Matching Service Adapter
|
|
|
- Dylan Parrish
- 9 years ago
- Views:
Transcription
1 What is the Matching Service Adapter? Matching Service Adapter What does the Matching Service Adapter do? Table of contents Benefits of using the Matching Service Adapter Disadvantages of using the Matching Service Adapter Prerequisites How to request the Matching Service Adapter How to install the Matching Service Adapter How to configure the Matching Service Adapter How to configure the Matching Service Adapter for the production and integration environments How to configure the Matching Service Adapter to use with the compliance tool How to obtain certificates for the Matching Service Adapter How to supply Matching Service Adapter metadata Starting the Matching Service Adapter Testing the Matching Service Adapter using the compliance tool Expected matching request Examples Example of matching request for normal cycle matching Example of response from matching service Matching dataset fields: firstname, middlenames, surnames, dateofbirth Matching dataset fields: address Matching dataset fields: cycle3dataset Example of request from hub to Matching Service Adapter (SAML SOAP format) Creating user accounts Monitoring Logging Document history
2 What is the Matching Service Adapter? The Matching Service Adapter is a software tool supplied free of charge by the GOV.UK Verify team. It simplifies communication between your matching service and the GOV.UK Verify hub service. The hub uses SAML (Security Assertion Markup Language) as its communication method, while government services typically use JSON (JavaScript Object Notation) for their matching services, so a SAML interface is required. Implementing a SAML interface is difficult and expensive, so using the Matching Service Adapter saves government services time and money. Essentially the Matching Service Adapter converts SAML into JSON and vice versa. What does the Matching Service Adapter do? The Matching Service Adapter performs encryption, decryption and signing of SAML messages, and provides simple JSON communication between the Matching Service Adapter and your matching service. The Matching Service Adapter accepts the following: SAML attribute query with a matching dataset (as described in the Identity Assurance Hub Service SAML 2.0 Profile ). The Matching Service Adapter forwards this query as a JSON matching request to your matching service for normal cycle matching this query can also optionally make an unknown user request to the matching service to assist in user account creation when a match is not found (see Creating user accounts for more information) Benefits of using the Matching Service Adapter You can concentrate on the business logic and matching rules for your matching service You don't have to build your own SAML interface Your technical integration team doesn't have to spend time understanding SAML, conforming to the SAML specifications and to the hub service interface specifications Page 2 of 20
3 Disadvantages of using the Matching Service Adapter You already have an application that provides a SAML interface and the Matching Service Adapter might duplicate or adversely affect this. In this case, please contact the GOV.UK Verify team to discuss your options Prerequisites Java 1.8 (Java runtime environment) For the integration environment only, the hub must allow access to the IP address where the Matching Service Adapter is hosted to allow dynamic fetching of hub metadata How to request the Matching Service Adapter Once you've completed Stage 3: Planning, you request access to the secure site from which you can download the Matching Service Adapter by ing [email protected] office.gov.uk. How to install the Matching Service Adapter 1. When you re given access by the GOV.UK Verify team, download the Matching Service Adapter from the secure site. 2. Install the Matching Service Adapter jar ( java archive ) file on a target system that complies with the prerequisites listed in Prerequisites. 3. To extract the relevant files and move the truststore to the environment in which you want to use the Matching Service Adapter, execute the following commands, supplying values for the text in square brackets: tar xf Matching Service Adapter build xxx ( year month day ).tar.gz tar xf ida msa xxx.zip mv prod_ida_truststore.ts [path to trust store dir] mv test_ida_truststore.ts [path to trust store dir] In the above commands: xxx represents the build number (year month day) represents the build date, in the format yyyy mm dd Page 3 of 20
