Using XACML Policies to Express OAuth Scope. Hal Lockhart Oracle June 27, 2013
|
|
|
- Calvin Fisher
- 10 years ago
- Views:
Transcription
1 Using XACML Policies to Express OAuth Scope Hal Lockhart Oracle June 27, 2013
2 Topics Scope Background Requirements Design AlternaKves XACML Overview Proposed Approach Benefits Next Steps Future Research
3 Scope Background Issued as a result of Access Grant Intended to represent what is allowed by this Token (not actually defined by RFC 6749) Can be Handle or Self- contained Handle is reference to data held by AS Self- contained can be interpreted by RS I disknguish between Requested Scope and Issued Scope
4 Standardized Scope Requirements Self- contained by definikon Agreed syntax and semankcs Cover any domain Compute Scope given idenkty of Resource Owner & Client, plus requested Scope (at most) Determine if Scope allows requested access using info available to RS (not owner a^ributes)
5 Current Design Approaches Handle - reference to info held by AS Tight coupling between AS & RS AS could become performance bo^leneck AS required to manage info for token lifekme Role small set of privilege alternakves RS (or AS) knows what they mean (good or bad) Inflexible Role explosion & confusion
6 XACML Overview Access Control Policy language Well defined semankcs Original syntax XML JSON in progress Decision Request Input: A^ributes - Name, Value, Category Categories idenkfy the enkkes associated with request, e.g. Subject, Resource, AcKon, Environment, etc. Set of A^ributes values called a SituaKon Output: Effect (Permit, Deny) ObligaKons, Advice
7 Policy EvaluaKon Oversimplified 1 Policies contain operakons on a^ribute values which produce True or False If False, policy is not applicable If True, Effect (Permit or Deny) is noted (Along with ObligaKons and Advice) If mulkple applicable policies have different effects, a combining rule is used E.g. Default Deny
8 Policy EvaluaKon Oversimplified 2 Policies form a tree Nodes are Policy Sets, leaves are Policies Once a branch is found not applicable, its children are not evaluated Policy Sets can contain Policies or Policy References Different policy combinakons will be applicable to different SituaKons
9 Policy Tree
10 Applicable Policies - SituaKon 1
11 Applicable Policies - SituaKon 2
12 Using XACML for Scope Scope must be able to limit Resources, ackons, Kmes, dates, locakons, etc. Cover mulkple situakons Non- unique a^ributes (Public, confidenkal, Tuesday) Wildcards (regular expressions) Boolean operators (A or B or C) Could invent a new language XACML already does this
13 Deciding What Policies Include all policies relevant to RS Write program to construct polices as needed I don t know how to do this Small number of preset access pa^erns Policies associated with each Like Roles, except actual rights are expressed Use XACML PDP to select
14 Using XACML PDP Requested Scope can contain XACML decision request IdenKfy typical or most strongly protected SituaKon Or custom tweak request to parkcular policies Submit request to PDP 3.0 feature idenkfy applicable policies Obtain policies by ID (could be cached)
15 Decapitated Policies Request contains Subject A^ributes of Resource Owner Applicable policies most likely will reference Need to plug Subject A^ribute values into policies as constants OpKonally opkmize out null operakons Eliminate dangling policy references presumably from non- applicable policies
16 Decapitated Policy Example 1 Initial Policy If Subject Attribute Group equals user and Resource Attribute Class equals private permit access. Decapitated Policy If user equals user and Resource Attribute Class equals private permit access. Optimized Policy If Resource Attribute Class equals private permit access.
17 Decapitated Policy Example 1 Initial Policy If Subject Attribute Group equals user and Resource Attribute Name matches Regex( /user/ +Subject Attribute Username+ /* ) permit access. Decapitated Policy If user equals user and Resource Attribute Name matches Regex( /user/ + hal + /* ) permit access. Optimized Policy If user equals user and Resource Attribute Name matches Regex( /user/ + hal + /* ) permit access. or If Resource Attribute Name matches Regex( /user/hal/* ) permit access.
