWD-20120725193410416 Contents 1 About BlackBerry Business Cloud Services... 8 BlackBerry Business Cloud Services feature overview...
OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010
OpenID Single Sign On and OAuth Data Access for Google Apps Ryan Boyd @ryguyrg Dave Primmer May 2010 Why? View live notes and questions about this session on Google Wave: http://bit.ly/magicwave Agenda
CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
Shavlik Patch for Microsoft System Center
Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This
CA XOsoft Replication for Windows
CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE
A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE Contents How to Buy Cloud-to-Cloud Backup...................... 4 Wait What is Cloud-to-Cloud Backup?.....................
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become
CUSTOMER Android for Work Quick Start Guide
Mobile Secure Cloud Edition Document Version: 1.0 2016-01-25 CUSTOMER Content 1 Introduction to Android for Work.... 3 2 Prerequisites....4 3 Setting up Android for Work (Afaria)....5 4 Setting up Android
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Protected Trust Directory Sync Guide
Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory
This article Includes:
Log shipping has been a mechanism for maintaining a warm standby server for years. Though SQL Server supported log shipping with SQL Server 2000 as a part of DB Maintenance Plan, it has become a built-in
Active Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
www.97whitelabelwebsites.co.uk Our White label Service 02920 508728 [email protected]
www.97whitelabelwebsites.co.uk Our 1 White label Service 2 www.97whitelabelwebsites.co.uk Introducing Our White Label Service Introduction Are you a business that would like to gain a new residual income
InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
Installation instructions for MERLIN Dashboard
Installation instructions for MERLIN Dashboard Contents Installation Prerequisites:... 2 Procedure to manually backup and restore Views and Settings in AxOEE Manager... 3 For XP users go to:... 3 For Vista
Qlik REST Connector Installation and User Guide
Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All
Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.
Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved
Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a
SEER Enterprise Shared Database Administrator s Guide
SEER Enterprise Shared Database Administrator s Guide SEER for Software Release 8.2 SEER for IT Release 2.2 SEER for Hardware Release 7.3 March 2016 Galorath Incorporated Proprietary 1. INTRODUCTION...
Distributed File Systems
Distributed File Systems Mauro Fruet University of Trento - Italy 2011/12/19 Mauro Fruet (UniTN) Distributed File Systems 2011/12/19 1 / 39 Outline 1 Distributed File Systems 2 The Google File System (GFS)
Configuring Integration Between Multichannel and Salesforce.com
Configuring Integration Between Multichannel and Salesforce.com Copyright 2013-2014 LiveOps Inc. All rights reserved. LiveOps, LiveOps Applications, LiveOps Authoring, LiveOps Insight, LiveOps Social and
One step login. Solutions:
Many Lotus customers use Lotus messaging and/or applications on Windows and manage Microsoft server/client environment via Microsoft Active Directory. There are two important business requirements in this
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
NetIQ Advanced Authentication Framework
NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP
Anchor End-User Guide
Table of Contents How to Access Your Account How to Upload Files How to Download the Desktop Sync Folder Sync Folder How to Share a File 3 rd Party Share from Web UI 3 rd Party Share from Sync Folder Team-Share
WhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Backup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
MYOB EXO BUSINESS WHITE PAPER
MYOB EXO BUSINESS WHITE PAPER Social Media in MYOB EXO Business EXO BUSINESS MYOB ENTERPRISE SOLUTIONS Contents Introduction... 3 How Social Media Integration Works... 3 The Authentication Process... 3
and forms from multiple folders simultaneously to send out for e signing as the system will automatically create a Queue as you select documents.
This guide was prepared to show our members how to submit saved forms (and/or uploaded documents) out for e signature using our built in integration with Settleware s secure e signing services. Once you
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC
Undergraduate Academic Affairs \ Student Affairs IT Services VPN and Remote Desktop Access from a Windows 7 PC Last edited: 4 December 2015 Contents Inform IT Staff... 1 Things to Note... 1 Setting Up
YubiKey Authentication Module Design Guideline
YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company
Backing Up, Restoring, & Transferring PCLaw Data
Contents Closing All Applications Creating PCLaw Backups Transferring Data to Another Location Restoring Data Transferring Data from Another Location PCLaw Data Export Modules About Backing Up, Restoring,
Using MailStore to Archive MDaemon Email
Using MailStore to Archive MDaemon Email This guide details how to archive all inbound and outbound email using MailStore, as well as archiving any emails currently found in the users accounts in MDaemon.
Microsoft Corporation. Project Server 2010 Installation Guide
Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups
Polycom CMA System Upgrade Guide
Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or
Setting up your new Live Server Account
Setting up your new Live Server Account Welcome to Remote Data Backups LiveVault Service. This document will help you set up the agent service on your server as well as giving you some guidance on accessing
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House
Lenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