4 [ path to trust store dir] is the URI (Uniform Resource Identifier) where you decide to locate the truststore. This can be anywhere you choose. You specify the truststore location when configuring the Matching Service Adapter (under the configuration option storeuri: ). to use the Matching Service Adapter in the production environment, execute: mv prod_ida_truststore.ts to use the Matching Service Adapter with the compliance tool or in the integration environment, execute: mv test_ida_truststore.ts How to configure the Matching Service Adapter When you start the Matching Service Adapter, you must pass a YAML configuration file ( configuration.yml ) as input. YAML is a human friendly data serialisation standard supported by most programming languages. An example of a YAML configuration file is shown below, followed by an explanation of the configuration. Supply values for the text in square brackets: server: applicationconnectors: type: http port: [application port] adminconnectors: type: http port: [admin port] assertionlifetime: 5m matchingserviceuri: [Matching Service URI] matchingserviceadapterlocation: [Matching Service Adapter Location URI] unknownusercreationserviceuri: [Unknown User Creation Location URI this property is optional] saml: entityid: [matching service adapter entity id] Page 4 of 20
5 httpclient: timeout: 2s timetolive: 10m cookiesenabled: false connectiontimeout: 1s metadatauri: env].signin.service.gov.uk/saml2/metadata/sp # location to fetch hub metadata from acceptselfsignedcerts: true serviceinfo: name: matching service adapter # If you would like the Matching Service Adapter to report to a graphite instance. metrics: frequency: 30s reporters: type: graphite host: [graphite host] port: [graphite port] prefix: [some prefix of your choosing] privatesigningkeyconfiguration: keyuri: /[path to private key].pk8 privateencryptionkeyconfiguration: keyuri: /[path to private key].pk8 publicsigningkeyconfiguration: keyuri: /[path to pub key].crt keyname: [key name] publicencryptionkeyconfiguration: keyuri: /[path to pub key].crt Page 5 of 20
6 keyname: [key name] returnstacktraceinresponse: true clienttruststoreconfiguration: storeuri: /[path to trust store dir]/[prod test]_ida_truststore.ts password: puppet featureflagconfiguration: iscertificatechainvalidationrequired: true logging: level: INFO appenders: type: file currentlogfilename: apps home/test rp msa.log archivedlogfilenamepattern: apps home/test rp msa.log.%d.gz logformat: '% 5p [%diso8601,utc}] %c: %XlogPrefix}%m%n%xEx' archivedfilecount: 7 type: console Page 6 of 20
7 How to configure the Matching Service Adapter for the production and integration environments The above example file configures the Matching Service Adapter to run in both the production and integration environments. Configuring the Matching Service Adapter for the compliance tool is slightly different, as described in How to configure the Matching Service Adapter for the compliance tool. Supply values as described below: 1. enter port numbers for the server application and admin ports 2. do not change the assertionlifetime default timeout. This is the time period allowed for matching a user, starting from the time the matching request query is sent by the hub 3. enter the URIs for your matching service and Matching Service Adapter in matchingserviceuri: and matchingserviceadapterlocation : respectively 4. if you're creating new user accounts when a match is not found (optional), enter this URI in unknownusercreationserviceuri : (see Creating user accounts ) 5. in saml:[matching service adapter entity id], enter the entity id for the Matching Service Adapter in URI format. You create your own URI, possibly to reflect the name of your service, for example: service name >/MSA It's good practice to use the same URI as for the Matching Service Adapter itself, but this isn't mandatory 6. define the httpclient timeout, time to live and connection timeout, for example 2s ( s = seconds, m = minutes). Specify whether cookies are to be enabled ( false or true ) 7. i n metadatauri:, specify the location from which the hub is to fetch your metadata, substituting the name of your environment for [ your env ] in the following URI: your env ].signin.service.gov.uk/saml2/metadata/sp metadatauri: is different for each environment (production and integration) 8. ensure that acceptselfsignedcerts: is set to true Page 7 of 20