18 Benefits General, flexible, domain independent Means to select policies based on Client request Common expression of OAuth and non- OAuth access control policies Enables XACML delegakon for full generality Major revisions of access model only require policy changes
19 Next Steps Increase priority of XACML JSON policies Need policy retrieval API standard Detailed specificakon of decapitakon algorithm Support for just in Kme policies w/o delegakon profile
20 Future Research RelaKonship to ObligaKons & Advice RelaKonship to other Subject Categories Use of XACML Admin/DelegaKon Profile with this scheme Use of access- permi^ed funckon with OAuth Deeper understanding of relakonship between various access control models
21 TheoreKcal ConsideraKons 1 Use of non- unique a^ribute values groups enkkes into sub- groups and enables scaling Policies are wri^en in the most natural form If X, allow access Each policy applies to many situakons Also enables scaling As a consequence, policies only work one way Determine if access allowed, can t enumerate what is allowed
22 TheoreKcal ConsideraKons 2 Not only can t go backward, can t go sideways Can t compare two policies, only say if they are both applicable to a given situakon Proposal is a way to sidestep problem and go from specific (request) to general (policies) OAuth can be looked at as a two stage policy evaluakon 1. Subject a^ributes for token issuance (once) 2. Remaining a^ributes for access (many Kmes)
23 RelaKonship to UMA Work Proposal can co- exist with anonymous Subject A^ribute and Role- based scheme Other ideas?
Using XACML Policies as OAuth Scope
Using XACML Policies as OAuth Scope Hal Lockhart Oracle I have been exploring the possibility of expressing the Scope of an OAuth Access Token by using XACML policies. In this document I will first describe
IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE
White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access
Your Mission: Use F-Response Cloud Connector to access Google Apps for Business Drive Cloud Storage
Your Mission: Use F-Response Cloud Connector to access Google Apps for Business Drive Cloud Storage Note: This guide assumes you have installed F-Response Consultant, Consultant + Covert, or Enterprise,
Securing JAX-RS RESTful services. Miroslav Fuksa (software developer) Michal Gajdoš (software developer)
Securing JAX-RS RESTful services Miroslav Fuksa (software developer) Michal Gajdoš (software developer) The following is intended to outline our general product direction. It is intended for information
Service for checking whether an email is operative or not. Validate email ids in your databases.
MailStatus API Service for checking whether an email is operative or not. Validate email ids in your databases. Overview Lleida.net MailStatus API allows you to consult the validity of an email address.
Riverbed Cascade Shark Common REST API v1.0
Riverbed Cascade Shark Common REST API v1.0 Copyright Riverbed Technology Inc. 2015 Created Feb 1, 2015 at 04:02 PM Contents Contents Overview Data Encoding Resources information: ping information: list
vcloud Air Platform Programmer's Guide
vcloud Air Platform Programmer's Guide vcloud Air OnDemand 5.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
Package pinnacle.api
Package pinnacle.api September 18, 2015 Type Package Version 1.89 Title A Wrapper for the Pinnacle Sports API URL https://github.com/marcoblume/pinnacle.api Author Marco Blume, Nicholas Jhirad, Amine Gassem
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
Configuration Guide - OneDesk to SalesForce Connector
Configuration Guide - OneDesk to SalesForce Connector Introduction The OneDesk to SalesForce Connector allows users to capture customer feedback and issues in OneDesk without leaving their familiar SalesForce
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Forumbee Single Sign- On
Forumbee Single Sign- On What is Single Sign- On? In basic terms, Single Sign- On (SSO) allows users of your web site to log into your Forumbee community automatically, without needing to sign up and create
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs Executive Overview A key technical underpinning of the Cloud is the Application Programming Interface (API). APIs provide consistent
KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon
KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon KMx Enterprise includes two api s for integrating user accounts with an external directory of employee or other
OAuth2 and UMA for ACE draft-maler-ace-oauth-uma-00.txt. Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig
OAuth2 and UMA for ACE draft-maler-ace-oauth-uma-00.txt Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig Agenda 1. Motivation behind draft-maler-ace-oauth-uma-00.txt. 2. Mapping of existing
Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA
Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA Page 1 Introduction The ecommerce Hub provides a uniform API to allow applications to use various endpoints such as Shopify. The following
Contents. 2 Alfresco API Version 1.0
The Alfresco API Contents The Alfresco API... 3 How does an application do work on behalf of a user?... 4 Registering your application... 4 Authorization... 4 Refreshing an access token...7 Alfresco CMIS
SQUEEZE SERVER. Operation Guide Version 3.0
SQUEEZE SERVER Operation Guide Version 3.0 CONTENTS Introduction to Squeeze Server... 1 Features... 2 Squeeze Server Components... 3 How Squeeze Server Works... 4 Running Squeeze Server... 5 Priority Job
OAuth2lib. http://tools.ietf.org/html/ietf-oauth-v2-10 implementation
OAuth2lib http://tools.ietf.org/html/ietf-oauth-v2-10 implementation 15 Julio 2010 OAuth2 - Assertion Profile Library! 3 Documentation! 4 OAuth2 Assertion Flow! 4 OAuth Client! 6 OAuth Client's Architecture:
SmartSantander Open Data access using FI-WARE G.E. [ORION]
SmartSantander Open Data access using FI-WARE G.E. [ORION What to find in this doc FI-WARE is an open cloud-based infrastructure for Future Internet applications and services, composed by different building
SafeGuard Enterprise Management API. Product version: 6 Document date: February 2012
SafeGuard Enterprise Management API Product version: 6 Document date: February 2012 Content 1 SafeGuard Enterprise Management API... 2 2 Detailed API Description... 14 3 Installation/environment... 84
Forumbee Single Sign- On
Forumbee Single Sign- On What is Single Sign- On? In basic terms, Single Sign- On (SSO) allows users of your web site to log into your Forumbee community automatically, without needing to sign up and create
ICT353/532 Advanced Business Analysis & Design
ICT353/532 Advanced Business Analysis & Design Topic 5 (Part 2) Tools and Techniques for Business Process Modelling Ronald K. Shiflet [email protected] Readings and Resources Havey, M. (2005) Essen%al
Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite
Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite Vladislav Mladenov, Tim Guenther, Christian Mainka, Horst-Görtz Institut für IT-Sicherheit, Ruhr-Universität
On XACML, role-based access control, and health grids
On XACML, role-based access control, and health grids 01 On XACML, role-based access control, and health grids D. Power, M. Slaymaker, E. Politou and A. Simpson On XACML, role-based access control, and
OpenID connect @ Deutsche telekom. Dr. Torsten Lodderstedt, Deutsche Telekom AG
OpenID connect @ Deutsche telekom Dr. Torsten Lodderstedt, Deutsche Telekom AG service ecosystem and Telekom Login Dr. Torsten Lodderstedt / OpenID Workshop @ IIW #18 2014-05-05 2 Open Standards: Our History
Cloud Elements! Marketing Hub Provisioning and Usage Guide!
Cloud Elements Marketing Hub Provisioning and Usage Guide API Version 2.0 Page 1 Introduction The Cloud Elements Marketing Hub is the first API that unifies marketing automation across the industry s leading
bbc Developing Service Providers Adobe Flash Media Rights Management Server November 2008 Version 1.5
bbc Developing Service Providers Adobe Flash Media Rights Management Server November 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
Instant YANG. The Basics. Hakan Millroth, Tail- f Systems (email: hakan@tail- f.com)
Instant YANG Hakan Millroth, Tail- f Systems (email: hakan@tail- f.com) This is a short primer on the NETCONF data modeling language YANG. To learn more about YANG, take a look at the tutorials and examples
Federated Identity and Single Sign-On using CA API Gateway
WHITE PAPER DECEMBER 2014 Federated Identity and Single Sign-On using Federation for websites, Web services, APIs and the Cloud K. Scott Morrison VP Engineering and Chief Architect 2 WHITE PAPER: FEDERATED
Oracle Database 10g: Introduction to SQL
Oracle University Contact Us: 1.800.529.0165 Oracle Database 10g: Introduction to SQL Duration: 5 Days What you will learn This course offers students an introduction to Oracle Database 10g database technology.
Talend Component tgoogleanalyticsmanagement
Talend Component tgoogleanalyticsmanagement Purpose This component addresses the needs of gathering Google Analytics data for a large number of profiles and fine-grained detail data. To prepare the queries
5.1 Features 1.877.204.6679. [email protected] Denver CO 80202
1.877.204.6679 www.fourwindsinteractive.com 3012 Huron Street [email protected] Denver CO 80202 5.1 Features Copyright 2014 Four Winds Interactive LLC. All rights reserved. All documentation
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its
Configuring CQ Security
Configuring CQ Security About Me CQ Architect for Inside Solutions http://inside-solutions.ch CQ Blog: http://cqblog.inside-solutions.ch Customer Projects with Adobe CQ Training Material on Adobe CQ Agenda
Authorization-Authentication Using
School of Computing Science, University of Newcastle upon Tyne Authorization-Authentication Using XACML and SAML Jake Wu and Panos Periorellis Technical Report Series CS-TR-907 May 2005 Copyright c 2004
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Mod ule_i D Error _Cod e Error Description 1 1 PROCESSOR_NULLREF_ERROR 1 100 ERROR_PARSE_PAIR Failed
Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/
Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security 0 to full speed No protection system in early versions
Authenticate and authorize API with Apigility. by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team
Authenticate and authorize API with Apigility by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team About me Enrico Zimuel (@ezimuel) Software Engineer since 1996 PHP Engineer at Zend Technologies
Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics
Identity, Privacy, and Data Protection in the Cloud XACML David Brossard Product Manager, Axiomatics 1 What you will learn The issue with authorization in the cloud Quick background on XACML 3 strategies
Integrating XACML into JAX-WS and WSIT
Integrating XACML into JAX-WS and WSIT Prof. Dr. Eric Dubuis Berner Fachhochschule Biel May 25, 2012 Overview Problem and Motivation Enforcing the Access Policy JAX-WS Handler Framework WSIT Validators
Domain Name Auto-Registration for Plugged-in IPv6 Nodes. <draft-kitamura-ipv6-name-auto-reg-00.txt>
Domain Name Auto-Registration for Plugged-in IPv6 Nodes Hiroshi KITAMURA NEC Corporation [email protected] Background IPv6 addresses are too long to remember
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
UFTP AUTHENTICATION SERVICE
UFTP Authentication Service UFTP AUTHENTICATION SERVICE UNICORE Team Document Version: 1.1.0 Component Version: 1.1.1 Date: 17 11 2014 UFTP Authentication Service Contents 1 Installation 1 1.1 Prerequisites....................................