8 9. if you want to use Graphite monitoring software to monitor the Matching Service Adapter s performance (optional), supply the required metrics: frequency, type, host, port and prefix of the reporter 10. enter paths to the location of the public and private key for the following certificates, required to access the production and integration environments: privatesigningkeyconfiguration: privateencryptionkeyconfiguration: publicsigningkeyconfiguration: publicencryptionkeyconfiguration: See How to obtain certificates for the Matching Service Adapter for more details 11. ensure that returnstacktraceinresponse: is set to true 12. in storeuri, enter your truststore URI and specify whether this is for the production or integration environment (called test here). The password is puppet 13.leave the default values for f eatureflagconfiguration unchanged 14.define the logging level (eg INFO ) 15. in appenders: type:, define where you want the logging information to be sent (eg file, console ). You can specify multiple types if required. if you choose file logging (as shown in the above example configuration file), supply a filename for the current log file and, if you choose to archive old events in separate files, supply a filename pattern for the archived log file in archivedlogfilenamepattern When the current log file rotates, the archived log takes its name; %d is replaced with the previous day s date (in yyyy MM dd format) and the file is gzipped (. gz file extension) in logformat:, define the format in which log events display, for example date, time. logprefix adds context to the logging output in archivedfilecount, enter the number of archived files that you want to keep (must be between 1 and 50) More information on configuration is available at Dropwizard Configuration Reference. Page 8 of 20
9 How to configure the Matching Service Adapter for the compliance tool Follow the steps listed in How to configure the Matching Service Adapter for the production and integration environments ; however, you need to configure certain aspects of the Matching Service Adapter differently for use with the compliance tool, as follows: port numbers the Matching Service Adapter must listen on port 80 (for http) or port 443 (for https) as the compliance tool only allows outbound connections on these ports whitelist IP address whitelist the compliance tool s IP (Internet Protocol) address, as the compliance tool makes a direct SOAP (Simple Object Access Protocol) request to your Matching Service Adapter server. Whitelisting an IP address means that you add it to a list of trusted IP addresses that are allowed access to your network. You re given the compliance tool s IP address ( compliance tool.ipaddress ) by your GOV.UK Verify engagement lead when you are given access to the compliance tool metadata ensure the Matching Service Adapter s metadatauri points to the URL (Universal Resource Locator): compliance tool.metadatauri You re given this URL by your GOV.UK Verify engagement lead when you are given access to the compliance tool How to obtain certificates for the Matching Service Adapter As part of the process for accessing the integration environment to carry out end to end testing of your service, you need to obtain certificates and request access (see steps 5 and 6 in Stage 4 of the GOV.UK Verify Onboarding Guide). This includes obtaining and supplying signed certificates for both your service and for the Matching Service Adapter. You must also obtain these certificates before you can access the production environment. You need the following certificates for the Matching Service Adapter: matching service signature validation certificate. This must be a valid X509 certificate in pk8 PEM format signed by the GDS Test Certificate Authority or the GDS Production Certificate Authority (as appropriate), for example: Page 9 of 20
10 cat server.crt server.key > server.pem openssl pkcs8 nocrypt in server.pem out server.pk8.pem outform PEM topk8 This certificate is used to validate the digital signature present on all responses sent from the Matching Service Adapter and should correspond to the private key configured for use by the Matching Service Adapter. You can retrieve this (and other details) from your Matching Service Adapter by accessing /matching service/saml2/metadata matching service encryption certificate. This must be a valid X509 certificate signed by the GDS Test Certificate Authority or the GDS Production Certificate Authority (as appropriate), and is used to encrypt the assertions in a request sent from the hub to your Matching Service Adapter. It s decrypted by the private key configured in your Matching Service Adapter. You can retrieve this (and other details) from your Matching Service Adapter by accessing /matching service/saml2/metadata Note: Metadata responses only return the public parts of the signing / encryption certificate; the private key is never returned Follow the procedure described in steps 5 and 6 of Stage 4 of the GOV.UK Verify Onboarding Guide to obtain and supply these certificates. How to supply Matching Service Adapter metadata The Matching Service Adapter has its own metadata that needs to be sent to the GOV.UK Verify support team. To make this easier, we ve provided a metadata endpoint on the Matching Service Adapter itself to generate the metadata based on how you ve configured the Matching Service Adapter. To create the relevant metadata file, access /matching service/saml2/metadata on the Matching Service Adapter after you ve configured it. Starting the Matching Service Adapter To start using the Matching Service Adapter, execute the following command, supplying the path to your configuration file: java jar matching service adapter.jar server [path to configuration file].yml Page 10 of 20
11 Testing the Matching Service Adapter using the compliance tool Note: For a better experience, we strongly recommend that you use a JSONview plugin for your browser POST the following JSON (via Advanced Rest Client, curl or similar) to the URL compliance tool.msposturi: You are given this URI by your GOV.UK Verify engagement lead when you are given access to the compliance tool Content Type: application/json "matchingserviceentityid": "[entity of the matching service]", "transactionentityid": "[entity id of the transaction (service)]", "matchingserviceendpoint": "[the matching service's endpoint]", "matchingservicepublicsigningcert": "[Public cert to verify the response]", "matchingservicepublicencryptioncert": "[Public cert to encrypt the assertions]" } You receive a response similar to the following: Status 201 Created Location:.../ms test run/8fd7782f efac 48b e4da9553d19 POST the expected matching dataset request (as shown below) to the Location field in the above response (.../ms test run/8fd7782f efac 48b e4da9553d19 in the above example), selecting a value from those in square brackets. For example, if the available values are [true false], select the appropriate value. Expected matching request "persistentid":"[expected unhashed pid]" # required! "firstname": "value": "joe", "verified": "[true false]", Page 11 of 20
12 "from": " ", "to": " " }, "middlenames": "value": "Bob Rob", "verified": "[true false]", "from": " ", "to": " " }, "surnames": [ "value":"dou", "verified":"[true false]", "from":" ", "to":" " }], "gender": "value": "[NOT_SPECIFIED MALE FEMALE]", "verified":"[true false]", "from":" ", "to":" " }, "dateofbirth": "value": " ", "verified":"[true false]", "from":" ", "to":" " }, "addresses": + [ "lines": ["foo st."], "postcode": "GB1 2PP", "internationalpostcode": "123 GAB", Page 12 of 20
13 "uprn": "abc", "verified": "[true false]", "from": " ", "to": " " }], "levelofassurance":"level_1", "cycle3dataset": "key":"drivers_licence", "value":"123abc" } } In the above expected matching dataset request: the value of addresses (address history) and surnames is an array PersistentId is mandatory you must supply at least one other value (in addition to PersistentId ) Examples To help your understanding, we've provided examples of the following: normal cycle matching request (JSON format) with supplied values response (JSON format) from the Matching Service Adapter to your matching service, followed by an explanation of the matching dataset fields request the hub sends to the Matching Service Adapter (SAML SOAP format) Example of matching request for normal cycle matching "hashedpid": "60ddc43c02b28ac cdc99551b603b77380d4a ff86afed3bb5f", "levelofassurance": "LEVEL_2", "matchid": "_08084c3b 4df0 4f27 ac d0842e", "matchingdataset": "addresses": [ Page 13 of 20
14 "lines": [ "1 Two St" ], "postcode": "1A 2BC", "verified": true }, "fromdate": " T00:00:00.000Z", "lines": [ "221b Baker St." ], "postcode": "W4 1SH", "todate": " T00:00:00.000Z", "verified": true }, "fromdate": " T00:00:00.000Z", "lines": [ "1 Goose Lane" ], "postcode": "M1 2FG", "todate": " T00:00:00.000Z", "verified": false } ], "dateofbirth": "value": " ", "verified": true }, "firstname": "value": "Jack", "verified": true }, "gender": "value": "MALE", "verified": true Page 14 of 20
15 } }, "middlenames": "value": "Charles", "verified": true }, "surnames": [ "value": "Brown", "verified": true } ] } Example of response from matching service 200 result : match no match } Matching dataset fields: firstname, middlenames, surnames, dateofbirth These fields have optional from / to attributes in which you can capture historical values. For example, if the user has changed their surname, there's an additional entry for the old surname with the from and to values defining the period for which the name was valid. The new surname only has the from attribute, containing the date from which it was valid. Matching dataset fields: addresses The addresses field contains the value for the postcode attribute for local addresses and the value for the internationalpostcode for foreign addresses. uprn (Unique Property Reference Number) is a unique reference for each property in Great Britain, ensuring accuracy of address data. This is an optional attribute that can contain up to 12 integers and should not have any leading zeros. Page 15 of 20