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
Coveo Platform 7.0. Salesforce Connector Guide
Coveo Platform 7.0 Salesforce Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing market
Revolution R Enterprise DeployR 7.1 Enterprise Security Guide. Authentication, Authorization, and Access Controls
Revolution R Enterprise DeployR 7.1 Enterprise Security Guide Authentication, Authorization, and Access Controls The correct bibliographic citation for this manual is as follows: Revolution Analytics,
Autodesk Inventory Advisor Quick Start Guide
Autodesk Inventory Advisor Quick Start Guide 30- Mar- 12 i Contents Overview... 3 Installation... 3 Install AIA... 3 Enter unlock code... 4 Initial configuration... 5 Selecting a scan option... 6 Import
CA Nimsoft Service Desk
CA Nimsoft Service Desk Web Services Guide 7.0.6 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,
HP Project and Portfolio Management Center
HP Project and Portfolio Management Center Software Version: 9.20 RESTful Web Services Guide Document Release Date: February 2013 Software Release Date: February 2013 Legal Notices Warranty The only warranties
SnapLogic Salesforce Snap Reference
SnapLogic Salesforce Snap Reference Document Release: October 2012 SnapLogic, Inc. 71 East Third Avenue San Mateo, California 94401 U.S.A. www.snaplogic.com Copyright Information 2012 SnapLogic, Inc. All
Safewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
Permissions Management for Site Admins
ControlPoint Publication Date: April 29, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software, or
Developer Guide: REST API Applications. SAP Mobile Platform 2.3 SP03
Developer Guide: REST API Applications SAP Mobile Platform 2.3 SP03 DOCUMENT ID: DC01926-01-0233-01 LAST REVISED: September 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains
CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
History of SQL. Relational Database Languages. Tuple relational calculus ALPHA (Codd, 1970s) QUEL (based on ALPHA) Datalog (rule-based, like PROLOG)
Relational Database Languages Tuple relational calculus ALPHA (Codd, 1970s) QUEL (based on ALPHA) Datalog (rule-based, like PROLOG) Domain relational calculus QBE (used in Access) History of SQL Standards:
Terms and Definitions for CMS Administrators, Architects, and Developers
Sitecore CMS 6 Glossary Rev. 081028 Sitecore CMS 6 Glossary Terms and Definitions for CMS Administrators, Architects, and Developers Table of Contents Chapter 1 Introduction... 3 1.1 Glossary... 4 Page
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
Coveo Platform 7.0. Oracle Knowledge Connector Guide
Coveo Platform 7.0 Oracle Knowledge Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing
This document describes the capabilities of NEXT Analytics v5.1 to retrieve data from Google Analytics directly into your spreadsheet file.
NEXT Google Analytics User Guide This document describes the capabilities of NEXT Analytics v5.1 to retrieve data from Google Analytics directly into your spreadsheet file. Table of Contents Adding a Google
About the Authors Fundamentals p. 1 Introduction to LDAP and Active Directory p. 3 A Brief History of Directory Services p. 3 Definition of LDAP p.
Listings p. xv Tables p. xix Foreword p. xxi Preface p. xxiii Acknowledgments p. xxix About the Authors p. xxxi Fundamentals p. 1 Introduction to LDAP and Active Directory p. 3 A Brief History of Directory
Mobile Solutions for Data Collection. Sarah Croft and Laura Pierik
Mobile Solutions for Data Collection Sarah Croft and Laura Pierik Presentation Overview Project Overview Benefits of using Mobile Technology Mobile Solutions- two different approaches Results and Recommendations
Introduc)on to STORK2.0 project
Introduc)on to STORK2.0 project AAI Workshop Brussels, April 2014 EUROPEAN EID CONTEXT FOR EGOVERNMENT NaKonal online services today with eid CENTRAL GOVERNMENT ONLINE SERVICES LOCAL GOVERNMENT ONLINE
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 30, 2005 Product Information Partner Name Juniper Networks Web Site www.juniper.net Product Name NetScreen SA Version
DPH TOKEN SELF SERVICE SITE INSTRUCTIONS:
DPH TOKEN SELF SERVICE SITE INSTRUCTIONS: The purpose of this document is to provide users with assistance on resolving connection issues with Department of Public Health (DPH) Entrust tokens. These instructions
McAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Salesforce Files Connect Implementation Guide
Salesforce Files Connect Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered
REST Webservices API Reference Manual
crm-now/ps REST Webservices API Reference Manual Version 1.5.1.0 crm-now development documents Page 1 Table Of Contents OVERVIEW...4 URL FORMAT...4 THE RESPONSE FORMAT...4 VtigerObject...5 Id Format...5
cielo24 Documentation
cielo24 Documentation Release 1.4.10 cielo24 November 19, 2015 1 The Basics 3 1.1 Getting Started.............................................. 3 1.2 Sandbox API...............................................
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
A Model for Access Control Management in Distributed Networks
A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,
McAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM
IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product
A Brief Introduction to MySQL
A Brief Introduction to MySQL by Derek Schuurman Introduction to Databases A database is a structured collection of logically related data. One common type of database is the relational database, a term
ADO and SQL Server Security
ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services
Oracle Marketing Encyclopedia System
Oracle Marketing Encyclopedia System Concepts and Procedures Release 11i April 2000 Part No. A83637-01 Understanding Oracle Marketing Encyclopedia This topic group provides overviews of the application
Package WikipediR. January 13, 2016
Type Package Title A MediaWiki API Wrapper Version 1.3.0 Date 2016-01-12 Author Oliver Keyes Package WikipediR January 13, 2016 Maintainer Oliver Keyes A wrapper for the MediaWiki
CLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
Keeping access control while moving to the cloud. Presented by Zdenek Nejedly Computing & Communications Services University of Guelph
Keeping access control while moving to the cloud Presented by Zdenek Nejedly Computing & Communications Services University of Guelph 1 Keeping access control while moving to the cloud Presented by Zdenek
SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide
SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24 Data Federation Administration Tool Guide Content 1 What's new in the.... 5 2 Introduction to administration
OpenSocial Network Programming
OpenSocial Network Programming Lynne Grewe WILEY Wiley Publishing, Inc. Introduction xvii Chapter 1: Social Network Programming 1 Social Network Platforms 2 MySpace 2 hi5 5 orkut 7 Friendster 8 imeem 9
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
Wind River. Intelligent Device Platform XT EMS Profile EMS DEVICE MANAGEMENT USER'S GUIDE WIND RIVER 1.0
Wind River Intelligent Device Platform XT EMS Profile WIND RIVER EMS DEVICE MANAGEMENT USER'S GUIDE 1.0 Copyright Notice Copyright 2014 Wind River Systems, Inc. All rights reserved. No part of this publication
Drupal Survey. Software Requirements Specification 1.0 29/10/2009. Chris Pryor Principal Project Manager
Software Requirements Specification 1.0 29/10/2009 Chris Pryor Principal Project Manager Software Requirements Specification Survey Module Revision History Date Description Author Comments 5/11/2009 Version
NewsletterAdmin 2.4 Setup Manual
NewsletterAdmin 2.4 Setup Manual Updated: 7/22/2011 Contact: [email protected] Contents Overview... 2 What's New in NewsletterAdmin 2.4... 2 Before You Begin... 2 Testing and Production...
Portal Factory 1.0 - CMIS Connector Module documentation
DOCUMENTATION Portal Factory 1.0 - CMIS Connector Module documentation Rooted in Open Source CMS, Jahia s Digital Industrialization paradigm is about streamlining Enterprise digital projects across channels
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative
OAISYS Administration Guide
OAISYS Administration Guide VERSION 7.0 05/24/2011 Americas Headquarters OAISYS 7965 S. Priest Drive, Suite 105 Tempe, AZ 85284 USA www.oaisys.com (480) 496-9040 TABLE OF CONTENTS CONTENTS Introduction...
The Future of Cloud Identity Security. Michael Schwartz Founder / CEO Gluu
The Future of Cloud Identity Security Michael Schwartz Founder / CEO Gluu Session ID: IAM-207 Session Classification: General Interest Background 2 Finally an Internet Identity Foundation 3 Who is behind