16 The addresses field that holds the current address contains a fromdate attribute for the date from which the address is valid. Past addresses also contain the todate attribute. Matching dataset fields: cycle3dataset This field is only present for a cycle 3 matching attempt. Page 16 of 20
17 Example of request from hub to Matching Service Adapter (SAML SOAP format) The following example shows a request from the hub to the Matching Service Adapter in SAML SOAP format. Page 17 of 20
18 Creating user accounts If all matching cycles complete without finding a match, you can optionally decide to create a new account for the user. The new account consists of the hashed personal identifier and a subset of specified attributes from the matching dataset supplied by the identity provider. For more information, see Creating user accounts in step 2 of Stage 4 of the GOV.UK Verify Onboarding Guide. If you want to create user accounts in the above circumstances, your matching service must expose an unknown user creation endpoint. The Matching Service Adapter receives a normal SAML attribute query with the matching dataset and makes the following request to this unknown user creation endpoint: "hashedpid": "cadde401539bdb2231a9eb81ae37ec6e32614a0690f8d0b297a73ecf99a05bac", } "levelofassurance":"level_2" The unknown user creation endpoint responds as follows: 00 } "result": success failure Note: success and failure are case sensitive and must be lower case, as shown in the above example Monitoring In both test environments, a health check runs every 60 seconds to ensure that the Matching Service Adapter is functioning correctly. It tests the following: connectivity Matching Service Adapter accepts the hub signature hub accepts the Matching Service Adapter signature Page 18 of 20
19 In the production environment, Graphite monitoring software continually monitors the Matching Service Adapter s performance. Logging Configure your logging requirements as described in How to configure the Matching Service Adapter for the production and integration environments. The log files are written to disk as per your configuration. How to keep the Matching Service Adapter up to date The GOV.UK Verify support team updates the Matching Service Adapter when required. To ensure you are informed of the updates, contact the GOV.UK Verify support team to ensure you are on the Matching Service Adapter distribution list. Page 19 of 20
20 Document history Version Date Author Reason for change /01/15 Jenny Wright Initial draft /01/15 Jenny Wright After review by Oliver Harper, David King, David Illsley, Rebecca Law and Hugh Quigley /01/15 Jenny Wright Approved by David Illsley and Oliver Harper /01/15 Jenny Wright After editorial review /02/15 Jenny Wright Name change: Test hub now called compliance tool. Request access to an environment form removed from Onboarding Guide /05/15 Jenny Wright References to Onboarding pack removed from Onboarding Guide. Change to logging information in configuration file Page 20 of 20
The GOV.UK Verify onboarding process
To help us improve, this site uses cookies. Docs» GOV.UK Verify documentation GOV.UK Verify Onboarding Guide This guide is for government service providers wanting to learn about and integrate with GOV.UK
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08
Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End
Configuring. Moodle. Chapter 82
Chapter 82 Configuring Moodle The following is an overview of the steps required to configure the Moodle Web application for single sign-on (SSO) via SAML. Moodle offers SP-initiated SAML SSO only. 1 Prepare
New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support...
Informatica Corporation B2B Data Exchange Version 9.5.0 Release Notes June 2012 Copyright (c) 2006-2012 Informatica Corporation. All rights reserved. Contents New Features... 1 Installation... 3 Upgrade
Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA
Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA Page 1 Introduction The ecommerce Hub provides a uniform API to allow applications to use various endpoints such as Shopify. The following
UFTP AUTHENTICATION SERVICE
UFTP Authentication Service UFTP AUTHENTICATION SERVICE UNICORE Team Document Version: 1.1.0 Component Version: 1.1.1 Date: 17 11 2014 UFTP Authentication Service Contents 1 Installation 1 1.1 Prerequisites....................................
Configuring TLS Security for Cloudera Manager
Configuring TLS Security for Cloudera Manager Cloudera, Inc. 220 Portage Avenue Palo Alto, CA 94306 [email protected] US: 1-888-789-1488 Intl: 1-650-362-0488 www.cloudera.com Notice 2010-2012 Cloudera,
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
WebLogic Server 6.1: How to configure SSL for PeopleSoft Application
WebLogic Server 6.1: How to configure SSL for PeopleSoft Application 1) Start WebLogic Server... 1 2) Access Web Logic s Server Certificate Request Generator page.... 1 3) Fill out the certificate request
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
ADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
SSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service
Paper SAS1541-2015 SSL Configuration Best Practices for SAS Visual Analytics 7.1 Web Applications and SAS LASR Authorization Service Heesun Park and Jerome Hughes, SAS Institute Inc., Cary, NC ABSTRACT
Single Sign-On Implementation Guide
Version 27.0: Spring 13 Single Sign-On Implementation Guide Last updated: February 1, 2013 Copyright 2000 2013 salesforce.com, inc. All rights reserved. Salesforce.com is a registered trademark of salesforce.com,
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML --------------------------------------------------------------------------------------------------------------------------- Contents Overview...
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Cloud Elements! Marketing Hub Provisioning and Usage Guide!
Cloud Elements Marketing Hub Provisioning and Usage Guide API Version 2.0 Page 1 Introduction The Cloud Elements Marketing Hub is the first API that unifies marketing automation across the industry s leading
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
PHP Integration Kit. Version 2.5.1. User Guide
PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001
Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup. Version 1.1 Last Updated: April 14, 2014
Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup Version 1.1 Last Updated: April 14, 2014 Table of Contents SSL Certificate Creation... 3 Option 1: Complete the Provider
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM
IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product
SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
BEA Weblogic Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate
BEA Weblogic Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate Copyright. All rights reserved. Trustis Limited Building 273 New Greenham Park Greenham Common Thatcham
Installing BIRT Analytics 4.4
Pre-requisites... 3 Configuring Microsoft Internet Information Services... 3 Installation... 5 Technical information... 13 PORTS (http / https)... 13 USERS... 13 Windows Services... 13 Linux Process...
Domino and Internet. Security. IBM Collaboration Solutions. Ask the Experts 12/16/2014
Domino and Internet Ask the Experts 12/16/2014 Security IBM Collaboration Solutions Agenda Overview of internet encryption technology Domino's implementation of encryption Demonstration of enabling an
EMC Clinical Archiving
EMC Clinical Archiving Version 1.7 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2014-2015 EMC Corporation. All Rights
Enterprise SSL Support
01 Enterprise SSL Support This document describes the setup of SSL (Secure Sockets Layer) over HTTP for Enterprise clients, servers and integrations. 1. Overview Since the release of Enterprise version
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
Using the Push Notifications Extension Part 1: Certificates and Setup
// tutorial Using the Push Notifications Extension Part 1: Certificates and Setup Version 1.0 This tutorial is the second part of our tutorials covering setting up and running the Push Notifications Native
e-filing Secure Web Service User Manual
e-filing Secure Web Service User Manual Page1 CONTENTS 1 BULK ITR... 6 2 BULK PAN VERIFICATION... 9 3 GET ITR-V BY TOKEN NUMBER... 13 4 GET ITR-V BY ACKNOWLEDGMENT NUMBER... 16 5 GET RETURN STATUS... 19
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
HTTPS Configuration for SAP Connector
HTTPS Configuration for SAP Connector 1993-2015 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without
Adeptia Suite 6.2. Application Services Guide. Release Date October 16, 2014
Adeptia Suite 6.2 Application Services Guide Release Date October 16, 2014 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 Document Information DOCUMENT INFORMATION
Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform
Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically
HP Business Availability Center
HP Business Availability Center for the Windows and Solaris operating systems Software Version: 8.05 Business Process Monitor Administration Document Release Date:September 2010 Software Release Date:
ScanJour PDF 2014 R8. Configuration Guide
Configuration Guide Contents 1. Configuration Guide for ScanJour PDF 2014 R8 3 2. What's new 4 3. Installing ScanJour PDF WebService 5 4. Features 10 5. Connecting with WorkZone Content Server 14 6. The
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
OIX IDAP Alpha Project - Technical Findings
OIX IDAP Alpha Project - Technical Findings Warwickshire County Council - using a Federated UK Government ID in trusted Local Authority transactions. By Graham Dunnings and Ian Litton 1 Table of Contents
000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0
Easy CramBible Lab 000-284 Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 ** Single-user License ** This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Goals... 3 High- Level Steps... 4 Basic FTP to File with Compression... 4 Steps in Detail... 4 MFT Console: Login and
SAML v1.1 for.net Developer Guide
SAML v1.1 for.net Developer Guide Copyright ComponentSpace Pty Ltd 2004-2016. All rights reserved. www.componentspace.com Contents 1 Introduction... 1 1.1 Features... 1 1.2 Benefits... 1 1.3 Prerequisites...
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
How do I use Push Notifications with ios?
How do I use Push Notifications with ios? This lesson describes how to set up Push Notifications for ios devices, using a LiveCode and PHP. There are numerous steps involved in this process that touch
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Self Signed Certificates
TECH NOTE 003 Self Signed Certificates X.509 Certificate Creation Using Easy-Rsa with OpenVPN www.westermo.com page 1 AIM This Tech Note will show how to create X.509 certificates with easy-rsa in OpenVPN
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Novell Access Manager
J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations
365 Services. 1.1 Configuring Access Manager. 1.1.1 Prerequisite. 1.1.2 Adding the Office 365 Metadata. docsys (en) 2 August 2012
1 1Configuring Single Sign-On For Office 365 Services NetIQ Access Manager is compatible with Office 365 and provides single sign on access to Office 365 services. Single sign on access is supported for
WildFire Cloud File Analysis
WildFire Cloud File Analysis The following topics describe the different methods for sending files to the WildFire Cloud for analysis. Forward Files to the WildFire Cloud Verify Firewall File Forwarding
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING a Class IIIc SSL Certificate using BEA Weblogic V ERSION 1.0 Page 1 of 8 Procedure for
Configure Managed File Transfer Endpoints
Configure Managed File Transfer Endpoints 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
Deploying Microsoft Operations Manager with the BIG-IP system and icontrol
Deployment Guide Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Welcome to the BIG-IP LTM system -
SAP NetWeaver AS Java
Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is
DEPLOYMENT GUIDE DEPLOYING F5 WITH SAP NETWEAVER AND ENTERPRISE SOA
DEPLOYMENT GUIDE DEPLOYING F5 WITH SAP NETWEAVER AND ENTERPRISE SOA Table of Contents Table of Contents Introducing the F5 Deployment Guide for SAP NetWeaver and Enterprise SOA Prerequisites and configuration
IUCLID 5 Guidance and Support
IUCLID 5 Guidance and Support Web Service Installation Guide July 2012 v 2.4 July 2012 1/11 Table of Contents 1. Introduction 3 1.1. Important notes 3 1.2. Prerequisites 3 1.3. Installation files 4 2.
LDAP and Active Directory Guide
LDAP and Active Directory Guide Contents LDAP and Active Directory Guide...2 Overview...2 Configuring for LDAP During Setup...2 Deciding How to Use Data from LDAP... 2 Starting the Setup Tool... 3 Configuring
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
The HTTP Plug-in. Table of contents
Table of contents 1 What's it for?... 2 2 Controlling the HTTPPlugin... 2 2.1 Levels of Control... 2 2.2 Importing the HTTPPluginControl...3 2.3 Setting HTTPClient Authorization Module... 3 2.4 Setting
EVault Endpoint Protection 7.0 Single Sign-On Configuration
Revision: This manual has been provided for Version 7.0 (July 2014). Software Version: 7.0 2014 EVault Inc. EVault, A Seagate Company, makes no representations or warranties with respect to the contents
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011
Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011 This document contains information on these topics: Introduction... 2 Terminology...
StreamServe Persuasion SP4 Service Broker
StreamServe Persuasion SP4 Service Broker User Guide Rev A StreamServe Persuasion SP4 Service Broker User Guide Rev A 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520 No
WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central
WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central and remote sites. Contents Table of Contents Using WhatsUp
Onset Computer Corporation
Onset, HOBO, and HOBOlink are trademarks or registered trademarks of Onset Computer Corporation for its data logger products and configuration/interface software. All other trademarks are the property
Login with Amazon. Getting Started Guide for Websites. Version 1.0
Login with Amazon Getting Started Guide for Websites Version 1.0 Login with Amazon: Getting Started Guide for Websites Copyright 2016 Amazon Services, LLC or its affiliates. All rights reserved. Amazon
Deploying the BIG-IP System with Oracle E-Business Suite 11i
Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system
SafeNet KMIP and Google Cloud Storage Integration Guide
SafeNet KMIP and Google Cloud Storage Integration Guide Documentation Version: 20130719 Table of Contents CHAPTER 1 GOOGLE CLOUD STORAGE................................. 2 Introduction...............................................................
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Single Sign-On for the UQ Web
Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Tenable for CyberArk
HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
InternetVista Web scenario documentation
InternetVista Web scenario documentation Version 1.2 1 Contents 1. Change History... 3 2. Introduction to Web Scenario... 4 3. XML scenario description... 5 3.1. General scenario structure... 5 3.2. Steps
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
SETTING UP YOUR JAVA DEVELOPER ENVIRONMENT
SETTING UP YOUR JAVA DEVELOPER ENVIRONMENT Summary This tipsheet describes how to set up your local developer environment for integrating with Salesforce. This tipsheet describes how to set up your local
CLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.2 Web Applications Deployed on BEA WebLogic Server 9.2
Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.2 Web Applications Deployed on BEA WebLogic Server 9.2 This document describes how to configure Apache HTTP Server
SAML 2.0 SSO Deployment with Okta
SAML 2.0 SSO Deployment with Okta Simplify Network Authentication by Using Thunder ADC as an Authentication Proxy DEPLOYMENT GUIDE Table of Contents Overview...3 The A10 Networks SAML 2.0 SSO Deployment
Setting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
OIOSAML 2.0 Toolkits Test results May 2009
OIOSAML 2.0 Toolkits Test results May 2009 5. September 2008 - Søren Peter Nielsen: - Lifted and modified from http://docs.google.com/a/nemsso.info/doc?docid=dfxj3xww_7d9xdf7gz&hl=en by Joakim Recht 12.
Novell Access Manager
Access Gateway Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 November 16, 2010 www.novell.com Novell Access Manager 3.1 SP2 Access Gateway Guide Legal Notices Novell, Inc., makes no representations
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Exploiting the Web with Tivoli Storage Manager
Exploiting the Web with Tivoli Storage Manager Oxford University ADSM Symposium 29th Sept. - 1st Oct. 1999 Roland Leins, IBM ITSO Center - San Jose [email protected] Agenda The Web Client Concept Tivoli
Trend Micro Worry- Free Business Security 8.0. 1 st time setup Tips & Tricks
Trend Micro Worry- Free Business Security 8.0 WFBS installation best practise, preparations and how to Preparation for 2008 Server IIS: Configuring the required Internet Information Services (IIS) roles
IBM Cloud Manager with OpenStack. REST API Reference, version 4.1
IBM Cloud Manager with OpenStack REST API Reference, version 4.1 IBM Cloud Manager with OpenStack REST API Reference, version 4.1 Note Before using this information and the product it supports, read the
PaaS Operation Manual
NTT Communications Cloudⁿ PaaS Operation Manual Ver.1.0 Any secondary distribution of this material (distribution, reproduction, provision, etc.) is prohibited. 1 Version no. Revision date Revision details
Cloud Services. Introduction...2 Overview...2. Security considerations... 2. Installation...3 Server Configuration...4
Contents Introduction...2 Overview...2 Security considerations... 2 Installation...3 Server Configuration...4 Management Client Connection...4 General Settings... 4 Enterprise Architect Client Connection
Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the
Setting Up SSL From Client to Web Server and Plugin to WAS
IBM Software Group Setting Up SSL From Client to Web Server and Plugin to WAS Harold Fanning ([email protected]) WebSphere L2 Support 12 December 2012 Agenda Secure Socket Layer (SSL) from a Client to
